- Polymer Surface Interaction Studies
- Software Testing and Debugging Techniques
- Crystallization and Solubility Studies
- Advanced Malware Detection Techniques
- X-ray Diffraction in Crystallography
- Adhesion, Friction, and Surface Interactions
- Software Engineering Research
- Surface Modification and Superhydrophobicity
- Network Security and Intrusion Detection
- Nanofabrication and Lithography Techniques
- Force Microscopy Techniques and Applications
- Molecular Junctions and Nanostructures
- Parallel Computing and Optimization Techniques
- Software Reliability and Analysis Research
- Advanced Polymer Synthesis and Characterization
- Antibiotics Pharmacokinetics and Efficacy
- Advanced Data Storage Technologies
- Glycosylation and Glycoproteins Research
- Digital Media Forensic Detection
- Security and Verification in Computing
- Molecular Sensors and Ion Detection
- Carbohydrate Chemistry and Synthesis
- Digital and Cyber Forensics
- Crystallography and molecular interactions
- Polymer crystallization and properties
Institute of Information Engineering
2023-2024
Chinese Academy of Sciences
2022-2024
First Affiliated Hospital of Xiamen University
2024
Hong Kong University of Science and Technology
2020-2024
University of Hong Kong
2020-2024
City University of Hong Kong
2024
Dalian University of Technology
2013-2024
Tongji University
2024
Chinese Academy of Fishery Sciences
2021-2022
Shanghai Ocean University
2022
The popularity of ASR (automatic speech recognition) systems, like Google Voice, Cortana, brings in security concerns, as demonstrated by recent attacks. impacts such threats, however, are less clear, since they either stealthy (producing noise-like voice commands) or requiring the physical presence an attack device (using ultrasound). In this paper, we demonstrate that not only more practical and surreptitious attacks feasible but can even be automatically constructed. Specifically, find...
Unlike coverage-based fuzzing that gives equal attention to every part of a code, directed aims direct fuzzer specific target in the e.g., code with potential vulnerabilities. Despite much progress, we observe existing fuzzers are still not efficient as they often symbolically or concretely execute lot program paths cannot reach code. They thus waste computational resources. This paper presents BEACON, which can effectively grey-box sea provable manner. That is, assisted by lightweight...
Hybrid fuzzing, which combines the merits of both fuzzing and concolic execution, has become one most important trends in coverage-guided techniques. Despite tremendous research on hybrid fuzzers, we observe that existing techniques are still inefficient. One reason is these techniques, refer to as non-incremental cache reuse few computation results and, thus, lose many optimization opportunities. To be incremental, propose "polyhedral path abstraction", preserves exploration state execution...
We apply surface wrinkling to measure the mechanical properties of poly(2-hydroxyethyl methacrylate) polymer brush layers tethered a flexible poly(dimethylsiloxane) (PDMS) substrate. A facile modification scheme based on hydrochloric acid treatment was employed introduce hydroxyl groups PDMS, which served covalently attach initiator for subsequent polymerization. Upon compression layer instability occurs whose wavelength yields Young's modulus that is comparable corresponding in bulk....
It has long been recognized that it can be tedious and even infeasible for system administrators to figure out critical security problems residing in full attack graphs, small-sized enterprise networks. Therefore a trade-off between analysis accuracy efficiency needs made achieve reasonable balance completeness of the graph its usefulness. In this paper, we provide an approach distillation, so user control amount information presented by sifting most portion graph. The choose see only k...
Cyber threat hunting is the process of proactively and iteratively formulating validating hypotheses based on security-relevant observations domain knowledge. To facilitate tasks, this paper introduces intelligence computing as a new methodology that models discovery graph computation problem. It enables efficient programming for solving problems, equipping hunters with suite potent tools agile codifications hypotheses, automated evidence mining, interactive data inspection capabilities. A...
Android apps can hold secret strings of themselves such as cloud service credentials or encryption keys. Leakage induce unprecedented consequences like monetary losses leakage user private information. In practice, various security issues were reported because many failed to protect their secrets. However, little is known about the types, usages, exploitability, and app issues. While a large body literature has been devoted studying information leakage, there no systematic study...
The syntheses, structures, and characterization of three series one-dimensional (1D) three-dimensional (3D) 3d–4f cluster-based polymers with AA (HGly or HAla) formate as mixed ligands are described. Under the pH values 6.0 5.2, respectively, 1D undulating chains [Ln = Gd, (1); Tb, (2); Dy(3)] two 3D frameworks (4) (5)] a 3-connected pcu-h network were obtained. Both them use Gly-based heptanuclear trigonal prism [LnCu6] clusters mononuclear Ln3+ nodes linked by syn–anti ligands. Moreover,...
Large Language Models (LLMs) are emerging as transformative tools for software vulnerability detection, addressing critical challenges in the security domain. Traditional methods, such static and dynamic analysis, often falter due to inefficiencies, high false positive rates, growing complexity of modern systems. By leveraging their ability analyze code structures, identify patterns, generate repair sugges- tions, LLMs, exemplified by models like GPT, BERT, CodeBERT, present a novel scalable...
The pharmacokinetics, tissue distribution, and elimination of enrofloxacin (ENR) its metabolite ciprofloxacin (CIP) were investigated to the crucian carp (Carassius auratus gibelio) after single (20 mg/kg b. w.) multiple oral administration b.w. one time daily for 5 days) at 28°C. concentrations ENR CIP in plasma tested tissues (muscle/skin, liver, kidney) detected simultaneously by high-performance liquid chromatography (HPLC), pharmacokinetic data analyzed with a non-compartmental model...
Static analysis has been widely used in large-scale software defect detection. Despite recent advances, it is still not practical enough because requires compilation interference to obtain analyzable code. Directly translating the binary code using a lifter mitigates this practicality problem by being non-intrusive building system. However, existing lifters cannot produce precise for rigorous static even presence of debug information. In paper, we propose new Plankton together with two...
The advantages of the grafting-to approach for formation tethered polymer layers, or brushes, include construction under ambient conditions, precise control molecular weight, and dispersity. These are counterbalanced by relatively low grafting density typically achieved. We developed a method, based on segmental adsorption high solution concentration, achieving significant increases in surface attachment density. method can be used with substrates any geometry requires only minimum solution....
Memory safety sanitizers, the sharp weapon for detecting invalid memory operations during execution, employ runtime metadata to model and help find errors hidden in programs. However, location-based methods, most widely deployed sanitization methods thanks their high compatibility, face low protection density issue: number of bytes safeguarded by one is limited. As a result, numerous accesses require loading excessive metadata, leading overhead.
An investigation of the kinetics tethering amine functional-ended polystyrene from good solvent to surface a solid substrate showed three distinct regimes rather than two predicted by theory. The first regime was fast and appeared be controlled diffusion through solvent, as second slow linear in natural logarithm time, third regime, not theory, one accelerated (termed us "layer-assisted tethering"). observed for different solvents, molecular weights, temperatures, ended when saturation...
Tethering of monodisperse, chain-end-functionalized polymer from dilute solution to a solid surface shows three regimes kinetics. This paper presents support for the hypothesis that experimentally observed third regime is indeed transition mushroom brush and it occurs in spatially nonuniform manner. Both time-step snapshots generated by Monte Carlo simulation tethering process atomic force microscopy images actual surfaces during show characterized texture, while texture uniform prior after regime.
ABSTRACT This study presents an automatic batch mode (i.e., off‐line) multi‐angle light scattering (MALS) method for the molecular weight (MW) determination of ultra‐high MW (UHMW) polyacrylamide (PAM) homopolymer and acrylamide copolymers. combines a MALS detector with sample dilution injection device that automatically delivers concentration gradient from stock solution. The automation makes it practical to use routine analysis UHMW polymers. analyses series poly(sodium...
Satisfiability Modulo Theories (SMT) solvers serve as the core engine of many techniques, such symbolic execution. Therefore, ensuring robustness and correctness SMT is critical. While fuzzing an efficient effective method for validating quality solvers, we observe that prior work only focused on generating various first-order formulas inputs but neglected algorithmic configuration space solver, which leads to under-reporting deeply-hidden bugs. In this paper, present Falcon, a technique...
The self-assembly reactions of AgNO3, Ln(NO3)3 (Ln = La, Eu, and Tb), d-penicillamine (d-pen, H2L), NiCl2 (or CoCl2) lead to the formation six new compounds: (H3O)3[LnNi6Ag8L12Cl(Ac)(H2O)4](H2O)28 La (1); Eu (2); Tb (3)) (H3O)2[LnCo2Ag3L6](H2O)3 (4); (5); (6)). Single crystal X-ray analyses show that 1, 2, 3 are isomorphous have a 3D anionic framework in which nodes octahedral {Ni6Ag8S12Cl} clusters, Ln3+ ions connectors CCHCOO chains d-pen ligands. Moreover, 4, 5, 6 also isomorphous,...