Bingyu Li

ORCID: 0000-0001-5925-1638
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Security and Verification in Computing
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • Numerical Methods and Algorithms
  • Cryptographic Implementations and Security
  • Statistical and numerical algorithms
  • Spam and Phishing Detection
  • Topic Modeling
  • Privacy-Preserving Technologies in Data
  • Adversarial Robustness in Machine Learning
  • Polynomial and algebraic computation
  • Multimodal Machine Learning Applications
  • Coding theory and cryptography
  • Natural Language Processing Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Digital and Cyber Forensics
  • Advanced Computational Techniques and Applications
  • Anomaly Detection Techniques and Applications
  • Cloud Computing and Resource Management
  • Interactive and Immersive Displays
  • Cybercrime and Law Enforcement Studies

Beihang University
2020-2025

Xi'an University of Technology
2023

Institute of Information Engineering
2018-2020

Chinese Academy of Sciences
2019-2020

University of Chinese Academy of Sciences
2019

Data Assurance and Communication Security
2018

Northeast Normal University
2007-2017

Shanghai Jiao Tong University
2011-2012

Mongolian University of Life Sciences
2006

Xiaomi (China)
2004

Open-vocabulary segmentation aims to identify and segment specific regions objects based on text-based descriptions. A common solution is leverage powerful vision-language models (VLMs), such as CLIP, bridge the gap between vision text information. However, VLMs are typically pretrained for image-level vision-text alignment, focusing global semantic features. In contrast, tasks require fine-grained pixel-level alignment detailed category boundary information, which alone cannot provide. As a...

10.48550/arxiv.2501.00877 preprint EN arXiv (Cornell University) 2025-01-01

To detect fraudulent TLS server certificates and improve the accountability of certification authorities (CAs), certificate transparency (CT) is proposed to record in publicly-visible logs, from which monitors fetch all watch for suspicious ones. However, if monitors, either domain owners themselves or third-party services, fail return a complete set issued interest, potentially may not be detected then CT framework becomes less reliable. This paper presents first systematic study on...

10.1145/3319535.3345653 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2019-11-06

In view of the limitations traditional statistical methods in dealing with multifactor and nonlinear data inadequacy classical machine learning algorithms predicting high dimensions large sample sizes, this paper proposes an operational risk prediction model based on automatic encoder convolutional neural networks. First, we use to extract features motion factors obtain feature components that can highly represent risk. Secondly, causal relationship between sports characteristics, a network...

10.3390/app13137839 article EN cc-by Applied Sciences 2023-07-04

Multimodal semantic segmentation shows significant potential for enhancing accuracy in complex scenes. However, current methods often incorporate specialized feature fusion modules tailored to specific modalities, thereby restricting input flexibility and increasing the number of training parameters. To address these challenges, we propose StitchFusion, a straightforward yet effective modal framework that integrates large-scale pre-trained models directly as encoders fusers. This approach...

10.48550/arxiv.2408.01343 preprint EN arXiv (Cornell University) 2024-08-02

Multimodal semantic segmentation is a pivotal component of computer vision and typically surpasses unimodal methods by utilizing rich information set from various sources.Current models frequently adopt modality-specific frameworks that inherently biases toward certain modalities. Although these might be advantageous in specific situations, they generally limit the adaptability across different multimodal contexts, thereby potentially impairing performance. To address this issue, we leverage...

10.48550/arxiv.2405.15365 preprint EN arXiv (Cornell University) 2024-05-24

One of the most fundamental issues in computer security is protecting sensitive files from unauthorized access. Traditional file protection tools run inside target operating system, which hosts files. This makes previous approaches vulnerable face a compromised OS. To address this limitation, recent seek for good isolation by putting system into dedicated virtual machine or using network system. However, they suffer sharp increase trusted computing base size degrades their reliability.

10.1145/2245276.2232063 article EN 2012-03-26

In order to enhance the accountability of certification authorities (CAs), certificate transparency (CT) is proposed record CA-signed certificates in public logs. A accepted by CT-compliant browsers only if it recorded logs, so that any fraudulent will be detected domain owner public-visible practice, third-party monitors fetch logs provide search services, and regularly searches all issued for its from watch suspicious ones among them. this paper, we study links CT framework CAs, browsers,...

10.1109/trustcom/bigdatase.2019.00037 article EN 2019-08-01

Focusing on obtaining in-memory evidence, current live acquisition efforts either fail to provide accurate native system physical memory at the given time point or require suspending machine and altering execution environment drastically. To address this issue, we propose Vis, a light-weight virtualization approach retrieving of content while preserving target system. Vis encapsulates into single virtual then conducts by manipulating nested page table in hypervisor. We present design...

10.1145/2103799.2103815 article EN 2011-07-11

To validate a certificate, user needs to install the certificate of root certification authority (CA) and download revocation information (CRI). Although operating systems browsers manage trust list (CTL) publicly-trusted CAs for global users, locally-trusted still play an important role it is difficult its CTL properly by itself. Meanwhile, CRI access inefficient, sometimes even unavailable, causes privacy leakage. We revisit these problems analyzing TLS sessions within organization. best...

10.1109/tifs.2020.3035265 article EN IEEE Transactions on Information Forensics and Security 2020-11-02

Traditional public key infrastructure (PKI) only provides authentication for network communication, and the standard X.509 certificate used in this architecture reveals user's identity. This lack of privacy protection no longer satisfies increasing demands personal privacy. Though an optimized anonymous PKI realizes anonymity, it has potential to be abused due identity tracking. Therefore, maintaining a balance between user anonymity traceability become requirement current PKI. paper...

10.26599/tst.2023.9010053 article EN Tsinghua Science & Technology 2023-07-28

Text has become the predominant form of communication on social media, embedding a wealth emotional nuances. Consequently, extraction information from text is paramount importance. Despite previous research making some progress, existing sentiment analysis models still face challenges in integrating diverse semantic and lack interpretability. To address these issues, we propose quantum-inspired deep learning architecture that combines fundamental principles quantum mechanics (QM principles)...

10.48550/arxiv.2408.07891 preprint EN arXiv (Cornell University) 2024-08-14

The certificate transparency (CT) framework has been deployed to improve the accountability of TLS ecosystem.However, current implementation CT does not enforce or guarantee correct behavior third-party monitors, which are essential components framework, and raises security reliability concerns.For example, recent studies [32], [33] reported that 5 popular monitors cannot always return complete set certificates inquired by users, fundamentally impairs protection aims offer.This work revisits...

10.14722/ndss.2024.24834 article EN 2024-01-01
Coming Soon ...