Zobrazeno 1 - 10
of 70
pro vyhledávání: '"YONGQIANG LYU"'
Autor:
Jian Song, Jintao Wang, Fang Yang, Hongming Zhang, Chao Zhang, Hui Yang, Changyong Pan, Xiaofei Wang, Yongqiang Lyu, Luoxi Hao
Publikováno v:
Intelligent and Converged Networks, Vol 3, Iss 3, Pp 229-243 (2022)
Intelligent lighting has attracted lots of research interests to investigate all the possible schemes to support this need as human has spent more and more time indoor. Semiconductor-based illumination network is an ideal bearer to carry on this miss
Externí odkaz:
https://doaj.org/article/6f11dc76570c407dbdfa96a5fb9a53a0
Autor:
Yongqiang Lyu, Dezhi Hong, Ying Wang, Yinghong Hou, Zhengwen Yang, Yu Chen, Yuanchun Shi, Alvin Chin
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 9 (2013)
Social network services (SNSs) are developing at an explosive speed, which makes it easy for people to be closely connected. As a result, a new SNS type, ephemeral social network (ESN), is emerging to capture the ephemeral interactions and meetings t
Externí odkaz:
https://doaj.org/article/48089fadf13847d0b839f505752aab34
Publikováno v:
Mobile Networks and Applications. 27:1642-1658
Autor:
Jinxiao Wu, Xiangyang Ji, Yongqiang Lyu, Xuanshu Luo, Yan Meng, Eric Morales, Dongsheng Wang, Xiaomin Luo
Publikováno v:
IEEE Transactions on Mobile Computing. :1-15
Autor:
Pengfei Qiu, Qiang Gao, Dongsheng Wang, Yongqiang Lyu, Chunlu Wang, Chang Liu, Rihui Sun, Gang Qu
Publikováno v:
Proceedings of the 28th Asia and South Pacific Design Automation Conference.
Autor:
Pengfei Qiu, Qiang Gao, Dongsheng Wang, Yongqiang Lyu, Chang Liu, Xiaoyong Li, Chunlu Wang, Gang Qu
Publikováno v:
2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST).
Publikováno v:
2022 7th IEEE International Conference on Data Science in Cyberspace (DSC).
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 40:1130-1143
Intel software guard extensions (SGX) increase the security of applications by enabling them to be performed in a highly trusted space (called enclave ). Most state-of-the-art attacks on SGX focus on either mining the software vulnerabilities in the
Publikováno v:
IEEE Transactions on Services Computing. 14:606-613
The decision of request mapping—which server to handle user request and response routing—which transit route to carry response back to user has great impact on the performance and cost of Content Delivery Networks (CDNs). Request mapping and resp
Publikováno v:
GetMobile: Mobile Computing and Communications. 24:30-33
Based on the concept of hardware separation, ARM introduced TrustZone to build a trusted execution environment for applications. It has been quite successful in defending against various software attacks and forcing attackers to explore vulnerabiliti