This research was supported by the Qinghai Provincial High-End Innovative and Entrepreneurial Talents Project.
Currently,there is a growing trend among users to store their data in the cloud.However,the cloud is vulnerable to persistent data corruption risks arising from equipment failures and hacker attacks.Additionally,when ...
supported by the National Natural Science Foundation of China (Grand Nos.62072128,11901579,11801564);the Natural Science Foundation of Shaanxi (2022JQ-046,2021JQ-335,2021JM-216).
Federated learning(FL)has emerged to break data-silo and protect clients’privacy in the field of artificial intelligence.However,deep leakage from gradient(DLG)attack can fully reconstruct clients’data from the subm...
supported in part by the Natural Science Foundation of Jiangsu Province in China under grant No.BK20191475;the fifth phase of“333 Project”scientific research funding project of Jiangsu Province in China under grant No.BRA2020306;the Qing Lan Project of Jiangsu Province in China under grant No.2019.
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d...
The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules...
supported by project under Grants No.MOST 107-2221-E-845-001-MY3 and No.MOST 110-2221-E-845-002
An increasing number of social media and networking platforms have been widely used. People usually post the online comments to share their own opinions on the networking platforms with social media. Business companie...
If Michelson were to answer the question posed in the title, given the line of reasoning he used in 1881, Michelson would seat at his desktop computer to calculate the expected fringeshifts for several solar speeds ar...
by National Natural Science Foundation of China(Nos.61872339,61502184 and 61925203).
Regular expressions are widely used within and even outside of computer science due to their expressiveness and flexibility.However, regular expressions have a quite compact and rather tolerant syntax that makes them ...
HIP 53731 is a binary consisting of stars of the spectral types K0 and K9.The orbit of this object was constructed previously by Cvetkovic et al.and improved by Tokovinin.It should be noted that there is a 180°ambigu...
National Key R&D Program of China(Grant No.2018YFB100-3900);in part by National Natural Science Foundation of China(Grant Nos.61402103,61572126,61872078);in part by Open Research Fund of Key Laboratory of Safety-Critical Software Fund(Nanjing University of Aeronautics and Astronautics)(Grant No.NJ2019006);in part by Key Laboratory of Computer Network and Information Integration of the Ministry of Education of China(Grant No.93K-9)。
API recommendation is a promising approach which is widely used during software development.However,the evaluation of API recommendation is not explored with sufficient rigor.The current evaluation of API recommendati...
supported by the National Key R&D Program of China(2017YFB1001802).
1 Introduction When testing programs,the oracle correctness assumption(OCA)implies that there are no errors in the test oracles,such as the expected outputs are always correctly designed and written in unit testing as...