Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Improving Adversarial Robustness of 3D Point Cloud Classification Models

    3D point cloud classification models based on deep neural networks were proven to be vulnerable to adversarial examples, with a quantity of novel attack techniques proposed by researchers recently. It is of pa...

    Guanlin Li, Guowen Xu, Han Qiu, Ruan He, Jiwei Li in Computer Vision – ECCV 2022 (2022)

  2. No Access

    Article

    Model Uncertainty Based Annotation Error Fixing for Web Attack Detection

    Deep learning (DL) techniques have been widely used in web attack detection domain. With the stronger ability to fit data, DL models are also more sensitive to the training data, annotation errors can mislead ...

    **nyu Gong, Jialiang Lu, Yuefu Zhou, Han Qiu in Journal of Signal Processing Systems (2021)

  3. Chapter and Conference Paper

    SDAC: A New Software-Defined Access Control Paradigm for Cloud-Based Systems

    A cloud-based system usually runs in multiple geographically distributed datacenters, making the deployment of effective access control models extremely challenging. This paper presents a novel software-define...

    Ruan He, Montida Pattaranantakul, Zonghua Zhang in Information and Communications Security (2018)

  4. Chapter and Conference Paper

    Towards a Software-Defined Security Framework for Supporting Distributed Cloud

    Cloud computing provides new facilities for building elaborated services hosted through various infrastructures over the Internet. In the meantime, these ones pose new important challenges in terms of security...

    Maxime Compastié, Rémi Badonnel in Security of Networks and Services in an Al… (2017)

  5. No Access

    Chapter and Conference Paper

    A DSL for Specifying Autonomic Security Management Strategies

    Existing self-protection frameworks so far hardly addressed the specification of autonomic security adaptation strategies which guide risk-aware selection or reconfiguration of security mechanisms. Domain-Specifi...

    Ruan He, Marc Lacoste, Jacques Pulou in Data Privacy Management and Autonomous Spo… (2011)

  6. No Access

    Article

    A component-based policy-neutral architecture for kernel-level access control

    Protection should fundamentally be flexible for devices roaming in Beyond 3G networks. In this federation of heterogeneous access networks, each sub-network comes with its own security requirements, policies, ...

    Marc Lacoste, Tahar Jarboui, Ruan He in annals of telecommunications - annales des… (2009)

  7. No Access

    Chapter and Conference Paper

    Brief Announcement: An OS Architecture for Device Self-protection

    By introducing context-awareness in the system layer, pervasive computing is a turning point in OS design. Device mobility and dynamicity of situations raise strong challenges for run-time adaptability of embe...

    Ruan He, Marc Lacoste, Jean Leneutre in Stabilization, Safety, and Security of Dis… (2009)