Swin-Free: Achieving Better Cross-Window Attention and Efficiency with Size-varying Window.
CoRR, 2023
Depth Estimation with Simplified Transformer.
CoRR, 2022
Simultaneous learning of individual microRNA-gene interactions and regulatory comodules.
BMC Bioinform., 2021
HAWKEYE: Adversarial Example Detector for Deep Neural Networks.
CoRR, 2019
ApproxNet: Content and Contention Aware Video Analytics System for the Edge.
CoRR, 2019
Federation in genomics pipelines: techniques and challenges.
Briefings Bioinform., 2019
XSTRESSOR : Automatic Generation of Large-Scale Worst-Case Test Inputs by Inferring Path Conditions.
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019
PySE: Automatic Worst-Case Test Generation by Reinforcement Learning.
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019
TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices.
IEEE Internet Comput., 2018
VideoChef: Efficient Approximation for Streaming Video Processing Pipelines.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
Minerva: A reinforcement learning-based technique for optimal scheduling and bottleneck detection in distributed factory operations.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018
Protecting Bare-Metal Embedded Systems with Privilege Overlays.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Memory Management Scheme to Improve Utilization Efficiency and Provide Fast Contiguous Allocation without a Statically Reserved Area.
ACM Trans. Design Autom. Electr. Syst., 2015
A delay-bounded event-monitoring and adversary-identification protocol in resource-constraint sensor networks.
Ad Hoc Networks, 2013
Low-complexity secure protocols to defend cyber-physical systems against network isolation attacks.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
PRIVATUS: Wallet-Friendly Privacy Protection for Smart Meters.
Proceedings of the Computer Security - ESORICS 2012, 2012
A tale of two synchronizing clocks.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009
A novel detection criterion for weak m-ary signals and its application to ultrawideband multiple access systems.
IEEE Trans. Veh. Technol., 2005