2024
Exploring Low-Dimensional Subspaces in Diffusion Models for Controllable Image Editing.
CoRR, 2024
Exploring Low-Dimensional Subspace in Diffusion Models for Controllable Image Editing.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
The Emergence of Reproducibility and Consistency in Diffusion Models.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
2023
The Emergence of Reproducibility and Consistency in Diffusion Models.
CoRR, 2023
2021
Enhancing Robustness of Neural Networks through Fourier Stabilization.
Proceedings of the 38th International Conference on Machine Learning, 2021
2020
An Incentive Compatible Mechanism for Replica Placement in Peer-Assisted Content Distribution.
Int. J. Softw. Sci. Comput. Intell., 2020
Towards Robustness against Unsuspicious Adversarial Examples.
CoRR, 2020
2016
Hands-On Labs for Learning Mobile and NoSQL Database Security.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Mechanism Design for Replica Placement in Peer-Assisted Content Delivery Networks with Heterogeneous Behavior Models.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
SINCERA: A Pipeline for Single-Cell RNA-Seq Profiling Analysis.
PLoS Comput. Biol., 2015
A hybrid approach for mobile security threat analysis.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Web Service-Enabled Spam Filtering with Naïve Bayes Classification.
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015
2014
Learning Mobile Security with Labware.
IEEE Secur. Priv., 2014
Enhancing the information assurance and security (IAS) in CS education with mobile-device based hands-on labs.
Proceedings of the Innovation and Technology in Computer Science Education Conference 2014, 2014
Diverse virtual replicas for improving intrusion tolerance in cloud.
Proceedings of the Cyber and Information Security Research Conference, 2014
2013
Enhance computer networks learning with hands-on mobile device based labware (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013
Learning mobile security with android security labware.
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013
Mobile device based authentic learning for computer network and security.
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013
Android-Based Mobile Sensory System Labware for Embedded System Education.
Proceedings of the IEEE 13th International Conference on Advanced Learning Technologies, 2013
Authentic learning of mobile security with case studies.
Proceedings of the IEEE Frontiers in Education Conference, 2013
2012
Measuring and ranking attacks based on vulnerability analysis.
Inf. Syst. E Bus. Manag., 2012
Mechanism Design Based Secure Data Object Replication.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Work in progress: Real world relevant security labware for mobile threat analysis and protection experience.
Proceedings of the IEEE Frontiers in Education Conference, 2012
2011
Live Programming Learning Objects on Cloud.
Proceedings of the ICALT 2011, 2011
A Cloud-based Cyberlearning Environment for Introductory Computing Programming Education.
Proceedings of the ICALT 2011, 2011
A Collaborative Interactive Cyber-learning Platform for Anywhere Anytime Java Programming Learning.
Proceedings of the ICALT 2011, 2011
2010
Design of Online Runtime and Testing Environment for Instant Java Programming Assessment.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010
Measuring Similarity for Security Vulnerabilities.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
Ranking Attacks Based on Vulnerability Analysis.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
Vulnerability categorization using Bayesian networks.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
2009
Environmental Metrics for Software Security Based on a Vulnerability Ontology.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009
Security Data Mining in an Ontology for Vulnerability Management.
Proceedings of the International Joint Conferences on Bioinformatics, 2009
Ontology-based security assessment for software products.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
OVM: an ontology for vulnerability management.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
Security metrics for software systems.
Proceedings of the 47th Annual Southeast Regional Conference, 2009