Skip to main content

Showing 1–5 of 5 results for author: Xuan, B

Searching in archive cs. Search in all archives.
.
  1. A Bayesian multiscale CNN framework to predict local stress fields in structures with microscale features

    Authors: Vasilis Krokos, Viet Bui Xuan, Stéphane P. A. Bordas, Philippe Young, Pierre Kerfriden

    Abstract: Multiscale computational modelling is challenging due to the high computational cost of direct numerical simulation by finite elements. To address this issue, concurrent multiscale methods use the solution of cheaper macroscale surrogates as boundary conditions to microscale sliding windows. The microscale problems remain a numerically challenging operation both in terms of implementation and cost… ▽ More

    Submitted 19 January, 2022; v1 submitted 17 December, 2020; originally announced December 2020.

    Comments: 50 pages, 42 figures; corrected typos; clarifications

  2. arXiv:2005.14124  [pdf, other

    cs.SE cs.CR cs.LG

    Active Fuzzing for Testing and Securing Cyber-Physical Systems

    Authors: Yuqi Chen, Bohan Xuan, Christopher M. Poskitt, Jun Sun, Fan Zhang

    Abstract: Cyber-physical systems (CPSs) in critical infrastructure face a pervasive threat from attackers, motivating research into a variety of countermeasures for securing them. Assessing the effectiveness of these countermeasures is challenging, however, as realistic benchmarks of attacks are difficult to manually construct, blindly testing is ineffective due to the enormous search spaces and resource re… ▽ More

    Submitted 16 July, 2020; v1 submitted 28 May, 2020; originally announced May 2020.

    Comments: Accepted by the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2020)

    Journal ref: In Proc. ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2020), pages 14-26. ACM, 2020

  3. arXiv:2005.03915  [pdf, other

    cs.CR cs.LG

    Defending Model Inversion and Membership Inference Attacks via Prediction Purification

    Authors: Ziqi Yang, Bin Shao, Bohan Xuan, Ee-Chien Chang, Fan Zhang

    Abstract: Neural networks are susceptible to data inference attacks such as the model inversion attack and the membership inference attack, where the attacker could infer the reconstruction and the membership of a data sample from the confidence scores predicted by the target classifier. In this paper, we propose a unified approach, namely purification framework, to defend data inference attacks. It purifie… ▽ More

    Submitted 20 August, 2020; v1 submitted 8 May, 2020; originally announced May 2020.

    Comments: updated experiments and results

  4. arXiv:1709.09152  [pdf, other

    cs.DM

    Local Structure Theorems for Erdos Renyi Graphs and their Algorithmic Application

    Authors: Jan Dreier, Philipp Kuinke, Ba Le Xuan, Peter Rossmanith

    Abstract: We analyze some local properties of sparse Erdos-Renyi graphs, where $d(n)/n$ is the edge probability. In particular we study the behavior of very short paths. For $d(n)=n^{o(1)}$ we show that $G(n,d(n)/n)$ has asymptotically almost surely (a.a.s.~) bounded local treewidth and therefore is a.a.s.~nowhere dense. We also discover a new and simpler proof that $G(n,d/n)$ has a.a.s.~bounded expansion f… ▽ More

    Submitted 25 January, 2018; v1 submitted 26 September, 2017; originally announced September 2017.

  5. Homogeneity vs. Adjacency: generalising some graph decomposition algorithms

    Authors: Binh Minh Bui Xuan, Michel Habib, Vincent Limouzy, Fabien De Montgolfier

    Abstract: In this paper, a new general decomposition theory inspired from modular graph decomposition is presented. Our main result shows that, within this general theory, most of the nice algorithmic tools developed for modular decomposition are still efficient. This theory not only unifies the usual modular decomposition generalisations such as modular decomposition of directed graphs or decomposition o… ▽ More

    Submitted 13 March, 2006; originally announced March 2006.

    Comments: soumis à WG 2006

    ACM Class: G.2.2

    Journal ref: Graph-Theoretic Concepts in Computer Science Springer (Ed.) (22/06/2006) 278-288