no code implementations • 18 Sep 2023 • André Storhaug, Jingyue Li, Tianyuan Hu
We then auto-completed the 176 SCs again and found that our approach could identify 62% of the code to be generated as vulnerable and avoid generating 67% of them, indicating the approach could efficiently and effectively avoid vulnerabilities in the auto-completed code.
no code implementations • 8 Jun 2023 • Carl Smestad, Jingyue Li
With the arising concerns of privacy within machine learning, federated learning (FL) was invented in 2017, in which the clients, such as mobile devices, train a model and send the update to the centralized server.
no code implementations • 4 Mar 2021 • Henrik Knudsen, Jakob Svennevik Notland, Peter Halland Haro, Truls Bakkejord Ræder, Jingyue Li
Blockchain technologies originate from cryptocurrencies.
Performance Computational Complexity Distributed, Parallel, and Cluster Computing
no code implementations • 5 Oct 2019 • Jin Zhang, Jingyue Li
Objective: With the increase in studies on the T&V of NN-based control software in safety-critical domains, it is important to systematically review the state-of-the-art T&V methodologies, to classify approaches and tools that are invented, and to identify challenges and gaps for future studies.