Zobrazeno 1 - 10
of 38
pro vyhledávání: '"Yingpei Zeng"'
Publikováno v:
PeerJ Computer Science, Vol 9, p e1592 (2023)
Fuzzing has become an important method for finding vulnerabilities in software. For fuzzing programs expecting structural inputs, syntactic- and semantic-aware fuzzing approaches have been particularly proposed. However, they still cannot fuzz in-mem
Externí odkaz:
https://doaj.org/article/25e8f230a42f4438ab8ee74686b08e4c
Autor:
Yingpei Zeng, Tzu Tsun Luk, Yongda Socrates Wu, Sau Chai H. Tong, Wai Yin V. Lai, Tai Hing Lam, Man Ping Wang
Publikováno v:
Tobacco Induced Diseases, Vol 20, Iss December, Pp 1-10 (2022)
Introduction How changes in smoking routine due to COVID-19 restrictions (e.g. refraining from smoking outdoors and stockpiling tobacco products) influence smoking behaviors remains understudied. We examined the associations of changes in smoking-rel
Externí odkaz:
https://doaj.org/article/9b72d9d0632347cfbb5cc616a8531f50
Autor:
Yingpei Zeng, Weijie Gong, Agnes Yuen Kwan Lai, Shirley Man Man Sit, Man Ping Wang, Sai Yin Ho, Tai Hing Lam
Publikováno v:
Frontiers in Public Health, Vol 11 (2023)
ObjectiveFamily services are open to the community at large as well as vulnerable groups; however, little is known about the willingness of communities to attend such services. We investigated the willingness and preferences to attend family services
Externí odkaz:
https://doaj.org/article/fd1333a3279d493a817e9c7b13433d99
Autor:
Xu Zhang, Ting Wu, Qiuhua Zheng, Liang Zhai, Haizhong Hu, Weihao Yin, Yingpei Zeng, Chuanhui Cheng
Publikováno v:
Sensors, Vol 22, Iss 8, p 2874 (2022)
Currently, hidden Markov-based multi-step attack detection models are mainly trained using the unsupervised Baum–Welch algorithm. The Baum–Welch algorithm is sensitive to the initial values of model parameters. However, its training uses random o
Externí odkaz:
https://doaj.org/article/6dfd8662623946ab8dc29c415be4ae1a
Publikováno v:
Symmetry, Vol 13, Iss 9, p 1743 (2021)
With the development of the Industrial Internet in recent years, security issues have been a hot topic of the industrial control system (ICS) network management. Identifying the protocol traffic in the communication process of the ICS is an important
Externí odkaz:
https://doaj.org/article/61319acbe1554d5d87fd8cfb327a698b
Publikováno v:
Symmetry, Vol 12, Iss 12, p 2011 (2020)
Deep Packet Inspection (DPI) is widely used in network management and network security systems. The core part of existing DPI is signature matching, and many researchers focus on improving the signature-matching algorithms. In this paper, we work fro
Externí odkaz:
https://doaj.org/article/ce1a774da2da4921a25033fc3ca074a4
Autor:
Yingpei Zeng, Mingmin Lin, Shanqing Guo, Yanzhao Shen, Tingting Cui, Ting Wu, Qiuhua Zheng, Qiuhua Wang
Publikováno v:
Sensors, Vol 20, Iss 18, p 5194 (2020)
The publish/subscribe model has gained prominence in the Internet of things (IoT) network, and both Message Queue Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP) support it. However, existing coverage-based fuzzers may miss som
Externí odkaz:
https://doaj.org/article/1fdb42427c934df58606c19521d97c0a
Publikováno v:
JMIR Formative Research. 7:e40207
Background Mobile instant messaging (IM) apps (eg, WhatsApp and WeChat) have been widely used by the general population and are more interactive than text-based programs (SMS text messaging) to modify unhealthy lifestyles. Little is known about IM ap
Autor:
Qiuhua Zheng, Tao Pei, Junzhe Yu, Ting Wu, Yingpei Zeng, Yanzhao Shen, Shengwang Xu, Cui Tingting, Yinhao Hu
Publikováno v:
Security and Communication Networks, Vol 2020 (2020)
GOST, known as GOST-28147-89, was standardized as the Russian encryption standard in 1989. It is a lightweight-friendly cipher and suitable for the resource-constrained environments. However, due to the simplicity of GOST’s key schedule, it encount
Publikováno v:
Security and Communication Networks.
Mutation-based fuzzing is currently one of the most effective techniques to discover software vulnerabilities. It relies on mutation strategies to generate interesting seeds. As a state-of-the-art mutation-based fuzzer, AFL follows a mutation strateg