1 code implementation • 11 Dec 2023 • Yuyang Zhou, Guang Cheng, Zongyao Chen, Shui Yu
Experimental results on two Android malware datasets demonstrate that MalPurifier outperforms the state-of-the-art defenses, and it significantly strengthens the vulnerable malware detector against 37 evasion attacks, achieving accuracies over 90. 91%.
no code implementations • 16 Oct 2023 • Heyuan Yao, Zhenhua Song, Yuyang Zhou, Tenglong Ao, Baoquan Chen, Libin Liu
In this work, we present MoConVQ, a novel unified framework for physics-based motion control leveraging scalable discrete representations.
no code implementations • 22 Aug 2022 • Yuyang Zhou, Yinghua Wang, Yuxiao Li, Jialing Huang, Jie Huang, Cheng-Xiang Wang
With the proposed iterative precise algorithm, error of angle of departure (AOD) and angle of arrival (AOA) is below 0. 01 degree.
no code implementations • 2 Apr 2019 • Yuyang Zhou, Guang Cheng, Shanqing Jiang, Mian Dai
Intrusion detection system (IDS) is one of extensively used techniques in a network topology to safeguard the integrity and availability of sensitive assets in the protected systems.