Zobrazeno 1 - 10
of 77
pro vyhledávání: '"Yikun Hu"'
Publikováno v:
IEEE Access, Vol 7, Pp 28170-28184 (2019)
The security of binary programs is significantly threatened by software vulnerabilities. When vulnerabilities are found, those applications are exposed to malicious attacks that exploit the known vulnerabilities. Thus, it is necessary to patch them w
Externí odkaz:
https://doaj.org/article/87920ceeb23146dcb21da726ac7a79cf
Publikováno v:
Process Safety and Environmental Protection. 174:828-837
Publikováno v:
Crystal Growth & Design. 22:2462-2469
Publikováno v:
2023 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER).
Publikováno v:
2023 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER).
Publikováno v:
Proceedings of the 38th Annual Computer Security Applications Conference.
Publikováno v:
2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys).
Publikováno v:
Neurocomputing. 542:126277
Publikováno v:
Information Sciences. 572:343-377
Recently, decomposition-based multiobjective evolutionary algorithms (DMEAs) have become more prevalent than other patterns (e.g., Pareto-based algorithms and indicator-based algorithms) for solving multiobjective optimization problems (MOPs). They u
Publikováno v:
Neural Computing and Applications. 34:757-769
Deep neural networks (DNNs) are getting deeper and larger, making memory become one of the most important bottlenecks during training. Researchers have found that the feature maps generated during DNN training occupy the major portion of memory footp