Yuebin Bai

ORCID: 0000-0002-2544-3989
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Parallel Computing and Optimization Techniques
  • Cloud Computing and Resource Management
  • Advanced Data Storage Technologies
  • Security and Verification in Computing
  • Distributed and Parallel Computing Systems
  • Software-Defined Networks and 5G
  • Distributed systems and fault tolerance
  • IoT and Edge/Fog Computing
  • Caching and Content Delivery
  • Advanced Graph Neural Networks
  • Advanced Optical Network Technologies
  • Adversarial Robustness in Machine Learning
  • Service-Oriented Architecture and Web Services
  • Advanced Malware Detection Techniques
  • Optical Network Technologies
  • Privacy-Preserving Technologies in Data
  • Interconnection Networks and Systems
  • Advanced Memory and Neural Computing
  • Network Security and Intrusion Detection
  • Cloud Computing and Remote Desktop Technologies
  • Vehicular Ad Hoc Networks (VANETs)
  • Peer-to-Peer Network Technologies
  • Cryptography and Data Security
  • Mobile Agent-Based Network Management
  • Text and Document Classification Technologies

Beihang University
2011-2023

Institute of Software
2010-2023

Hebei Science and Technology Department
2010-2012

10.1016/j.jisa.2022.103201 article EN Journal of Information Security and Applications 2022-05-16

Dynamic Graph Neural Networks (DGNNs) have been widely applied in various real-life applications, such as link prediction and pandemic forecast, to capture both static structural information temporal characteristics from dynamic graphs. Combining time-dependent -independent components, DGNNs manifest substantial parallel computation data reuse potentials, but suffer severe memory access inefficiency transfer overhead under the canonical one-graph-at-a-time training pattern. To tackle these...

10.1145/3572848.3577487 preprint EN 2023-02-21

With the increase in size and number of shared risk link groups (SRLGs) optical wavelength-division multiplexing (WDM) networks, capacity efficiency shared-path protection becomes much poorer due to SRLG-disjoint constraint, thus blocking probability higher. Furthermore, severe traps caused by SRLGs, it more difficult find an backup path with trap avoidance within reasonable computational complexity. As a result, mesh WDM network large SRLGs or SRLG size, 100% failure is no longer practical...

10.1364/jocn.3.000739 article EN Journal of Optical Communications and Networking 2011-08-29

The Controller Area Network (CAN) has been widely used in the automotive and industrial automation for over two decades. However, due to lack of security mechanisms, CAN is vulnerable attacks. In this paper, we propose a novel protection scheme called CANeleon. It can defend against smart attacker who might inject malicious frames with legitimate frame IDs, which cannot be mitigated by existing countermeasures. Inspired idea moving target defense technologies, CANeleon equips each node...

10.1109/tvt.2020.2990417 article EN IEEE Transactions on Vehicular Technology 2020-04-28

Today, virtualization technique is increasingly mature and prevalent in server consolidation HPC. Virtual machine monitor plays a significant role the resource management by dynamically mapping virtual CPUs of machines to physical according chosen scheduling policy. However, since lacks insight into each machine, unpredictability workload makes effective allocation difficult. Particularly, current policy has critical impact on performance concurrent due non-synchronization CPUs. This paper...

10.1145/1774088.1774126 article EN 2010-03-22

As multi-core processors become increasingly mainstream, architects have likewise more interested in how best to make use of the computing capacity CPU, for instance, through multiple simultaneous threads or processes execution with OpenMP MPI. At same time, mature and prevailing virtualization technique server consolidation HPC promotes emergence a large number virtual SMP servers. Therefore, whether parallel program can run machine environment efficiently not is topic concern. In this...

10.1109/npc.2009.22 article EN 2009-10-01

GPUs have been becoming an indispensable computing platform in data centers, and co-locating multiple applications on the same GPU is widely used to improve resource utilization. However, performance interference due uncontrolled contention severely degrades of fails deliver satisfactory user experience. In this paper, we present SMGuard, a software approach flexibly manage usage under co-location. We also propose capacity based model CapSM, which provisions resources fine-grained...

10.1109/tpds.2018.2848621 article EN IEEE Transactions on Parallel and Distributed Systems 2018-06-19

10.1016/j.jisa.2023.103475 article EN Journal of Information Security and Applications 2023-03-23

The recent emergence of low-power high-throughput programmable storage platforms-SmartNIC JBOF (just-a-bunch-of-flash)-motivates us to rethink the cluster architecture and system stack for energy-efficient large-scale data-intensive workloads. Unlike conventional systems that use an array server JBOFs or embedded nodes, introduction SmartNIC has drastically changed compute, memory, I/O configurations. Such extremely imbalanced makes prior design philosophies techniques either ineffective invalid.

10.1145/3603269.3604880 article EN 2023-09-01

Memory access latency continues to be a dominant bottleneck in large class of applications on modern architectures. To optimize memory performance, it is important utilize the locality hierarchy. Data layout optimization can significantly improve locality. However, pinpointing inefficient code and providing insightful guidance for data challenging. Existing tools typically leverage heavyweight instrumentations, which hinders applicability these real long-running programs. address this issue,...

10.1109/tpds.2018.2840992 article EN publisher-specific-oa IEEE Transactions on Parallel and Distributed Systems 2018-05-28

In a (t, n) threshold secret sharing scheme, any t- out-of-n participants could recover the shared secret, and less than t get nothing about secret. Most of existing schemes are not flexible enough for fixed threshold. this paper, new dynamic scheme was proposed, which is based on bilinear maps. The basic idea as follows: system consisted some dealer. Each participant holds only one permanent private key. dealer responsible to choose construct linear equations by using 'public keys. realized...

10.1109/icppw.2007.10 article EN 2007-09-01

In this paper, we study the impact of shared risk link group (SRLG) failures on shared-path protection by examining percentage connections that are vulnerable after SRLG failures, investigate benefits backup reprovisioning and evaluate different policies for reprovisioning. Compared with single-link leave many more unprotected to next make network topology much sparser. The major challenge is how find SRLG-disjoint paths those a recovery ratio as high possible within reasonable computational...

10.1364/jocn.2.000587 article EN Journal of Optical Communications and Networking 2010-07-23

Virtualization provides an effective management in server consolidation. The transparence enables different kinds of servers running the same platform, making full use hardware resource. However, virtualization introduces two-level schedulers: one from Guest OS, where tasks are scheduled to virtual CPUs (VCPUs), other machine monitor (VMM), VCPUs CPUs. As a result, lower level scheduler is ignorant task information so that it cannot allocate appropriate proportion CPU resource for every OS...

10.1109/cloudcom.2010.51 article EN 2010-11-01

With DNN turning into the backbone of AI cloud services and propelling emergence INFerence-as-a-Service (INFaaS), DNN-specific accelerators have become indispensable components inference systems. Due to conservative "one-task-at-a-time" working mode deadline blindness those accelerators, implementing multi-tenancy that aims improve cost-effectiveness meet SLA requirements is intractable. Recent studies including temporal spatial approaches, employ manifold scheduling mechanisms sophisticated...

10.1109/tpds.2023.3276759 article EN IEEE Transactions on Parallel and Distributed Systems 2023-05-16

In the process of network operation, a large number alerts are generated every day, which reflect occurrence some abnormal conditions. Traditional methods depend too much on knowledge equipment manufacturers and industry experts, so we need novel ways to overcome this problem in management. The application data mining technology alarm pattern analysis has become focus current research. Researchers developed many kinds algorithms fitting different characteristics. This paper proposes concept...

10.1145/3242102.3242130 article EN 2018-10-25

Due to the broad attack surface and lack of runtime protection, potential safety security threats hinder real-life adoption autonomous vehicles. Although efforts have been made mitigate some specific attacks, there are few works on protection self-driving system. This paper presents a decentralized self-protection framework called Guardauto protect system against threats. First, proposes an isolation model decouple isolate its components with set partitions. Second, provides mechanisms for...

10.1109/tc.2020.3018329 article EN IEEE Transactions on Computers 2020-01-01

It is the requirement of next generation communication systems that devices should provide all existing and future services in integral way. After implementation 3G technology, smart now support text, voice video on device. With Wi-Fi technology low cost available market, users can enjoy even free with any one around world. If these technologies are brought together, result would be a large Distribute Wireless multimedia Network. This research work proposes such distributed wireless VoIP...

10.1109/mue.2007.37 article EN 2007-04-01

System dependability and real-time requirement have been receiving widespread attention in modern computer systems. Fault-tolerant scheduling provides a method of combining timing requirements faults tolerance for This paper presents preliminary study building fault-tolerant mechanism seL4 microkernel. seL4, as the first formally-verified operating system kernel world, is an ideal platform security-critical However, lack policy reduces its reliability user experience. We implemented basic...

10.1109/hpcc-smartcity-dss.2016.0104 article EN 2016-12-01

Modern Graphic Processing Units (GPUs) have become pervasive computing devices in datacenters due to their high performance with massive thread level parallelism (TLP). GPUs are equipped large register files (RF) support fast context switch between threads and scratchpad memory (SPM) inter-thread communication within the cooperative array (CTA). However, TLP of is usually limited by inefficient resource management file memory. This inefficiency also leads underutilization. To overcome above...

10.1145/3280849 article EN ACM Transactions on Architecture and Code Optimization 2018-11-16

10.1016/j.future.2010.12.009 article EN Future Generation Computer Systems 2010-12-31

Embedded virtualization systems become increasingly important in the light of mobile computing era. Current OKL4 technology has overcome some limitations plain by introducing microkernel approach but also imposes several concerns including incomplete IPC (Inter-Process Communication). With this mind, paper a novel asynchronous communication mechanism to optimize original is proposed. The able effectively deal with concurrent requests between any virtual machines (VMs) generating multiple...

10.1109/hpcc-smartcity-dss.2017.78 article EN 2017-12-01
Coming Soon ...