Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey

SM Ghaffarian, HR Shahriari - ACM computing surveys (CSUR), 2017 - dl.acm.org
Software security vulnerabilities are one of the critical issues in the realm of computer
security. Due to their potential high severity impacts, many different approaches have been …

K-Hunt: Pinpointing insecure cryptographic keys from execution traces

J Li, Z Lin, J Caballero, Y Zhang, D Gu - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
The only secrets in modern cryptography (crypto for short) are the crypto keys.
Understanding how crypto keys are used in a program and discovering insecure keys is …

Lightweight secure-boot architecture for risc-v system-on-chip

J Haj-Yahya, MM Wong, V Pudi… - … on Quality Electronic …, 2019 - ieeexplore.ieee.org
Securing thousands of connected, resource-constrained computing devices is a major
challenge nowadays. Adding to the challenge, third party service providers need regular …

Nondestructive ultrasonic testing in rod structure with a novel numerical Laplace based wavelet finite element method

S Zhang, W Shen, D Li, X Zhang… - Latin American Journal of …, 2018 - SciELO Brasil
Rod structure has been widely used in aerospace engineering and civil engineering.
Nondestructive testing is a very important method applied to detect unseen flaws in …

Cross-domain attribute representation based on convolutional neural network

G Zhang, G Liang, F Su, F Qu, JY Wang - … 18, 2018, Proceedings, Part III 14, 2018 - Springer
In the problem of domain transfer learning, we learn a model for the prediction in a target
domain from the data of both some source domains and the target domain, where the target …

Dress: Dynamic resource-reservation scheme for congested data-intensive computing platforms

Y Mao, V Green, J Wang, H Xiong… - 2018 IEEE 11th …, 2018 - ieeexplore.ieee.org
In the past few years, we have envisioned an increasing number of businesses start driving
by big data analytics, such as Amazon recommendations and Google Advertisements. At the …

Cybersecurity: A survey of vulnerability analysis and attack graphs

R Ait Maalem Lahcen, R Mohapatra… - … and Computing: ICMC …, 2018 - Springer
The network infrastructure is the most critical technical asset of any organization. This
network architecture must be useful, efficient, and secure. However, their cybersecurity …

GreenLoading: Using the citizens band radio for energy-efficient offloading of shared interests

P Cui, S Chen, J Camp - Proceedings of the 21st ACM International …, 2018 - dl.acm.org
Cellular networks are susceptible to being severely capacity-constrained during peak traffic
hours or at special events such as sports and concerts. Many other applications are …

[PDF][PDF] Research on artificial intelligence standardization based on industry analysis

W Chen, J Xiao - Wireless Internet Technology, 2018 - researchgate.net
As the main technical basis for economic and social activities, industry standards are the
basic criteria for products to enter the market, an important indicator of the level of national …

Dramd: detect advanced dram-based stealthy communication channels with neural networks

Z Lv, Y Zhao, C Zhang, H Li - IEEE INFOCOM 2020-IEEE …, 2020 - ieeexplore.ieee.org
Shared resources facilitate stealthy communication channels, including side channels and
covert channels, which greatly endanger the information security, even in cloud …