Skip to main content

Showing 1–4 of 4 results for author: Poh, G

.
  1. arXiv:2404.13264  [pdf

    physics.space-ph astro-ph.EP physics.plasm-ph

    MESSENGER observations of Mercury's planetary ion escape rates and their dependence on true anomaly angle

    Authors: Weijie Sun, Ryan M. Dewey, Xianzhe Jia, Jim M. Raines, James A. Slavin, Yuxi Chen, Tai Phan, Gangkai Poh, Shaosui Xu, Anna Milillo, Robert Lillis, Yoshifumi Saito, Stefano Livi, Stefano Orsini

    Abstract: This study investigates the escape of Mercury's sodium-group ions (Na+-group, including ions with m/q from 21 to 30 amu/e) and their dependence on true anomaly angle (TAA), i.e., Mercury's orbital phase around the Sun, using measurements from MESSENGER. The measurements are categorized into solar wind, magnetosheath, and magnetosphere, and further divided into four TAA intervals. Na+-group ions fo… ▽ More

    Submitted 20 April, 2024; originally announced April 2024.

    Comments: 21 pages, 4 figures

    Journal ref: Geophysical Research Letters, 51, e2023GL107689 (2024)

  2. arXiv:2403.06143  [pdf, other

    cs.CR cs.AI

    Fluent: Round-efficient Secure Aggregation for Private Federated Learning

    Authors: Xincheng Li, Jianting Ning, Geong Sen Poh, Leo Yu Zhang, Xinchun Yin, Tianwei Zhang

    Abstract: Federated learning (FL) facilitates collaborative training of machine learning models among a large number of clients while safeguarding the privacy of their local datasets. However, FL remains susceptible to vulnerabilities such as privacy inference and inversion attacks. Single-server secure aggregation schemes were proposed to address these threats. Nonetheless, they encounter practical constra… ▽ More

    Submitted 10 March, 2024; originally announced March 2024.

  3. arXiv:2101.04338  [pdf, other

    cs.CR cs.NI

    A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes

    Authors: Geong Sen Poh, Dinil Mon Divakaran, Hoon Wei Lim, Jianting Ning, Achintya Desai

    Abstract: Middleboxes in a computer network system inspect and analyse network traffic to detect malicious communications, monitor system performance and provide operational services. However, encrypted traffic hinders the ability of middleboxes to perform such services. A common practice in addressing this issue is by employing a "Man-in-the-Middle" (MitM) approach, wherein an encrypted traffic flow betwee… ▽ More

    Submitted 12 January, 2021; originally announced January 2021.

    Comments: 17 pages, 8 figures, 2 tables

  4. arXiv:1512.06980  [pdf

    astro-ph.EP physics.space-ph

    Cassini in situ observations of long-duration magnetic reconnection in Saturn's magnetotail

    Authors: Christopher S. Arridge, Jonathan P. Eastwood, Caitriona M. Jackman, Gang-Kai Poh, James A. Slavin, Michelle F. Thomsen, Nicolas André, Xianzhe Jia, Ariah Kidder, Laurent Lamy, Aikaterina Radioti, Dan B. Reisenfeld, Nick Sergis, Martin Volwerk, Andrew P. Walsh, Philippe Zarka, Andrew J. Coates, Michele K. Dougherty

    Abstract: Magnetic reconnection is a fundamental process in solar system and astrophysical plasmas, through which stored magnetic energy associated with current sheets is converted into thermal, kinetic and wave energy. Magnetic reconnection is also thought to be a key process involved in shedding internally produced plasma from the giant magnetospheres at Jupiter and Saturn through topological reconfigurat… ▽ More

    Submitted 22 December, 2015; originally announced December 2015.

    Comments: Initially submitted version (submitted 24 March 2015), published online in Nature Physics 30 November 2015