no code implementations • CVPR 2022 • Zirui Peng, Shaofeng Li, Guoxing Chen, Cheng Zhang, Haojin Zhu, Minhui Xue
In this paper, we propose a novel and practical mechanism which enables the service provider to verify whether a suspect model is stolen from the victim model via model extraction attacks.
no code implementations • 5 Oct 2021 • Guoxing Chen, Wei-Chyung Wang
Second, combining the network predictions with the weather-model forecasts significantly improves the accuracy of model forecasts, especially for heavy-precipitation events.
no code implementations • 25 Feb 2018 • Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten H. Lai
Particularly, we show that when branch prediction of the enclave code can be influenced by programs outside the enclave, the control flow of the enclave program can be temporarily altered to execute instructions that lead to observable cache-state changes.
Cryptography and Security
no code implementations • 11 Jan 2015 • Jihun Hamm, Adam Champion, Guoxing Chen, Mikhail Belkin, Dong Xuan
Smart devices with built-in sensors, computational capabilities, and network connectivity have become increasingly pervasive.