Search Results - "Ye, Wenzhe"

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities by Liu, Peng, Ye, Wenzhe, Duan, Haiying, Li, Xianxian, Zhang, Shuyi, Yao, Chuanjian, Li, Yongnan

    Published in Cybersecurity (Singapore) (01-12-2023)
    “…Vulnerability reports are essential for improving software security since they record key information on vulnerabilities. In a report, CWE denotes the weakness…”
    Get full text
    Journal Article
  2. 2

    Backdoor Attacks against Deep Neural Networks by Personalized Audio Steganography by Liu, Peng, Zhang, Shuyi, Yao, Chuanjian, Ye, Wenzhe, Li, Xianxian

    “…In the world of cyber security, backdoor attacks are widely used. These attacks work by injecting a hidden backdoor into training samples to mislead models…”
    Get full text
    Conference Proceeding
  3. 3

    The Tail Behavior of a Longest-Queue-Served-First Queueing System: A Random Walk in the Half Plane by Ye, Wenzhe, Li, Hui, Zhao, Yiqiang Q.

    Published in Stochastic models (03-07-2015)
    “…In this article, we consider the longest-queue-served-first queueing system, in which two types of customers arrive, independently and respectively according…”
    Get full text
    Journal Article
  4. 4

    Logic Optimization Sequence Tuning Based on Policy Search Deep Reinforcement Learning by Jin, Yu, Huang, Haijiao, Ye, Wenzhe, Zhang, Xuebing

    “…Logic optimization involves a set of Boolean transformations, and the different ways of permutation of Boolean transformations affect the circuit performance…”
    Get full text
    Conference Proceeding
  5. 5

    A Sub-lppm/°C Wide-Temperature-Range Bandgap Voltage Reference with Superior-Order Temperature-Curvature Compensation by Ye, Wenzhe, Jin, Yu, Yu, Duli, Cui, Zheyu, Lu, Weiqing, Ye, Wenhao, Yuan, Xinmin

    “…A stable voltage reference is an eternal subject in the analog field. A bandgap voltage reference (BGR) is proposed in this paper to minimize voltage…”
    Get full text
    Conference Proceeding
  6. 6

    Automatic CWE Assignment for Vulnerabilities with Graph Neural Networks by Liu, Peng, Ye, Wenzhe, Duan, Haiying, Li, Xianxian, Zhang, Shuyi, Li, Yongnan

    “…Vulnerability reports are essential for improving software security since they record many key information of vulnerabilities. In a report, CWE denotes the…”
    Get full text
    Conference Proceeding