Splitlora: A split parameter-efficient fine-tuning framework for large language models
Z Lin, X Hu, Y Zhang, Z Chen, Z Fang, X Chen… - arXiv preprint arXiv …, 2024 - arxiv.org
The scalability of large language models (LLMs) in handling high-complexity models and
large-scale datasets has led to tremendous successes in pivotal domains. While there is an …
large-scale datasets has led to tremendous successes in pivotal domains. While there is an …
Secure Traffic Sign Recognition: An Attention-Enabled Universal Image Inpainting Mechanism against Light Patch Attacks
Traffic sign recognition systems play a crucial role in assisting drivers to make informed
decisions while driving. However, due to the heavy reliance on deep learning technologies …
decisions while driving. However, due to the heavy reliance on deep learning technologies …
Towards Battery-Free Wireless Sensing via Radio-Frequency Energy Harvesting
Diverse Wi-Fi-based wireless applications have been proposed, ranging from daily activity
recognition to vital sign monitoring. Despite their remarkable sensing accuracy, the high …
recognition to vital sign monitoring. Despite their remarkable sensing accuracy, the high …
Earda: Towards accurate and data-efficient earable activity sensing
In the realm of smart sensing with the Internet of Things, earable devices are empowered
with the capability of multi-modality sensing and intelligence of context-aware computing …
with the capability of multi-modality sensing and intelligence of context-aware computing …
LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π‐Calculus Extension Theory
F Wu, J Liu, Y Li, M Ni - IET Information Security, 2024 - Wiley Online Library
The π‐calculus is a basic theory of mobile communication based on the notion of interaction,
which, is aimed at analyzing and modeling the behaviors of communication processes in …
which, is aimed at analyzing and modeling the behaviors of communication processes in …
Sensor Security in Virtual Reality: Exploration and Mitigation
T Ni - Proceedings of the 22nd Annual International …, 2024 - dl.acm.org
Virtual Reality (VR) technology, extensively utilized in gaming, social networking, and online
collaboration, has raised significant security concerns due to the array of sensors integrated …
collaboration, has raised significant security concerns due to the array of sensors integrated …
Fusion Channel Attack with POI Learning Encoder
X Li, X Ren, L Ning, C Ou - Cryptology ePrint Archive, 2024 - eprint.iacr.org
In order to challenge the security of cryptographic systems, Side-Channel Attacks exploit
data leaks such as power consumption and electromagnetic emissions. Classic Side …
data leaks such as power consumption and electromagnetic emissions. Classic Side …
XSolar: A Generative Framework for Solar-based Human Gesture Sensing via Wearable Signals
Solar cell-based gesture recognition is emerging as an innovative approach to facilitate
seamless human-machine interactions. However, the primary challenge is the scarcity of …
seamless human-machine interactions. However, the primary challenge is the scarcity of …
Comprehensive Analysis of the Intersection Between Cryptocurrency and Infrastructure Security
A Adeniran - 2024 - stars.library.ucf.edu
Cryptocurrencies are experiencing a significant surge, with the total valuation surpassing
two trillion US dollars at specific points. This remarkable growth is underscored by the …
two trillion US dollars at specific points. This remarkable growth is underscored by the …
[PDF][PDF] Rising Star Forum: Sensor Security in Virtual Reality
T Ni - researchgate.net
Virtual Reality (VR) technology, extensively utilized in gaming, social networking, and online
collaboration, has raised significant security concerns due to the array of sensors integrated …
collaboration, has raised significant security concerns due to the array of sensors integrated …