Zobrazeno 1 - 10
of 238
pro vyhledávání: '"Yao, Danfeng"'
Autor:
Liu, Zhengzhi, Deng, Chengyu, Zhou, Zirui, Xiao, Ya, Jiang, Shan, Zhu, Bohan, Naler, Lynette B., Jia, Xiaoting, Yao, Danfeng (Daphne), Lu, Chang
Publikováno v:
In Cell Reports Methods 25 March 2024 4(3)
Despite recent research efforts, the vision of automatic code generation through API recommendation has not been realized. Accuracy and expressiveness challenges of API recommendation needs to be systematically addressed. We present a new neural netw
Externí odkaz:
http://arxiv.org/abs/2103.08747
Autor:
Xu, Li, Lux, Thomas, Chang, Tyler, Li, Bo, Hong, Yili, Watson, Layne, Butt, Ali, Yao, Danfeng, Cameron, Kirk
Publikováno v:
Quality Engineering, 2021
Performance variability is an important measure for a reliable high performance computing (HPC) system. Performance variability is affected by complicated interactions between numerous factors, such as CPU frequency, the number of input/output (IO) t
Externí odkaz:
http://arxiv.org/abs/2012.07915
Anomaly detection is crucial to ensure the security of cyber-physical systems (CPS). However, due to the increasing complexity of CPSs and more sophisticated attacks, conventional anomaly detection methods, which face the growing volume of data and n
Externí odkaz:
http://arxiv.org/abs/2003.13213
Autor:
Jacobs, Edward J., IV, Campelo, Sabrina N., Aycock, Kenneth N., Yao, Danfeng, Davalos, Rafael V.
Publikováno v:
In Computers in Biology and Medicine July 2023 161
Autor:
Cheng, Long, Liljestrand, Hans, Nyman, Thomas, Lee, Yu Tsung, Yao, Danfeng, Jaeger, Trent, Asokan, N.
Data-oriented attacks manipulate non-control data to alter a program's benign behavior without violating its control-flow integrity. It has been shown that such attacks can cause significant damage even in the presence of control-flow defense mechani
Externí odkaz:
http://arxiv.org/abs/1902.08359
Securing cyber-physical systems (CPS) against malicious attacks is of paramount importance because these attacks may cause irreparable damages to physical systems. Recent studies have revealed that control programs running on CPS devices suffer from
Externí odkaz:
http://arxiv.org/abs/1805.00074
This paper investigates and examines the events leading up to the second most devastating data breach in history: the attack on the Target Corporation. It includes a thorough step-by-step analysis of this attack and a comprehensive anatomy of the mal
Externí odkaz:
http://arxiv.org/abs/1701.04940
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.