2025
Explicit matrix gradient expression for residual network.
J. Exp. Theor. Artif. Intell., May, 2025
ERAT-DLoRA: Parameter-efficient tuning with enhanced range adaptation in time and depth aware dynamic LoRA.
Neurocomputing, 2025
MSLoRA: Meta-learned scaling for adaptive fine-tuning of LoRA.
Neurocomputing, 2025
2024
Defense against adversarial attacks based on color space transformation.
Neural Networks, 2024
2023
Collaborate to Compete: An Empirical Matching Game Under Incomplete Information in Rank-Order Tournaments.
Mark. Sci., September, 2023
Social Engineering Attack-Defense Strategies Based on Reinforcement Learning.
Comput. Syst. Sci. Eng., 2023
2022
A Hybrid PSO-BPSO Based Kernel Extreme Learning Machine Model for Intrusion Detection.
J. Inf. Process. Syst., 2022
Generative Modeling in Structural-Hankel Domain for Color Image Inpainting.
CoRR, 2022
2021
Phishing Website Detection Based on Deep Convolutional Neural Network and Random Forest Ensemble Learning.
Sensors, 2021
Generating facial expression adversarial examples based on saliency map.
Image Vis. Comput., 2021
Adv-Emotion: The Facial Expression Adversarial Attack.
Int. J. Pattern Recognit. Artif. Intell., 2021
High-dimensional Assisted Generative Model for Color Image Restoration.
CoRR, 2021
A Word-Level Method for Generating Adversarial Examples Using Whole-Sentence Information.
Proceedings of the Natural Language Processing and Chinese Computing, 2021
WordErrorSim: An Adversarial Examples Generation Method in Chinese by Erroneous Knowledge.
Proceedings of the ICCDA 2021: The 5th International Conference on Compute and Data Analysis, 2021
Neural Network Model Extraction Based on Adversarial Examples.
Proceedings of the AISS 2021: 3rd International Conference on Advanced Information Science and System, Sanya, China, November 26, 2021
2020
Graph Adaptation Network with Domain-Specific Word Alignment for Cross-Domain Relation Extraction.
Sensors, 2020
Profiting from the Decoy Effect: A Case Study of an Online Diamond Retailer.
Mark. Sci., 2020
A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection.
KSII Trans. Internet Inf. Syst., 2020
Text Classification with Lexicon from PreAttention Mechanism.
CoRR, 2020
Hierarchical Transformer Network for Utterance-level Emotion Recognition.
CoRR, 2020
A Novel Measure of Uncertainty in the Dempster-Shafer Theory.
IEEE Access, 2020
2019
Modeling and Comparisons of Aggregated Flyback Microinverters in Aspect of Harmonic Resonances With the Grid.
IEEE Trans. Ind. Electron., 2019
Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network.
Sensors, 2019
A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection.
Secur. Commun. Networks, 2019
Mobile Hailing Technology and Taxi Driving Behaviors.
Mark. Sci., 2019
Season Ticket Buyer Value and Secondary Market Options.
Mark. Sci., 2019
Diagnosis of Pulmonary Embolism by Treatment Based on Analysis of Multi-slice Spiral Ct Pulmonary Artery Images.
J. Medical Imaging Health Informatics, 2019
User Identification Using Real Environmental Human Computer Interaction Behavior.
KSII Trans. Internet Inf. Syst., 2019
User identification by keystroke dynamics using improved binary particle swarm optimisation.
Int. J. Bio Inspired Comput., 2019
A Session and Dialogue-Based Social Engineering Framework.
IEEE Access, 2019
Improving Reliability: User Authentication on Smartphones Using Keystroke Biometrics.
IEEE Access, 2019
SMOTETomek-Based Resampling for Personality Recognition.
IEEE Access, 2019
Predicting Personality Using Facebook Status Based on Semi-supervised Learning.
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019
Cross-View Adaptation Network for Cross-Domain Relation Extraction.
Proceedings of the Chinese Computational Linguistics - 18th China National Conference, 2019
2018
An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection.
Comput. J., 2018
Social Bot Detection Using Tweets Similarity.
Proceedings of the Security and Privacy in Communication Networks, 2018
2017
Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection.
Secur. Commun. Networks, 2017
Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection.
KSII Trans. Internet Inf. Syst., 2017
Fuzzy-synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets.
Int. J. Distributed Sens. Networks, 2017
Modeling and Simulation Study of Photovoltaic DC Arc Faults.
Proceedings of the Advanced Computational Methods in Energy, Power, Electric Vehicles, and Their Integration, 2017
2016
Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining.
KSII Trans. Internet Inf. Syst., 2016
Detection of command and control in advanced persistent threat based on independent access.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
The Economic Value of Online Reviews.
Mark. Sci., 2015
Matching Value and Market Design in Online Advertising Networks: An Empirical Analysis.
Mark. Sci., 2015
2013
Recoverable Video Watermark in DCT Domain.
J. Comput., 2013
2012
A Video Watermarking Algorithm of H.264/AVC for Content Authentication.
J. Networks, 2012
Multiple-File Remote Data Checking for cloud storage.
Comput. Secur., 2012
2011
Measuring the Lifetime Value of Customers Acquired from Google Search Advertising.
Mark. Sci., 2011
2009
VAOFS: A Verifiable Append-Only File System for Regulatory Compliance.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009
2008
Utility Presentation in Destination Decision System.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Research on Evaluating Urban Comprehensive Competitiveness during Multi-year and the Spatial Characters of Important Cities in China.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008