skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Wang, Han"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Cloud computing has become crucial for the commercial world due to its computational capacity, storage capabilities, scalability, software integration, and billing convenience. Initially, clouds were relatively homogeneous, but now diverse machine configurations in heterogeneous clouds are recognized for their improved application performance and energy efficiency. This shift is driven by the integration of various hardware to accommodate diverse user applications. However, alongside these advancements, security threats like micro-architectural attacks are increasing concerns for cloud providers and users. Studies like Repttack and Cloak & Co-locate highlight the vulnerability of heterogeneous clouds to co-location attacks, where attacker and victim instances are placed together. The ease of these attacks isn’t solely linked to heterogeneity but also correlates with how heterogeneous the target systems are. Despite this, no numerical metrics exist to quantify cloud heterogeneity. This article introduces the Heterogeneity Score (HeteroScore) to evaluate server setups and instances. HeteroScore significantly correlates with co-location attack security. The article also proposes strategies to balance diversity and security. This study pioneers the quantitative analysis connecting cloud heterogeneity and infrastructure security. 
    more » « less
    Free, publicly-accessible full text available November 30, 2026
  2. Free, publicly-accessible full text available December 1, 2026
  3. Free, publicly-accessible full text available September 8, 2026
  4. Ocean turbulence at meso- and submesocales affects the propagation of surface waves through refraction and scattering, inducing spatial modulations in significant wave height (SWH). We develop a theoretical framework that relates these modulations to the current that induces them. We exploit the asymptotic smallness of the ratio of typical current speed to wave group speed to derive a linear map – the U2H map – between surface current velocity and SWH anomaly. The U2H map is a convolution, non-local in space, expressible as a product in Fourier space by a factor independent of the magnitude of the wavenumber vector. Analytic expressions of the U2H map show how the SWH responds differently to the vortical and divergent parts of the current, and how the anisotropy of the wave spectrum is key to large current-induced SWH anomalies. We implement the U2H map numerically and test its predictions against WAVEWATCH III numerical simulations for both idealised and realistic current configurations. 
    more » « less
    Free, publicly-accessible full text available February 25, 2026
  5. Free, publicly-accessible full text available June 1, 2026
  6. Free, publicly-accessible full text available April 24, 2026
  7. Free, publicly-accessible full text available January 1, 2026
  8. Free, publicly-accessible full text available December 3, 2025
  9. Free, publicly-accessible full text available December 2, 2025