Works Published in 2024

search works

Displaying all 15 works

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2024 journal article

Analysis of Coding Gain Due to In-Loop Reshaping

IEEE TRANSACTIONS ON IMAGE PROCESSING, 33, 3765–3777.

author keywords: Videos; Image coding; Standards; Quantization (signal); Video coding; Video codecs; Transforms; In-loop reshaping; out-of-loop reshaping; quantization; video compression; VVC/H.266
Sources: Web Of Science, NC State University Libraries
Added: July 1, 2024

2024 article

Salus: Efficient Security Support for CXL-Expanded GPU Memory

2024 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA 2024, pp. 233–248.

By: R. Abdullah n, H. Lee n, H. Zhou n & A. Awad n

UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: July 1, 2024

2024 article

Inclusion, Diversity, Equity and Access: Online Teaching Strategies and Institutional Support

Oyarzun, B., Martin, F., Howell, C. D., & Miller, R. A. (2024, June 22). AMERICAN JOURNAL OF DISTANCE EDUCATION, Vol. 6.

UN Sustainable Development Goal Categories
10. Reduced Inequalities (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: July 1, 2024

2024 conference paper

VFCFinder: Pairing Security Advisories and Patches

Dunlap, T., Lin, E., Enck, W., & Reaves, B. (2024, July).

By: T. Dunlap, E. Lin, W. Enck & B. Reaves

Source: ORCID
Added: July 1, 2024

2024 conference paper

Examining Cryptography and Randomness Failures in Open-Source Cellular Cores

English, K. V., Bennett, N., Thorn, S., Butler, K. R. B., Enck, W., & Traynor, P. (2024, June 19).

By: K. English, N. Bennett, S. Thorn, K. Butler, W. Enck & P. Traynor

Source: ORCID
Added: June 15, 2024

2024 journal article

A Survey on Software Vulnerability Exploitability Assessment

ACM COMPUTING SURVEYS, 56(8).

By: S. Elder n, M. Rahman n, G. Fringer n, K. Kapoor n & L. Williams n

author keywords: Exploitability; software vulnerability
Source: Web Of Science
Added: June 11, 2024

2024 article

Development and validation of the online learner satisfaction instrument

Bolliger, D. U., Martin, F., & Kim, S. (2024, June 5). ETR&D-EDUCATIONAL TECHNOLOGY RESEARCH AND DEVELOPMENT, Vol. 6.

By: D. Bolliger, F. Martin & S. Kim

author keywords: Online learning; Learner satisfaction; Learner comfort; Confirmatory factor analysis; Multiple-indicators multiple-causes models; Instrument validation
Sources: ORCID, Web Of Science, NC State University Libraries
Added: June 8, 2024

2024 conference paper

Decomposing and Measuring Trust in Open-Source Software Supply Chains

Boughton, L., Miller, C., Acar, Y., Wermke, D., & Kästner, C. (2024, April 14).

Source: ORCID
Added: June 1, 2024

2024 article

The Efficacy of Artificial Intelligence-Enabled Adaptive Learning Systems From 2010 to 2022 on Learner Outcomes: A Meta-Analysis

Wang, X., Huang, R. T., Sommer, M., Pei, B., Shidfar, P., Rehman, M. S., … Martin, F. (2024, May 15). JOURNAL OF EDUCATIONAL COMPUTING RESEARCH, Vol. 5.

By: X. Wang*, R. Huang*, M. Sommer*, B. Pei*, P. Shidfar*, M. Rehman*, A. Ritzhaupt*, F. Martin n

author keywords: adaptive learning; adaptive source; adaptive target; adaptive engine; meta-analysis
Sources: Web Of Science, NC State University Libraries
Added: May 28, 2024

2024 conference paper

5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions

Thorn, S., English, K. V., Butler, K. R. B., & Enck, W. (2024, May 27).

Source: ORCID
Added: May 22, 2024

2024 conference paper

GRASP: Hardening Serverless Applications through Graph Reachability Analysis of Security Policies

Polinsky, I., Datta, P., Bates, A., & Enck, W. (2024, May 13).

Source: ORCID
Added: May 15, 2024

2024 conference paper

Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter

Schmüser, J., Ramulu, H. S., Wöhler, N., Stransky, C., Bensmann, F., Dimitrov, D., … Fahl, S. (2024, May 11).

Source: ORCID
Added: May 15, 2024

2024 journal article

Narrowing the Software Supply Chain Attack Vectors: The SSDF Is Wonderful but not Enough

IEEE SECURITY & PRIVACY, 22(2), 4–7.

By: L. Williams n

Source: Web Of Science
Added: April 22, 2024

2024 article

Leaking secrets in homomorphic encryption with side-channel attacks

Aydin, F., & Aysu, A. (2024, January 12). JOURNAL OF CRYPTOGRAPHIC ENGINEERING.

By: F. Aydin n & A. Aysu n

author keywords: Homomorphic encryption; SEAL; Number theoretic transform; Compiler optimizations; Side-channel attacks; Machine learning
TL;DR: This article demonstrates side-channel leakages of the Microsoft SEAL HE library and proposes two attacks that can steal encryption keys during the key generation phase by abusing the leakage of ternary value assignments that occurs during the number theoretic transform (NTT) algorithm. (via Semantic Scholar)
Source: Web Of Science
Added: January 29, 2024

2024 journal article

PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage

IEEE Transactions on Dependable and Secure Computing.

By: Y. Lee*, H. Chen*, W. Enck n, H. Vijayakumar*, N. Li*, Z. Qian*, G. Petracca*, T. Jaeger*

UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: ORCID
Added: January 2, 2024

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.