2025
A transformer-based adversarial network framework for steganography.
Expert Syst. Appl., 2025
2024
Proformer: a hybrid macaron transformer model predicts expression values from promoter sequences.
BMC Bioinform., December, 2024
Fake User Detection Based on Multi-Model Joint Representation.
Inf., May, 2024
Research on Blockchain Transaction Privacy Protection Methods Based on Deep Learning.
Future Internet, April, 2024
Nonlinear speed-tracking control with overcurrent protection for uncertain permanent magnet synchronous motor systems.
Trans. Inst. Meas. Control, February, 2024
Adaptive Neural Asymptotic Tracking Control for PMSM Systems Under Current Constraints and Unknown Dynamics.
IEEE Trans. Circuits Syst. II Express Briefs, February, 2024
GPU Accelerated Full Homomorphic Encryption Cryptosystem, Library, and Applications for IoT Systems.
IEEE Internet Things J., February, 2024
A New Method for Identifying Influential Spreaders in Complex Networks.
Comput. J., January, 2024
XMAM:X-raying models with a matrix to reveal backdoor attacks for federated learning.
Digit. Commun. Networks, 2024
SpeechPrune: Context-aware Token Pruning for Speech Information Retrieval.
CoRR, 2024
Sufficient Context: A New Lens on Retrieval Augmented Generation Systems.
CoRR, 2024
CoreInfer: Accelerating Large Language Model Inference with Semantics-Inspired Adaptive Sparse Activation.
CoRR, 2024
Federated Large Language Models: Current Progress and Future Directions.
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2024
MLLM-FL: Multimodal Large Language Model Assisted Federated Learning on Heterogeneous and Long-tailed Data.
CoRR, 2024
ARTIST: Improving the Generation of Text-rich Images by Disentanglement.
CoRR, 2024
Can't say cant? Measuring and Reasoning of Dark Jargons in Large Language Models.
CoRR, 2024
Assessing Cybersecurity Vulnerabilities in Code Large Language Models.
CoRR, 2024
Min-K%++: Improved Baseline for Detecting Pre-Training Data from Large Language Models.
CoRR, 2024
Privacy Policy Compliance in Miniapps: An Analytical Study.
Proceedings of the ACM Workshop on Secure and Trustworthy Superapps, SaTS 2024, 2024
SLED: Self Logits Evolution Decoding for Improving Factuality in Large Language Models.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
Towards Building The Federatedgpt: Federated Instruction Tuning.
Proceedings of the IEEE International Conference on Acoustics, 2024
Unlocking the Potential of Federated Learning: The Symphony of Dataset Distillation via Deep Generative Latents.
Proceedings of the Computer Vision - ECCV 2024, 2024
2023
SAFTE: A self-injection based anti-fuzzing technique.
Comput. Electr. Eng., November, 2023
PriRPT: Practical blockchain-based privacy-preserving reporting system with rewards.
J. Syst. Archit., October, 2023
MAD-YOLO: A quantitative detection algorithm for dense small-scale marine benthos.
Ecol. Informatics, July, 2023
LST-EMG-Net: Long short-term transformer feature fusion network for sEMG gesture recognition.
Frontiers Neurorobotics, June, 2023
Differentiable Logic Machines.
Trans. Mach. Learn. Res., 2023
DACBERT: Leveraging Dependency Agreement for Cost-Efficient Bert Pretraining.
CoRR, 2023
Ethical Considerations and Policy Implications for Large Language Models: Guiding Responsible Development and Deployment.
CoRR, 2023
Towards Building the Federated GPT: Federated Instruction Tuning.
CoRR, 2023
MGCN: Medical Relation Extraction Based on GCN.
Comput. Informatics, 2023
Be like a Chameleon: Protect Traffic Privacy with Mimicry.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
ADC-Bank: Detecting Acoustic Out-of-Band Signal Injection on Inertial Sensors.
Proceedings of the Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023
Systematic Analysis of Security and Vulnerabilities in Miniapps.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023
Fed-CBS: A Heterogeneity-Aware Client Sampling Mechanism for Federated Learning via Class-Imbalance Reduction.
Proceedings of the International Conference on Machine Learning, 2023
An Ultrasonic Sensor Transformation Attack Scheme Based on Phoneme Modification.
Proceedings of the 4th International Conference on Artificial Intelligence and Computer Engineering, 2023
A Small Leak Will Sink Many Ships: Vulnerabilities Related to mini-programs Permissions.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
ReAugKD: Retrieval-Augmented Knowledge Distillation For Pre-trained Language Models.
,
,
,
,
,
,
,
,
,
,
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), 2023
2022
Detection and Analysis Ads Through the Mini-Programs: Mini-Program, Advertising, Malicious Advertisement Detection, Ads Ecosystem Analysis, Android.
Int. J. Interdiscip. Telecommun. Netw., 2022
WINNER: A network biology tool for biomolecular characterization and prioritization.
Frontiers Big Data, 2022
YoloXT: A object detection algorithm for marine benthos.
Ecol. Informatics, 2022
XMAM: X-raying Models with A Matrix to Reveal Backdoor Attacks for Federated Learning.
CoRR, 2022
Rethinking Normalization Methods in Federated Learning.
CoRR, 2022
FADE: Enabling Large-Scale Federated Adversarial Training on Resource-Constrained Edge Devices.
CoRR, 2022
A Small Leak Will Sink Many Ships: Vulnerabilities Related to Mini Programs Permissions.
CoRR, 2022
GAN-based Medical Image Small Region Forgery Detection via a Two-Stage Cascade Framework.
CoRR, 2022
SWTRU: Star-shaped Window Transformer Reinforced U-Net for medical image segmentation.
Comput. Biol. Medicine, 2022
Intelligent Annotation Algorithm Based on Deep-Sea Macrobenthic Images.
Comput. Informatics, 2022
Ultrannel: Ultrasound based Covert Communication Channel.
Proceedings of the IEEE Smartworld, 2022
Why do We Need Large Batchsizes in Contrastive Learning? A Gradient-Bias Perspective.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Three-Stage Salient Object Detection based on Integrated Priors.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2022
Join-Chain Network: A Logical Reasoning View of the Multi-head Attention in Transformer.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2022
Next Generation Federated Learning for Edge Devices: An Overview.
Proceedings of the 8th IEEE International Conference on Collaboration and Internet Computing, 2022
2021
A Malicious URL Detection Model Based on Convolutional Neural Network.
Secur. Commun. Networks, 2021
LIDDE: A differential evolution algorithm based on local-influence-descending search strategy for influence maximization in social networks.
J. Netw. Comput. Appl., 2021
User behavior prediction via heterogeneous information in social networks.
Inf. Sci., 2021
Identifying Influential Nodes in Complex Networks Based on Neighborhood Entropy Centrality.
Comput. J., 2021
Ranking influential nodes in complex networks based on local and global structures.
Appl. Intell., 2021
Mobile Device Fingerprint Identification Using Gyroscope Resonance.
IEEE Access, 2021
FLOP: Federated Learning on Medical Datasets using Partial Networks.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
Safe Distributional Reinforcement Learning.
Proceedings of the Distributed Artificial Intelligence - Third International Conference, 2021
Towards Fair Federated Learning With Zero-Shot Data Augmentation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2021
Automated Mapping of Real-world Oncology Laboratory Data to LOINC.
Proceedings of the AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021, 2021
2020
Nonlinear Motion Control of Complicated Dual Rotary Crane Systems Without Velocity Feedback: Design, Analysis, and Hardware Experiments.
IEEE Trans Autom. Sci. Eng., 2020
Gemini-Chain: A Regulatable Digital Currency Model based on Blockchain.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Security of Medical Cyber-physical Systems: An Empirical Study on Imaging Devices.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Variance Reduction in Stochastic Particle-Optimization Sampling.
Proceedings of the 37th International Conference on Machine Learning, 2020
Cyclical Stochastic Gradient MCMC for Bayesian Deep Learning.
Proceedings of the 8th International Conference on Learning Representations, 2020
Stochastic Particle-Optimization Sampling and the Non-Asymptotic Convergence Theory.
Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics, 2020
2019
WIPER: Weighted in-Path Edge Ranking for biomolecular association networks.
Quant. Biol., 2019
Typer vs. CAPTCHA: Private information based CAPTCHA to defend against crowdsourcing human cheating.
CoRR, 2019
No One Can Escape: A General Approach to Detect Tampered and Generated Image.
IEEE Access, 2019
Nonlinear Output Feedback Control of Flexible Rope Crane Systems With State Constraints.
IEEE Access, 2019
A Quantitative Approach for Medical Imaging Device Security Assessment.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
DGA and DNS Covert Channel Detection System based on Machine Learning.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019
Android Malware Detection Based on Convolutional Neural Networks.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019
Honeynet Construction Based on Intrusion Detection.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019
DICOM-Fuzzer: Research on DICOM Vulnerability Mining Based on Fuzzing Technology.
Proceedings of the Communications and Networking, 2019
Medical Protocol Security: DICOM Vulnerability Mining Based on Fuzzing Technology.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Self-Adversarially Learned Bayesian Sampling.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
Stochastic Particle-Optimization Sampling and the Non-Asymptotic Convergence Theory.
CoRR, 2018
Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud.
IEEE Access, 2018
A Flexible Rope Crane Control Method.
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2018
Medical Devices are at Risk: Information Security on Diagnostic Imaging System.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Design and Elementary Evaluation of a Highly-Automated Fluorescence-Based Instrument System for On-Site Detection of Food-Borne Pathogens.
Sensors, 2017
2016
URL Based Gateway Side Phishing Detection Method.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
2012
A Prior-based Transfer Learning Method for the Phishing Detection.
J. Networks, 2012
2009
Optimization and Innovation of Screw Joints of Micron-Wood-Fiber Molded Products.
Proceedings of the Growth and Development of Computer-Aided Innovation, 2009
Research on Operating Parameters and Energy Consumption of Cold Store Based on Rough Set Theory.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009
2004
A Personalized Commodities Recommendation Procedure and Algorithm Based on Association Rule Mining.
Proceedings of the Fourth International Conference on Electronic Business, 2004