Search Results - "Ye, Wenzhe"
-
1
Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities
Published in Cybersecurity (Singapore) (01-12-2023)“…Vulnerability reports are essential for improving software security since they record key information on vulnerabilities. In a report, CWE denotes the weakness…”
Get full text
Journal Article -
2
Backdoor Attacks against Deep Neural Networks by Personalized Audio Steganography
Published in 2022 26th International Conference on Pattern Recognition (ICPR) (21-08-2022)“…In the world of cyber security, backdoor attacks are widely used. These attacks work by injecting a hidden backdoor into training samples to mislead models…”
Get full text
Conference Proceeding -
3
The Tail Behavior of a Longest-Queue-Served-First Queueing System: A Random Walk in the Half Plane
Published in Stochastic models (03-07-2015)“…In this article, we consider the longest-queue-served-first queueing system, in which two types of customers arrive, independently and respectively according…”
Get full text
Journal Article -
4
Logic Optimization Sequence Tuning Based on Policy Search Deep Reinforcement Learning
Published in 2023 China Semiconductor Technology International Conference (CSTIC) (26-06-2023)“…Logic optimization involves a set of Boolean transformations, and the different ways of permutation of Boolean transformations affect the circuit performance…”
Get full text
Conference Proceeding -
5
A Sub-lppm/°C Wide-Temperature-Range Bandgap Voltage Reference with Superior-Order Temperature-Curvature Compensation
Published in 2023 International Conference on Sensing, Measurement & Data Analytics in the era of Artificial Intelligence (ICSMD) (02-11-2023)“…A stable voltage reference is an eternal subject in the analog field. A bandgap voltage reference (BGR) is proposed in this paper to minimize voltage…”
Get full text
Conference Proceeding -
6
Automatic CWE Assignment for Vulnerabilities with Graph Neural Networks
Published in 2023 3rd Asia-Pacific Conference on Communications Technology and Computer Science (ACCTCS) (01-02-2023)“…Vulnerability reports are essential for improving software security since they record many key information of vulnerabilities. In a report, CWE denotes the…”
Get full text
Conference Proceeding