Browsing by Author "Gu, Guofei"
Now showing items 1-20 of 44
-
Broner, Matan (2023-08-03)The steady global deployment of 5G has enabled advancements in quality of service and introduced new standards that allow for better utilization of heterogeneous access networks. While existing functionality such as WiFi ...
-
Shamsundar Jain, Suraj (2023-04-04)The emergence of smart contracts in Web3 has revolutionized the world of decentralized applications (DApps), allowing real-world contracts to be deployed on a decentralized network and influencing the underlying blockchain ...
-
Guo, Daojing (2021-12-06)We introduce a new theoretical framework for optimizing second-order behaviors of wireless networks as a core result of the dissertation. Unlike existing techniques for network utility maximization, which only considers ...
-
Webb, Allen T (2017-07-05)Smart devices have unique security challenges and are becoming increasingly common. They have been used in the past to launch cyber attacks such as the Mirai attack. This work is focused on solving the threats posed to and ...
-
Vardhan, Raj (2021-04-26)Recent research has shown Deep Neural Networks (DNNs) to be vulnerable to adversarial examples that induce desired misclassifications in the models. Such risks impede the application of machine learning in security-sensitive ...
-
Walker, Payton Ross (2022-07-25)Speech privacy is a lasting concern because of the many scenarios in which sensitive information is spoken out loud. Such scenarios can include discussion of business secrets, medical information, banking information, or ...
-
Xu, Zhaoyan (2014-05-28)The persistent evolution of malware intrusion brings great challenges to current anti-malware industry. First, the traditional signature-based detection and prevention schemes produce outgrown signature databases for each ...
-
Yang, Chao (2014-06-05)Benefiting from innovatory techniques, two communication platforms (online social networking (OSN) platforms and smartphone platforms) have emerged and been widely used in the last few years. However, cybercriminals have ...
-
An, Baik Song (2012-10-19)High performance systems have been widely adopted in many fields and the demand for better performance is constantly increasing. And the need of powerful yet flexible systems is also increasing to meet varying application ...
-
Qu, Benke (2017-05-08)The geoscience & technology marketplace aims to provide a common geoscientific data and publication sharing and transaction platform to improve the flexibility of carrying out high performance large scale scientific computing ...
-
Wang, Hao (2013-10-23)Pattern matching is at the core of many computational problems, e.g., search engine, data mining, network security and information retrieval. In this dissertation, we target at the more complex patterns of regular expression ...
-
Flores-Meath, Rachel Ellen (2017-07-25)Smart grids use synchronous real-time measurements from phasor measurement units (PMU) across portions of a grid to provide grid-wide integrity. Achieving synchronicity requires either accurate GPS clocks at each PMU or a ...
-
Step, Thomas LQuality of service is a necessary function of today’s networks. A proper quality of service ensures that packets are delivered effectively and fast. In traditional networks, quality of service has to be manually configured ...
-
Mandal, Subhajit (2015-10-14)An Ad-hoc Mobile Cloud (AMC) is a new computing model that allows sharing computing power of multiple mobile devices. For a diverse group of individuals that employ such computing model, in an ad-hoc manner, secure ...
-
Mitrani, Ariela; Gu, Guofei (2024-01-02)The rise in popularity of AI-generated images has brought up concerns regarding the ethics of training AI using artists’ work without compensation. Because this is a relatively new phenomenon in the public eye, we have ...
-
Liu, Peiming (2022-03-23)Pointer Analysis is a fundamental technique with enormous applications, such as value-flow analysis, bug detection, etc. It is also a prerequisite of many compiler optimizations. However, despite decades of research, the ...
-
Ruia, Atin (2015-05-06)Software Defined Networking (SDN) is a novel paradigm for designing, developing and managing communication networks. SDN separates the traditional network control and data planes, centralising the control plane activities ...
-
Yang, Chen (2013-05-02)Increasing penetration of stochastic photovoltaic (PV) generation into the electric power system poses significant challenges to system operators. In the thesis, we evaluate the spatial and temporal correlations of stochastic ...
-
GPU-based Parallel Computing Models and Implementations for Two-party Privacy-preserving Protocols Pu, Shi (2013-11-25)In (two-party) privacy-preserving-based applications, two users use encrypted inputs to compute a function without giving out plaintext of their input values. Privacy-preserving computing algorithms have to utilize a large ...
-
Zhao, Gang (2022-04-11)Software security is a crucial factor in software development and maintenance. Static analysis approaches can help secure software in different ways. First, it can help identify vulnerabilities ahead-of run. For example, ...