Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2025JUST ACCEPTED
- research-articleJanuary 2025
Edge Data Deduplication Under Uncertainties: A Robust Optimization Approach
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 36, Issue 1Pages 84–95https://doi.org/10.1109/TPDS.2024.3493959The emergence of <italic>mobile edge computing</italic> (MEC) in distributed systems has sparked increased attention toward edge data management. A conflict arises from the disparity between limited edge resources and the continuously expanding data ...
- research-articleJanuary 2025
Ripple: Enabling Decentralized Data Deduplication at the Edge
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 36, Issue 1Pages 55–66https://doi.org/10.1109/TPDS.2024.3493953With its advantages in ensuring low data retrieval latency and reducing backhaul network traffic, edge computing is becoming a backbone solution for many latency-sensitive applications. An increasingly large number of data is being generated at the edge, ...
- research-articleJanuary 2025
EdgeHydra: Fault-Tolerant Edge Data Distribution Based on Erasure Coding
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 36, Issue 1Pages 29–42https://doi.org/10.1109/TPDS.2024.3493034In the edge computing environment, app vendors can distribute popular data from the cloud to edge servers to provide low-latency data retrieval. A key problem is how to distribute these data from the cloud to edge servers cost-effectively. Under current ...
- research-articleJanuary 2025
Remora: A Low-Latency DAG-Based BFT Through Optimistic Paths
IEEE Transactions on Computers (ITCO), Volume 74, Issue 1Pages 57–70https://doi.org/10.1109/TC.2024.3461309Standing as a foundational element within blockchain systems, the <italic>Byzantine Fault Tolerant</italic> (BFT) consensus has garnered significant attention over the past decade. The introduction of a <italic>Directed Acyclic Directed</italic> (DAG) ...
-
- research-articleDecember 2024
MalSensor: Fast and Robust Windows Malware Classification
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 34, Issue 1Article No.: 9, Pages 1–28https://doi.org/10.1145/3688833Driven by the substantial profits, the evolution of Portable Executable (PE) malware has posed persistent threats. PE malware classification has been an important research field, and numerous classification methods have been proposed. With the development ...
- research-articleDecember 2024
A Cascaded ReRAM-based Crossbar Architecture for Transformer Neural Network Acceleration
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 30, Issue 1Article No.: 10, Pages 1–23https://doi.org/10.1145/3701034Emerging resistive random-access memory (ReRAM) based processing-in-memory (PIM) accelerators have been increasingly explored in recent years because they can efficiently perform in-situ matrix-vector multiplication (MVM) operations involved in a wide ...
- research-articleDecember 2024
Fast Candidate Screening for Post-diagnosis Refinement
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 30, Issue 1Article No.: 9, Pages 1–21https://doi.org/10.1145/3698197Oftentimes fault candidates produced by logic diagnosis are too many to effectively guide the follow-on failure analysis. In this work, we propose a novel two-stage fast screening method to sift through a large of candidates in the fault callout outputted ...
- research-articleDecember 2024
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 3898–3912https://doi.org/10.1145/3658644.3690188Protecting system observability records (logs) from compromised OSs has gained significant traction in recent times, with several note-worthy approaches proposed. Unfortunately, none of the proposed approaches achieve high performance with tiny log ...
- research-articleNovember 2024JUST ACCEPTED
PRAGA: A Priority-Aware Hardware/Software Co-design for High-Throughput Graph Processing Acceleration
- Long Zheng,
- Bing Zhu,
- Pengcheng Yao,
- Yuhang Zhou,
- Chengao Pan,
- Wenju Zhao,
- Xiaofei Liao,
- Hai Jin,
- Jingling Xue
ACM Transactions on Architecture and Code Optimization (TACO), Just Accepted https://doi.org/10.1145/3701998Graph processing is pivotal in deriving insights from complex data structures but faces performance limitations due to the irregular nature of graphs. Traditional general-purpose processors often struggle with low instruction-level parallelism and energy ...
- research-articleNovember 2024
Soft-GNN: towards robust graph neural networks via self-adaptive data utilization
Frontiers of Computer Science: Selected Publications from Chinese Universities (FCS), Volume 19, Issue 4https://doi.org/10.1007/s11704-024-3575-5AbstractGraph neural networks (GNNs) have gained traction and have been applied to various graph-based data analysis tasks due to their high performance. However, a major concern is their robustness, particularly when faced with graph data that has been ...
- research-articleNovember 2024
System log isolation for containers
Frontiers of Computer Science: Selected Publications from Chinese Universities (FCS), Volume 19, Issue 5https://doi.org/10.1007/s11704-024-2568-8AbstractContainer-based virtualization is increasingly popular in cloud computing due to its efficiency and flexibility. Isolation is a fundamental property of containers and weak isolation could cause significant performance degradation and security ...
- research-articleNovember 2024
PMGraph: Accelerating Concurrent Graph Queries over Streaming Graphs
- Fubing Mao,
- Xu Liu,
- Yu Zhang,
- Haikun Liu,
- Xiaofei Liao,
- Hai Jin,
- Wei Zhang,
- Jian Zhou,
- Yufei Wu,
- Longyu Nie,
- Yapu Guo,
- Zihan Jiang,
- Jingkang Liu
ACM Transactions on Architecture and Code Optimization (TACO), Volume 21, Issue 4Article No.: 88, Pages 1–25https://doi.org/10.1145/3689337There are usually a large number of concurrent graph queries (CGQs) requirements in streaming graphs. However, existing graph processing systems mainly optimize a single graph query in streaming graphs or CGQs in static graphs. They have a large number of ...
- research-articleNovember 2024JUST ACCEPTED
RT-GNN: Accelerating Sparse Graph Neural Networks by Tensor-CUDA Kernel Fusion
ACM Transactions on Architecture and Code Optimization (TACO), Just Accepted https://doi.org/10.1145/3702001Graph Neural Networks (GNNs) have achieved remarkable successes in various graph-based learning tasks, thanks to their ability to leverage advanced GPUs. However, GNNs currently face challenges arising from the concurrent use of advanced Tensor Cores (TCs)...
- research-articleNovember 2024JUST ACCEPTED
ApSpGEMM: Accelerating Large-scale SpGEMM with Heterogeneous Collaboration and Adaptive Panel
ACM Transactions on Architecture and Code Optimization (TACO), Just Accepted https://doi.org/10.1145/3703352The Sparse General Matrix-Matrix multiplication (SpGEMM) is a fundamental component for many applications, such as algebraic multigrid methods (AMG), graphic processing, and deep learning. However, the unbearable latency of computing high-dimensional, ...
- research-articleNovember 2024JUST ACCEPTED
An Efficient ReRAM-based Accelerator for Asynchronous Iterative Graph Processing
- Jin Zhao,
- Yu Zhang,
- Donghao He,
- Qikun Li,
- Weihang Yin,
- Hui Yu,
- Hao Qi,
- Xiaofei Liao,
- Hai Jin,
- Haikun Liu,
- Linchen Yu,
- Zhang Zhan
ACM Transactions on Architecture and Code Optimization (TACO), Just Accepted https://doi.org/10.1145/3689335Graph processing has become a central concern for many real-world applications and is well-known for its low compute-to-communication ratios and poor data locality. By integrating computing logic into memory, resistive random access memory (ReRAM) tackles ...
- research-articleOctober 2024JUST ACCEPTED
DTAP: Accelerating Strongly-Typed Programs with Data Type-Aware Hardware Prefetching
- Yingshuai Dong,
- Chencheng Ye,
- Haikun Liu,
- Liting Tang,
- Xiaofei Liao,
- Hai Jin,
- Cheng Chen,
- Yanjiang Li,
- Yi Wang
ACM Transactions on Architecture and Code Optimization (TACO), Just Accepted https://doi.org/10.1145/3701994Queries on linked data structures, such as trees and graphs, often suffer from frequent cache misses and significant performance loss due to dependent and random pointer-chasing memory accesses. In this paper, we propose a software-hardware co-designed ...
- research-articleOctober 2024
Towards Stricter Black-box Integrity Verification of Deep Neural Network Models
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 9875–9884https://doi.org/10.1145/3664647.3681691Cloud-based machine learning services offer significant advantages but also introduce the risk of tampering with cloud-deployed deep neural network (DNN) models. Black-box integrity verification (BIV) allows model owners and end-users to determine if a ...
- research-articleOctober 2024
How Does Code Optimization Impact Third-party Library Detection for Android Applications?
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 1919–1931https://doi.org/10.1145/3691620.3695554Android applications (apps) widely use third-party libraries (TPLs) to reuse functionalities and simplify the development process. Unfortunately, these TPLs often suffer from vulnerabilities that attackers can exploit, leading to catastrophic ...
- research-articleOctober 2024
Towards Understanding the Effectiveness of Large Language Models on Directed Test Input Generation
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 1408–1420https://doi.org/10.1145/3691620.3695513Automatic testing has garnered significant attention and success over the past few decades. Techniques such as unit testing and coverage-guided fuzzing have revealed numerous critical software bugs and vulnerabilities. However, a long-standing, ...