• Publications
  • Influence
Stealing Machine Learning Models via Prediction APIs
Simple, efficient attacks are shown that extract target ML models with near-perfect fidelity for popular model classes including logistic regression, neural networks, and decision trees against the online services of BigML and Amazon Machine Learning. Expand
Deep Convolutional Neural Networks for Hyperspectral Image Classification
Experimental results based on several hyperspectral image data sets demonstrate that the proposed method can achieve better classification performance than some traditional methods, such as support vector machines and the conventional deep learning-based methods. Expand
Hyperspectral Image Classification Using Deep Pixel-Pair Features
Experimental results based on several hyperspectral image data sets demonstrate that the proposed pixel-pair method can achieve better classification performance than the conventional deep learning-based method. Expand
PALB2 Functionally Connects the Breast Cancer Susceptibility Proteins BRCA1 and BRCA2
It is shown that PALB2 physically and functionally connects BRCA1 and BRCa2 into a DNA damage response network that also includes the RAD51 recombinase, and that this link has important implications for the genesis of breast/ovarian cancer and for chemotherapy with DNA interstrand cross-linking agents. Expand
Town Crier: An Authenticated Data Feed for Smart Contracts
An authenticated data feed system called Town Crier is presented, which acts as a bridge between smart contracts and existing web sites, which are already commonly trusted for non-blockchain applications and defines and proves its basic security properties in the Universal Composibility (UC) framework. Expand
Image Quality Assessment by Separately Evaluating Detail Losses and Additive Impairments
This paper proposes two simple quality measures to correlate detail losses and additive impairments with visual quality, respectively and demonstrates that the proposed metric has a better or similar performance in matching subjective ratings when compared with the state-of-the-art image quality metrics. Expand
The biogeochemistry of inorganic carbon and nutrients in the Pearl River estuary and the adjacent Northern South China Sea
The Zhu-jiang (Pearl River) estuary and its adjacent continental shelf in the Northern South China Sea (SCS) is unique in that its drainage basin is located entirely in a subtropical zone with heavyExpand
REM: Resource-Efficient Mining for Blockchains
REM (Resource-Efficient Mining), a new blockchain mining framework that uses trusted hardware (Intel SGX), achieves security guarantees similar to PoW, but leverages the partially decentralized trust model inherent in SGX to achieve a fraction of the waste of PoW. Expand
Processor voltage scheduling for real-time tasks with non-preemptible sections
  • F. Zhang, S. Chanson
  • Computer Science
  • 23rd IEEE Real-Time Systems Symposium, . RTSS .
  • 3 December 2002
Simulation results show that the two dynamic algorithms can reduce processor energy consumption by up to 80 percent over the static speed scheme. Expand
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts
Ekiden is presented, a system that addresses critical gaps by combining blockchains with Trusted Execution Environments (TEEs), enabling efficient TEE-backed confidentiality-preserving smart-contracts and high scalability. Expand