Kuang, Xiaohui
347  Ergebnisse:
Personensuche X
?
 
?
3

Towards Attack-Resistant Service Function Chain Migration: ..:

Zhang, Tao ; Xu, Changqiao ; Zhang, Bingchi...
IEEE Transactions on Dependable and Secure Computing.  20 (2023)  6 - p. 4913-4927 , 2023
 
?
4

Machine Learning Security Analysis Framework Based on Threa..:

, In: 2023 8th International Conference on Data Science in Cyberspace (DSC),
Li, Hu ; Ma, Qiongmin ; Zhang, Ming. - p. 456-460 , 2023
 
?
5

When Moving Target Defense Meets Attack Prediction in Digit..:

Zhang, Tao ; Xu, Changqiao ; Lian, Yibo...
IEEE Journal on Selected Areas in Communications.  41 (2023)  10 - p. 3293-3305 , 2023
 
?
7

Risk Scenario Generation for Autonomous Driving Systems bas..:

, In: 2023 International Joint Conference on Neural Networks (IJCNN),
Wang, Tong ; Kuang, Xiaohui ; Deng, Huan... - p. 1-8 , 2023
 
?
8

Automated Software Vulnerability Detection via Curriculum L..:

, In: 2023 IEEE International Conference on Multimedia and Expo (ICME),
Du, Qianjin ; Kun, Wei ; Kuang, Xiaohui.. - p. 2855-2860 , 2023
 
?
9

How to Disturb Network Reconnaissance: A Moving Target Defe..:

Zhang, Tao ; Xu, Changqiao ; Shen, Jiahao..
IEEE Transactions on Information Forensics and Security.  18 (2023)  - p. 5735-5748 , 2023
 
?
10

Intracardiac Echocardiography–Guided Implantation for Proxi..:

Kuang, XiaoHui ; Zhang, Xi ; Cui, YanJu...
Circulation: Arrhythmia and Electrophysiology.  16 (2023)  4 - p. , 2023
 
?
11

ADV-POST: Physically Realistic Adversarial Poster for Attac..:

, In: Communications in Computer and Information Science; Neural Information Processing,
Deng, Huan ; Huang, Minhuan ; Wang, Tong... - p. 351-364 , 2023
 
?
12

Fine-Grained Software Vulnerability Detection via Neural Ar..:

, In: Database Systems for Advanced Applications; Lecture Notes in Computer Science,
Du, Qianjin ; Kuang, Xiaohui ; Li, Xiang. - p. 224-238 , 2023
 
?
13

A Multi-Shuffler Framework to Establish Mutual Confidence f..:

Zhou, Zan ; Xu, Changqiao ; Wang, Mingze...
IEEE Transactions on Dependable and Secure Computing.  20 (2023)  5 - p. 4230-4244 , 2023
 
?
14

Survey on Fuzzing Techniques in Deep Learning Libraries:

, In: 2023 8th International Conference on Data Science in Cyberspace (DSC),
Ji, Jiahe ; Kong, Wei ; Tian, Jianwen... - p. 461-467 , 2023
 
?
15

A Study on Vulnerability Code Labeling Method in Open-Sourc..:

, In: Lecture Notes in Computer Science; Database and Expert Systems Applications,
Zheng, Yaning ; Wang, Dongxia ; Cao, Huayang... - p. 52-67 , 2023
 
1-15