2025
Break Adhesion: Triple adaptive-parsing for weakly supervised instance segmentation.
Neural Networks, 2025
Log anomaly detection and diagnosis method based on deep learning.
Int. J. Data Min. Bioinform., 2025
Active localization learning for weakly supervised instance segmentation.
Expert Syst. Appl., 2025
2024
RE-Specter: Examining the Architectural Features of Configurable CNN With Power Side-Channel.
,
,
,
,
,
,
,
,
,
,
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., October, 2024
Remote Sensing Images Secure Distribution Scheme Based on Deep Information Hiding.
Remote. Sens., April, 2024
Electrical Fault Diagnosis From Text Data: A Supervised Sentence Embedding Combined With Imbalanced Classification.
IEEE Trans. Ind. Electron., March, 2024
Rational-quadratic kernel-based maximum correntropy Kalman filter for the non-Gaussian noises.
J. Frankl. Inst., 2024
LUT Level Information Flow Tracking for FPGA Design Security Verification.
Proceedings of the 2024 IEEE Global Communications Conference, 2024
2023
Pareto Frequency-Aware Power Side-Channel Countermeasure Exploration on CNN Systolic Array.
IEEE Trans. Circuits Syst. II Express Briefs, March, 2023
An information asset priority evaluation method with analytic network process.
Inf. Serv. Use, 2023
Electrical Fault Diagnosis via Text Mining: A Weakly-Supervised Learning Model.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Verifying RISC-V Privilege Transition Integrity Through Symbolic Execution.
Proceedings of the 32nd IEEE Asian Test Symposium, 2023
2022
A Points-to-Sensitive Model Checker for C Programs in IoT Firmware.
IEEE Internet Things J., 2022
Counterexample-guided Spatial Flow Model Checking Methods for C Code.
Int. J. Softw. Informatics, 2022
2021
Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective.
Secur. Commun. Networks, 2021
A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models.
Secur. Commun. Networks, 2021
Improving high-impact bug report prediction with combination of interactive machine learning and active learning.
Inf. Softw. Technol., 2021
DouBiGRU-A: Software defect detection algorithm based on attention mechanism and double BiGRU.
Comput. Secur., 2021
Accelerating hardware security verification and vulnerability detection through state space reduction.
Comput. Secur., 2021
2020
Hardware Trojan Attack in Embedded Memory.
ACM J. Emerg. Technol. Comput. Syst., October, 2020
Online multi-person tracking assist by high-performance detection.
J. Supercomput., 2020
Memory-Based High-Level Synthesis Optimizations Security Exploration on the Power Side-Channel.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
Invalid bug reports complicate the software aging situation.
Softw. Qual. J., 2020
Machine-Learning-Based Side-Channel Leakage Detection in Electronic System-Level Synthesis.
IEEE Netw., 2020
CVE-assisted large-scale security bug report dataset construction method.
J. Syst. Softw., 2020
A formal model for proving hardware timing properties and identifying timing channels.
Integr., 2020
Improving the Security of Wireless Network Through Cross-project Security Issue Prediction.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020
2019
Constrained Unscented Particle Filter for SINS/GNSS/ADS Integrated Airship Navigation in the Presence of Wind Field Disturbance.
Sensors, 2019
Type Synthesis of Multi-Loop Spatial Mechanisms With Three Translational Output Parameters Based on Virtual-Loop Theory and Assur Groups.
Robotica, 2019
Theorem proof based gate level information flow tracking for hardware security verification.
Comput. Secur., 2019
UTCPredictor: An uncertainty-aware novel teaching cases predictor.
Comput. Appl. Eng. Educ., 2019
Consensus-Based Multi-Person Decision Making Using Consistency Fuzzy Preference Graphs.
IEEE Access, 2019
Personalized QoS Prediction for Service Recommendation With a Service-Oriented Tensor Model.
IEEE Access, 2019
2018
Trusted Authority Assisted Three-Factor Authentication and Key Agreement Protocol for the Implantable Medical System.
Wirel. Commun. Mob. Comput., 2018
Quantitative Analysis of Timing Channel Security in Cryptographic Hardware Design.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018
A Strap-Down Inertial Navigation/Spectrum Red-Shift/Star Sensor (SINS/SRS/SS) Autonomous Integrated System for Spacecraft Navigation.
Sensors, 2018
Visual tracking based on stacked Denoising Autoencoder network with genetic algorithm optimization.
Multim. Tools Appl., 2018
Unix Domain Sockets Applied in Android Malware Should Not Be Ignored.
Inf., 2018
Symbolic execution based test-patterns generation algorithm for hardware Trojan detection.
Comput. Secur., 2018
A LSTM Based Model for Personalized Context-Aware Citation Recommendation.
IEEE Access, 2018
Towards Quantified Data Analysis of Information Flow Tracking for Secure System Design.
IEEE Access, 2018
Query-Focused Personalized Citation Recommendation With Mutually Reinforced Ranking.
IEEE Access, 2018
Expede Herculem: Learning Multi Labels From Single Label.
IEEE Access, 2018
CoDetect: Financial Fraud Detection With Anomaly Feature Detection.
IEEE Access, 2018
Next-App Prediction by Fusing Semantic Information With Sequential Behavior.
IEEE Access, 2018
Property Based Formal Security Verification for Hardware Trojan Detection.
Proceedings of the 3rd IEEE International Verification and Security Workshop, 2018
Examining the consequences of high-level synthesis optimizations on power side-channel.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018
Security Path Verification Through Joint Information Flow Analysis.
Proceedings of the 2018 IEEE Asia Pacific Conference on Circuits and Systems, 2018
2017
基于局部高度与Mean Shift的三维模型信息隐藏算法 (Information Hiding Scheme for 3D Models Based on Local Height and Mean Shift Clustering Analysis).
计算机科学, 2017
Multi-document summarization based on sentence cluster using non-negative matrix factorization.
J. Intell. Fuzzy Syst., 2017
Word-sentence co-ranking for automatic extractive text summarization.
Expert Syst. Appl., 2017
Exploiting Fine-Grained Co-Authorship for Personalized Citation Recommendation.
IEEE Access, 2017
A Simplifying Logic Approach for Gate Level Information Flow Tracking.
Proceedings of the Communications and Networking, 2017
2016
Generating optimized gate level information flow tracking logic for enforcing multilevel security.
Autom. Control. Comput. Sci., 2016
Random Time Delay Effect on Out-of-Sequence Measurements.
IEEE Access, 2016
Imprecise security: quality and complexity tradeoffs for hardware information flow tracking.
Proceedings of the 35th International Conference on Computer-Aided Design, 2016
A Scalable Cloud-Based Android App Repackaging Detection Framework.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016
2015
基于GPU加速的定向凝固相场模拟计算研究 (GPU Application on the Phase-field Simulation).
计算机科学, 2015
Quantifying Timing-Based Information Flow in Cryptographic Hardware.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2015
Cloud Service Recommendation: State of the Art and Research Challenges.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015
2014
Gate-Level Information Flow Tracking for Security Lattices.
ACM Trans. Design Autom. Electr. Syst., 2014
A bottom-up approach to verifiable embedded system information flow security.
IET Inf. Secur., 2014
Energy-efficient border intrusion detection using wireless sensors network.
EURASIP J. Wirel. Commun. Netw., 2014
A novel approach for analysing collective dynamics of large-scale multi-robot system in task allocation.
Proceedings of the IEEE International Conference on Information and Automation, 2014
Labor division for swarm robotic systems with arbitrary finite number of task types.
Proceedings of the IEEE International Conference on Information and Automation, 2014
2013
Expanding Gate Level Information Flow Tracking for Multilevel Security.
IEEE Embed. Syst. Lett., 2013
Towards a Moderate-Granularity Incremental Clustering Algorithm for GPU.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013
Improvements the Seccomp Sandbox Based on PBE Theory.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
2012
On the Complexity of Generating Gate Level Information Flow Tracking Logic.
IEEE Trans. Inf. Forensics Secur., 2012
A GPU-accelerated Approximate Algorithm for Incremental Learning of Gaussian Mixture Model.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012
Simultaneous information flow security and circuit redundancy in Boolean gates.
Proceedings of the 2012 IEEE/ACM International Conference on Computer-Aided Design, 2012
2011
Theoretical Fundamentals of Gate Level Information Flow Tracking.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2011
A QoS Control Approach in Differentiated Web Caching Service.
J. Networks, 2011
The Research of QoS Approach in Web Servers.
Int. J. Comput. Commun. Control, 2011
QoS Guarantee in Tomcat Web Server: A Feedback Control Approach.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011
2009
Geocast Routing in Urban Vehicular Ad Hoc Networks.
Proceedings of the Computer and Information Science 2009 [outstanding papers from the 8th ACIS/IEEE International Conference on Computer and Information Science, 2009
An efficient and fair explicit congestion control protocol for high bandwidth-delay product networks.
Comput. Commun., 2009
A Hybrid Differential Evolution for Numerical Optimization.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009
2008
Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application Servers.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008
Feedback Control-Based QoS Guarantees in Web Application Servers.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008
Performance Evaluation of Real-Time Video over Wireless Ad Hoc Networks.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008
An Efficient Hybrid Hierarchical Document Clustering Method.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008
A Cluster Based Stable Multicast Routing Protocol in Ad Hoc Network.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
2007
A new type of parallel finger mechanism.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007
2006
A new node organization mechanism of a campus Grid and performance analysis.
Concurr. Comput. Pract. Exp., 2006
Bandwidth-Aware Multipath Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Document Clustering Method Based on Frequent Co-occurring Words.
Proceedings of the 20st Pacific Asia Conference on Language, Information and Computation, 2006
2004
Nodes' Organization Mechanisms on Campus Grid Services Environment.
Proceedings of the Grid and Cooperative Computing, 2004
Content Distribution Stochastic Fluid Models for Multi-regions P2P Networks.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
Construct Campus Peer-to-Peer Networks.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
1995
Comments on "Multiphase systolic algorithms for spectral decomposition" [and reply].
IEEE Trans. Signal Process., 1995