相关期刊:《The Journal of China Universities of Posts and Telecommunications》《Journal of Clinical & Translational Research》《国际计算机前沿大会会议论文集》《Chinese Journal of Electronics》更多>>
相关基金:国家自然科学基金中国航空科学基金The Royal Society国家重点基础研究发展计划更多>>
Patients in intensive care units(ICUs)require rapid critical decision making.Modern ICUs are data rich,where information streams from diverse sources.Machine learning(ML)and neural networks(NN)can leverage the rich da...
supported by the Intelligent Policing Key Laboratory of Sichuan Province(No.ZNJW2022KFZD002);This work was supported by the Scientific and Technological Research Program of Chongqing Municipal Education Commission(Grant Nos.KJQN202302403,KJQN202303111).
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior knowledge.This is achieved by leveraging the property of adversarial examples.That is,when generated from a surrogate model,they re...
The rapid growth of digital data necessitates advanced natural language processing(NLP)models like BERT(Bidi-rectional Encoder Representations from Transformers),known for its superior performance in text classificati...
supported by the major project of Science and Technology Innovation 2030,"The next generation of Artificial Intelligence"under Grant Number 2021ZD0111400;the Open project of the State Key Laboratory of Computer Architecture,Neural Network Enhanced Symbolic Execution Algorithm Research under Grant Number CARCH201910;the Fundamental Research Fundsfor the Central Universities under Grant Number 3132018XNG1814 and 3132018XNG1815.
The popularity of small office and home office routers has brought convenience,but it also caused many security issues due to vulnerabilities.Black-box fuzzing through network protocols to discover vulnerabilities bec...
Optimizing the parameter settings in a large design space for the processor with limited simulation resources is a challenging task. The current black-box optimization algorithms for processor design space exploration...
supported by National Natural Science Foundation of China(Grant Nos.62022018,61932019);supported by National Natural Science Foundation of China(Grant Nos.62125204,92270201);National Key Research and Development Program of China(Grant No.2022YFB2702000);National Key Research and Development Program of China(Grant No.2018YFA0704701);Major Program of Guangdong Basic and Applied Research(Grant No.2019B030302008);the support from the XPLORER PRIZE。
In this work,we introduce a class of black-box(BB)reductions called committed-programming reduction(CPRed)in the random oracle model(ROM)and obtain the following interesting results:(1)we demonstrate that some well-kn...
supported by the National Natural Science Foundation of China(No.62202320);the Fundamental Research Funds for the Central Universities(Nos.SCU2023D008,2023SCU12129);the Natural Science Foundation of Sichuan Province(No.2024NSFSC1449);the Science and Engineering Connotation Development Project of Sichuan University(No.2020SCUNG129);the Key Laboratory of Data Protection and Intelligent Management(Sichuan University),Ministry of Education.
RESTful API fuzzing is a promising method for automated vulnerability detection in Kubernetes platforms.Existing tools struggle with generating lengthy,high-semantic request sequences that can pass Kubernetes API gate...
This work is supported by the Key Program of National Natural Science Foundation of China(No.61832004);International Cooperation and Exchange Program of National Natural Science Foundation of China(Grant no.62061136006).
Adversarial attack for time-series classification model is widely explored and many attack methods are proposed.But there is not a method of attack based on the data itself.In this paper,we innovatively proposed a bla...
Membership inference attacks on machine learning models have drawn significant attention.While current research primarily utilizes shadow modeling techniques,which require knowledge of the target model and training da...
supported in part by the Science Search Foundation of Liaoning Educational Department(No.LQGD2020002).
Since the high penetration of distributed energy sources complicates the dynamics of electrical power systems,accurate dynamic models are indispensable for study on the transient behavior of the microgrid(MG).In some ...