Zobrazeno 1 - 10
of 212
pro vyhledávání: '"Yinbin MIAO"'
Autor:
Guillaume Giudicelli, Alexander Lindsay, Logan Harbour, Casey Icenhour, Mengnan Li, Joshua E. Hansel, Peter German, Patrick Behne, Oana Marin, Roy H. Stogner, Jason M. Miller, Daniel Schwen, Yaqi Wang, Lynn Munday, Sebastian Schunert, Benjamin W. Spencer, Dewen Yushu, Antonio Recuero, Zachary M. Prince, Max Nezdyur, Tianchen Hu, Yinbin Miao, Yeon Sang Jung, Christopher Matthews, April Novak, Brandon Langley, Timothy Truster, Nuno Nobre, Brian Alger, David Andrs, Fande Kong, Robert Carlsen, Andrew E. Slaughter, John W. Peterson, Derek Gaston, Cody Permann
Publikováno v:
SoftwareX, Vol 26, Iss , Pp 101690- (2024)
The development of MOOSE has kept accelerating since the last release, with over 2,100 pull requests merged over the last 30 months that involved nearly fifty contributors across close to a dozen institutions internationally. The growth in MOOSE's ca
Externí odkaz:
https://doaj.org/article/31a1c295bf0145adb263697dd638f00f
Autor:
Tyler Dabney, K.N. Sasidhar, Hwasung Yeom, Yinbin Miao, Kun Mo, Laura Jamison, Kumar Sridharan
Publikováno v:
Materials & Design, Vol 239, Iss , Pp 112755- (2024)
High energy synchrotron X-ray diffraction in the transmission mode was performed in situ during uniaxial tensile testing to understand the deformation and cracking behavior of cold spray Cr-coated Zr-alloy specimens in both the as-deposited and annea
Externí odkaz:
https://doaj.org/article/b03539e05daa412dac0e9dadcc774358
Publikováno v:
IET Communications, Vol 17, Iss 1, Pp 45-62 (2023)
Abstract Machine learning has become an integral part of modern intelligent systems in all aspects of life. Membership inference attacks (MIAs), as the significant model attacks, also jeopardize the privacy of the intelligent systems. Previous works
Externí odkaz:
https://doaj.org/article/ebbe629198a3474688ce3fe84499e5f4
Autor:
Alexander D. Lindsay, Derek R. Gaston, Cody J. Permann, Jason M. Miller, David Andrš, Andrew E. Slaughter, Fande Kong, Joshua Hansel, Robert W. Carlsen, Casey Icenhour, Logan Harbour, Guillaume L. Giudicelli, Roy H. Stogner, Peter German, Jacob Badger, Sudipta Biswas, Leora Chapuis, Christopher Green, Jason Hales, Tianchen Hu, Wen Jiang, Yeon Sang Jung, Christopher Matthews, Yinbin Miao, April Novak, John W. Peterson, Zachary M. Prince, Andrea Rovinelli, Sebastian Schunert, Daniel Schwen, Benjamin W. Spencer, Swetha Veeraraghavan, Antonio Recuero, Dewen Yushu, Yaqi Wang, Andy Wilkins, Christopher Wong
Publikováno v:
SoftwareX, Vol 20, Iss , Pp 101202- (2022)
The last 2 years have been a period of unprecedented growth for the MOOSE community and the software itself. The number of monthly visitors to the website has grown from just over 3,000 to now averaging 5,000. In addition, over 1,800 pull requests ha
Externí odkaz:
https://doaj.org/article/b7ea7b7d4acf4449b3e1d178f094c1d7
Publikováno v:
Tongxin xuebao, Vol 41, Pp 14-26 (2020)
Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local s
Externí odkaz:
https://doaj.org/article/e4376f96836d46b5af9b81765ffc3ecc
Publikováno v:
Tongxin xuebao, Vol 40, Pp 31-39 (2019)
The traditional privacy-preserving image retrieval schemes not only bring large computational and communication overhead,but also cannot protect the image and query privacy in multi-user scenarios.To solve above problems,an efficient privacy-preservi
Externí odkaz:
https://doaj.org/article/5efefe4011b541f4b2570a95e5bfd402
Publikováno v:
IEEE Access, Vol 7, Pp 43869-43883 (2019)
Secure outsourced aggregation in the Internet of Things (IoT) can solve the problem that sensing devices are limited in energy and bandwidth by outsourcing data aggregation task to a third-party service provider. Location-based secure outsourced aggr
Externí odkaz:
https://doaj.org/article/5d0f864cccb74290b2ece154645accb4
Publikováno v:
Tongxin xuebao, Vol 39, Pp 94-102 (2018)
To solve the problem of massive keys storage caused by multi-source data encryption in ciphertext retrieval system,a key storage scheme based on keyed hash tree with state was proposed.The scheme computes encryption key according to the root key and
Externí odkaz:
https://doaj.org/article/a64b9bfbc7af47e89329d36876ddf998
Publikováno v:
Tongxin xuebao, Vol 39, Pp 167-175 (2018)
The previously proposed short comparable encryption (SCE) scheme can infer the plaintext relationship by comparing the ciphertexts relationship as well as ensuring data security in Internet of things.Unfortunately,it will incur high storage and compu
Externí odkaz:
https://doaj.org/article/f5ec7b8a19f84fd283e1c3ac2a407fc9
Publikováno v:
IEEE Access, Vol 6, Pp 52248-52260 (2018)
Privacy-preserving outsourcing algorithms for feature extraction not only reduce users' storage and computation overhead but also preserve the image privacy. However, the existing schemes still suffer from deficiencies induced by security, applicatio
Externí odkaz:
https://doaj.org/article/bf2bc8e96f8744f1b2d869859f4042c0