Lan Gao

ORCID: 0000-0001-5637-9417
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Security and Verification in Computing
  • Parallel Computing and Optimization Techniques
  • Advanced Data Storage Technologies
  • Distributed systems and fault tolerance
  • Statistical Methods and Inference
  • Advanced Malware Detection Techniques
  • Advanced Memory and Neural Computing
  • Advanced Neural Network Applications
  • Higher Education and Teaching Methods
  • Interconnection Networks and Systems
  • Advanced Image and Video Retrieval Techniques
  • Random Matrices and Applications
  • Bayesian Methods and Mixture Models
  • Cryptography and Data Security
  • Adversarial Robustness in Machine Learning
  • Embedded Systems Design Techniques
  • Cloud Computing and Resource Management
  • Statistical Methods and Bayesian Inference
  • Diversity and Impact of Dance
  • Smart Grid Energy Management
  • Consumer Market Behavior and Pricing
  • Cryptographic Implementations and Security
  • Security in Wireless Sensor Networks
  • Neural Networks and Applications
  • Caching and Content Delivery

Knoxville College
2022-2024

University of Tennessee at Knoxville
2022-2024

First Affiliated Hospital of Jinan University
2024

Deakin University
2022-2024

Capital Normal University
2019-2023

Shandong Youth University of Political Science
2014-2023

University of Southern California
2018-2022

Chinese University of Hong Kong
2022

University of Newcastle Australia
2022

Peking University First Hospital
2022

Due to the widespread software piracy and virus attacks, significant efforts have been made improve security for computer systems. For stand-alone computers, a key observation is that other than processor, any component vulnerable attacks. Recently, an execution only memory (XOM) architecture has proposed support copy tamper resistant by D. Lie et al. (2000), (2003) T. Gilmont (1999). In this design, program data are stored in encrypted format outside CPU boundary. The decryption carried...

10.5555/956417.956576 article EN International Symposium on Microarchitecture 2003-12-03

Due to the widespread software piracy and virus attacks, significant efforts have been made improve security for computer systems. For stand-alone computers, a key observation is that, other than processor, any component vulnerable attacks. Recently, an execution only memory (XOM) architecture has proposed support copy tamper resistant software. In this design, program data are stored in encrypted format outside CPU boundary. The decryption carried out after they fetched from before used by...

10.1109/tc.2005.80 article EN IEEE Transactions on Computers 2005-03-21

The secondary voltage control problem of inverter-based islanded microgrid (MG) is proposed in this paper.First, the dynamics distributed generation (DG) with primary analyzed and modeled.Then, an RBF-neural-network (RBF-NN) sliding-mode controller designed to eliminate deviation caused by control.The output all DGs can restore a reference value remains stable.Finally, taking MG consisting four as example, experimental results validate strategy.

10.1109/access.2019.2915509 article EN cc-by-nc-nd IEEE Access 2019-01-01

Due to the widespread software piracy and virus attacks, significant efforts have been made improve security for computer systems. For stand-alone computers, a key observation is that other than processor, any component vulnerable attacks. Recently, an execution only memory (XOM) architecture has proposed support copy tamper resistant by D. Lie et al. (2000), (2003) T. Gilmont (1999). In this design, program data are stored in encrypted format outside CPU boundary. The decryption carried...

10.1109/micro.2003.1253209 article EN 2004-05-06

With the increasing concern of security on high performance multiprocessor enterprise servers, more and effort is being invested into defending against various kinds attacks. This paper proposes a enhancement model called SENSS, that allows programs to run securely symmetric shared memory (SMP) environment. In program, including both code data, stored in encrypted form but decrypted once it fetched any processors. contrast traditional uniprocessor XOM (Lie et al., 2000), main challenge...

10.1109/hpca.2005.31 article EN 2005-04-01

Modern GPUs have shown promising results in accelerating computation intensive and numerical workloads with limited dynamic data sharing. However, many real-world applications manifest ample amount of sharing among concurrently executing threads. Often requires mutual exclusion mechanism to ensure integrity multithreaded environment. Although modern provide atomic primitives that can be leveraged construct fine-grained locks, lock-based synchronization significant programming efforts achieve...

10.1145/2544137.2544139 article EN 2014-02-15

Modern GPUs have shown promising results in accelerating computation intensive and numerical workloads with limited dynamic data sharing. However, many real-world applications manifest ample amount of sharing among concurrently executing threads. Often requires mutual exclusion mechanism to ensure integrity multithreaded environment. Although modern provide atomic primitives that can be leveraged construct fine-grained locks, lock-based synchronization significant programming efforts achieve...

10.1145/2581122.2544139 article EN 2014-02-15

Distance correlation has become an increasingly popular tool for detecting the nonlinear dependence between a pair of potentially high-dimensional random vectors. Most existing works have explored its asymptotic distributions under null hypothesis independence two vectors when only sample size or dimensionality diverges. Yet distribution more realistic setting both and diverge in full range remains largely underdeveloped. In this paper, we fill such gap develop central limit theorems...

10.1214/20-aos2024 article EN The Annals of Statistics 2021-08-01

Modern GPUs have shown promising results in accelerating compute-intensive and numerical workloads with limited data sharing. However, emerging GPU applications manifest ample amount of sharing among concurrently executing threads. Often requires mutual exclusion mechanism to ensure integrity multithreaded environment. Although modern provide atomic primitives that can be leveraged construct fine-grained locks, the existing lock implementations either incur frequent concurrency bugs, or lead...

10.1145/2903150.2903155 article EN 2016-05-16

Due to the cost-effective, massive computational power of graphics processing units (GPUs), there is a growing interest utilizing GPUs in real-time systems. For example have been applied automotive systems enable new advanced and intelligent driver assistance technologies, accelerating path self-driving cars. In such systems, are shared among tasks with mixed timing constraints: (RT) that be accomplished before specified deadlines, non-real-time, best-effort (BE) tasks. this paper, (1) we...

10.1145/2925426.2926265 article EN 2016-06-01

The EQ Health and Wellbeing (EQ-HWB) is a novel measure that conceptually overlaps with the 5-level EQ-5D (EQ-5D-5L) while capturing broader dimensions of health well-being. This study aimed to explore extent which EQ-HWB EQ-5D-5L capture overlapping or complementary constructs discriminative ability Short version (EQ-HWB-S) as multiattribute utility instrument in Australian setting.

10.1016/j.jval.2024.01.004 article EN cc-by Value in Health 2024-01-27

The address sequence on the processor-memory bus can reveal abundant information about control flow of a program. This lead to critical leakage such as encryption keys or proprietary algorithms. Addresses be observed by attaching hardware device that passively monitors transaction. Such side-channel attacks should given rising attention especially in distributed computing environment, where remote servers running sensitive programs are not within physical client.Two previously proposed...

10.1145/1152154.1152169 article EN 2006-09-16

Energy-efficient routing is a critical problem in multihop wireless networks due to the severe power constraint of nodes, research on algorithm pivotal architecture sensor networks. This paper analyzes implementation and existing issues LEACH. Specifically for node energy network lifetime, it proposes an energy-efficient based cycle-switching cluster head. It improves efficiency, balances consumption all enhances reliability data transmission postpones lifetime comparison Simulation results...

10.1109/ifita.2010.137 article EN International Forum on Information Technology and Applications 2010-07-01

With the platforms of running deep neural networks (DNNs) move from large-scale data centers to handheld devices, power emerge as one most significant obstacles. Voltage scaling is a promising technique that enables saving. Nevertheless, it raises reliability and performance concerns may undesirably deteriorate NNs accuracy performance. Consequently, an energy-efficient reliable scheme required for balance above three aspects with satisfied user experience. To this end, we propose...

10.1109/tc.2020.2973150 article EN publisher-specific-oa IEEE Transactions on Computers 2020-02-14

In this study, an intelligent garbage classification and recognition system was deployed on the industry integrated computer with I3-7100U processor 2G memory. Considering unit prediction time accuracy, SqueezeNet selected as network training model among ResNet, InceptionV3, SqueezeNet. The pretraining ImageNet-1000 dataset used for transfer learning, predication accuracy improved by using image enhancement Adam optimizer. comparison between comprehensive test set real showed that reached...

10.1109/wcmeim52463.2020.00032 article EN 2020 3rd World Conference on Mechanical Engineering and Intelligent Manufacturing (WCMEIM) 2020-12-01

Recently proposed trusted processor model is a promising for building secure applications. While effective designs have been protecting data confidentiality and integrity in such environments, an important security criterion -- user privacy usually neglected current designs. Due to the increasing concern of protection Internet era, deficiency can hinder adoption new model.In this paper, we identify threat propose scheme protection. In addition providing same ability integrity, effectively...

10.1145/1055626.1055642 article EN ACM SIGARCH Computer Architecture News 2005-03-01

10.1016/j.jpdc.2009.11.008 article EN Journal of Parallel and Distributed Computing 2010-02-09

多核处理器并行程序的确定性重放是实现并行程序调试的有效手段,对并行编程有重要意义.但由于多核架构下存在共享访存不同步问题,并行程序确定性重放的研究依然面临多方面的挑战,给并行程序的调试带来很大困难,严重影响了多核架构下并行程序的普及和发展.分析了多核处理器造成并行程序确定性重放难以实现的关键因素,总结了确定性重放的评价指标,综述了近年来学术界对并行程序确定性重放的研究.根据总结的评价指标,从纯软件方式和硬件支持方式对目前的确定性重放方法进行了分析与对比,并在此基础上对多核架构下并行程序的确定性重放未来的研究趋势和应用前景进行了展望.;The deterministic replay for parallel programs in multi-core processor systems is important the debugging and dissemination of programs, however, due to difficulty tackling unsynchronized accessing shared memory...

10.3724/sp.j.1001.2013.04392 article EN Journal of Software 2014-01-15

Let {(Xi,Yi)}i=1n be a sequence of independent bivariate random vectors. In this paper, we establish refined Cramér-type moderate deviation theorem for the general self-normalized sum ∑ i=1nXi/(∑i=1nYi2)1/2, which unifies and extends classical Cramér (Actual. Sci. Ind. 736 (1938) 5–23) theorems by Jing, Shao Wang (Ann. Probab. 31 (2003) 2167–2215) as well further version (J. Theoret. 24 (2011) 307–329). The advantage our result is evidenced through successful applications to weakly dependent...

10.1214/21-aos2122 article EN The Annals of Statistics 2022-04-01

In the evolving landscape of digital commerce, adaptive dynamic pricing strategies are essential for gaining a competitive edge. This paper introduces novel {\em doubly nonparametric random utility models} that eschew traditional parametric assumptions used in estimating consumer demand's mean function and noise distribution. Existing methods like multi-scale Distributional Nearest Neighbors (DNN TDNN)}, initially designed offline regression, face challenges online due to design limitations,...

10.2139/ssrn.4824569 article EN SSRN Electronic Journal 2024-01-01

In the evolving landscape of digital commerce, adaptive dynamic pricing strategies are essential for gaining a competitive edge. This paper introduces novel {\em doubly nonparametric random utility models} that eschew traditional parametric assumptions used in estimating consumer demand's mean function and noise distribution. Existing methods like multi-scale Distributional Nearest Neighbors (DNN TDNN)}, initially designed offline regression, face challenges online due to design limitations,...

10.48550/arxiv.2405.06866 preprint EN arXiv (Cornell University) 2024-05-10

Evaluate the performance of encephalon state index (ESI) in depth anesthesia monitoring during clinical surgery, compared with bispectral (BIS).

10.12455/j.issn.1671-7104.240143 article EN PubMed 2024-11-30

As the application scope of deep neural networks (DNNs) moves from large-scale data centers to small-scale mobile devices, power wall has become one most important obstacles. Voltage scaling is a typical technique enables saving, but it causes reliability and performance challenges. Therefore, an energy-efficient reliable scheme for NNs required balance above three aspects according users' requirements excellent user experience. In this paper, we innovatively propose neuron-level voltage...

10.1109/icpads47876.2019.00065 article EN 2019-12-01
Coming Soon ...