2025
Workload variation compensation optimization of ring oscillator temperature measurement method and its application in field-programmable gate array.
Microelectron. J., 2025
PV-YOLO: A lightweight pedestrian and vehicle detection model based on improved YOLOv8.
Digit. Signal Process., 2025
2024
Focused section on advances in robotics and artificial intelligence for minimally invasive surgery.
Int. J. Intell. Robotics Appl., December, 2024
A Variable Stiffness Spherical Joint Motor by Magnetic Energy Shaping.
IEEE Trans. Robotics, 2024
A Trap Characterization System for GaN HEMTs Based on Transient Drain Voltage.
IEEE Trans. Instrum. Meas., 2024
Remote Sensing Images Destriping via Nonconvex Regularization and Fast Regional Decomposition.
IEEE Trans. Geosci. Remote. Sens., 2024
Automatic in-situ measurement of thermal resistance for GaN HEMTs.
Microelectron. J., 2024
2023
Tactile Sensing for Soft Robotic Manipulators in 50 MPa Hydrostatic Pressure Environments.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Adv. Intell. Syst., December, 2023
Regulation and Tracking Control of Omnidirectional Rotation for Spherical Motors.
IEEE Trans. Ind. Electron., 2023
A numerical calibration of structure-function transient thermal measurement based on Cauer RC network.
Microelectron. J., 2023
2022
An Enhanced Image Patch Tensor Decompostion for Infrared Small Target Detection.
Remote. Sens., December, 2022
Spherical Wrist With Hybrid Motion-Impedance Control for Enhanced Robotic Manipulations.
IEEE Trans. Robotics, 2022
Remote sensing images destriping with an enhanced low-rank prior and total variation regulation.
Signal Image Video Process., 2022
AFINet: Attentive Feature Integration Networks for image classification.
Neural Networks, 2022
GSL4Rec: Session-based Recommendations with Collective Graph Structure Learning and Next Interaction Prediction.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
ACE: A Coarse-to-Fine Learning Framework for Reliable Representation Learning Against Label Noise.
Proceedings of the International Joint Conference on Neural Networks, 2022
Contrastive Multi-view Hyperbolic Hierarchical Clustering.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Energy Gradient Descent Method for Actuation of a Direct-Drive Spherical Robotic Wrist.
Proceedings of the Intelligent Robotics and Applications - 15th International Conference, 2022
Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models with Transferred Evolutionary Strategies.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
Uncertainty-Aware Learning against Label Noise on Imbalanced Datasets.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
Domain adaptation with feature and label adversarial networks.
Neurocomputing, 2021
MultiFace: A generic training mechanism for boosting face recognition performance.
Neurocomputing, 2021
Introduction to the focused section on new trends in modelling and simulation for intelligent robotics.
Int. J. Intell. Robotics Appl., 2021
AFINet: Attentive Feature Integration Networks for Image Classification.
CoRR, 2021
MultiFace: A Generic Training Mechanism for Boosting Face Recognition Performance.
CoRR, 2021
Why Attentions May Not Be Interpretable?
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
2020
Relation-Guided Representation Learning.
Neural Networks, 2020
Distributed current source modeling method for 3D eddy current problem in magnetic conductor with discrete state-space J-<i>φ</i> formulation.
J. Comput. Phys., 2020
Reliable Evaluations for Natural Language Inference based on a Unified Cross-dataset Benchmark.
CoRR, 2020
Domain Agnostic Learning for Unbiased Authentication.
CoRR, 2020
Hybrid Differentially Private Federated Learning on Vertically Partitioned Data.
CoRR, 2020
A Federated Multi-View Deep Learning Framework for Privacy-Preserving Recommendations.
CoRR, 2020
Why is Attention Not So Attentive?
CoRR, 2020
CSRN: Collaborative Sequential Recommendation Networks for News Retrieval.
CoRR, 2020
Read, Attend, and Exclude: Multi-Choice Reading Comprehension by Mimicking Human Reasoning Process.
Proceedings of the 43rd International ACM SIGIR conference on research and development in Information Retrieval, 2020
Multi-Level Multimodal Transformer Network for Multimodal Recipe Comprehension.
Proceedings of the 43rd International ACM SIGIR conference on research and development in Information Retrieval, 2020
Fisher Deep Domain Adaptation.
Proceedings of the 2020 SIAM International Conference on Data Mining, 2020
Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020
General-Purpose User Embeddings based on Mobile App Usage.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020
Adversarial Infidelity Learning for Model Interpretation.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020
Demographics Should Not Be the Reason of Toxicity: Mitigating Discrimination in Text Classifications with Instance Weighting.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020
2019
Multiparameter Eddy-Current Sensor Design for Conductivity Estimation and Simultaneous Distance and Thickness Measurements.
IEEE Trans. Ind. Informatics, 2019
Mitigating Annotation Artifacts in Natural Language Inference Datasets to Improve Cross-dataset Generalization Ability.
CoRR, 2019
Scale Matters: Temporal Scale Aggregation Network for Precise Action Localization in Untrimmed Videos.
CoRR, 2019
A Novel Definition of Equivalent Uniform Dose Based on Volume Dose Curve.
IEEE Access, 2019
Improving Open-Domain Dialogue Systems via Multi-Turn Incomplete Utterance Restoration.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019
Additive Adversarial Learning for Unbiased Authentication.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019
State-space Model and Analysis of Motion-induced Eddy-current based on Distributed Current Source Method.
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2019
Selection Bias Explorations and Debias Methods for Natural Language Sentence Matching Datasets.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019
Compressing Recurrent Neural Networks with Tensor Ring for Action Recognition.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
Crowdsourcing for Mobile Networks and IoT.
Wirel. Commun. Mob. Comput., 2018
Design and Development of a Spherical Motor for Conformal Printing of Curved Electronics.
IEEE Trans. Ind. Electron., 2018
Inverse Models and Harmonics Compensation for Suppressing Torque Ripples of Multiphase Permanent Magnet Motor.
IEEE Trans. Ind. Electron., 2018
Soft human-machine interfaces: design, sensing and stimulation.
,
,
,
,
,
,
,
,
,
,
,
Int. J. Intell. Robotics Appl., 2018
Emotion-Aware Cognitive System in Multi-Channel Cognitive Radio Ad Hoc Networks.
IEEE Commun. Mag., 2018
Structured Inference for Recurrent Hidden Semi-markov Model.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
Improving Reinforcement Learning Based Image Captioning with Natural Language Prior.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018
Distributed Parameter Element Method for Design Analysis of Electrical Muscle Stimulation.
Proceedings of the 2018 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2018
2017
MeDJ: Multidimensional Emotion-aware Music Delivery for Adolescent.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017
2016
Automation and orchestration framework for large-scale enterprise cloud migration.
IBM J. Res. Dev., 2016
Patch similarity based edge-preserving background estimation for single frame infrared small target detection.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016
Identifying resources for cloud garbage collection.
Proceedings of the 12th International Conference on Network and Service Management, 2016
Design of a compliant knee-motion actuator for lower extremity exoskeletons.
Proceedings of the IEEE International Conference on Advanced Intelligent Mechatronics, 2016
2015
Automated business application discovery.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Analytical development of a minimum bearing reaction twin-motor for duplex machining.
Proceedings of the IEEE International Conference on Advanced Intelligent Mechatronics, 2015
2014
Improving readiness for enterprise migration to the cloud.
Proceedings of the Middleware Industry Track, Bordeaux, France, December 8-12, 2014, 2014
You Are How You Touch: User Verification on Smartphones via Tapping Behaviors.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014
Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization.
Proceedings of the Computer Security - ESORICS 2014, 2014
Thermal field modeling algorithm based on flexible space division for high-power, high-precision mechatronic systems.
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2014
2013
What to discover before migrating to the cloud.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Magnetic field model for direct field-feedback control of a permanent magnet spherical motor.
Proceedings of the 2013 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2013
MyCloud: supporting user-configured privacy protection in cloud computing.
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
A Novel Method for Modeling RFID Data.
J. Softw., 2012
A two-mode six-DOF motion system based on a ball-joint-like spherical motor for haptic applications.
Comput. Math. Appl., 2012
TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Improving Cloud Survivability through Dependency based Virtual Machine Placement.
Proceedings of the SECRYPT 2012, 2012
Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds.
Proceedings of the Information Security and Privacy Research, 2012
2011
Context-Related Access Control for Mobile Caching.
Proceedings of the Security and Privacy in Communication Networks, 2011
An Efficient Pre-processing Method to Identify Logical Components from PDF Documents.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2011
Direct field-feedback control for multi-DOF spherical actuators.
Proceedings of the IEEE International Conference on Robotics and Automation, 2011
A Table Detection Method for Multipage PDF Documents via Visual Seperators and Tabular Structures.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011
2010
Cross-Layer Damage Assessment for Cyber Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Magnetic field-based sensing method for spherical joint.
Proceedings of the IEEE International Conference on Robotics and Automation, 2010
Slosh suppression by robust input shaping.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010
2009
Magnetic dipoles for electromagnetic multi-DOF actuator design.
Proceedings of the 2009 IEEE International Conference on Robotics and Automation, 2009
Improving the Table Boundary Detection in PDFs by Fixing the Sequence Error of the Sparse Lines.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009
A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems.
Proceedings of the EDBT 2009, 2009
2008
Research on T-bridge Algorithm of Web Session Fuzzy Clustering.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
A Fine-Grained Damage Management Scheme in a Self-Healing PostgreSQL System.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008
TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead.
Proceedings of the Computer Security, 2008
Real-time data pre-processing technique for efficient feature extraction in large scale datasets.
Proceedings of the 17th ACM Conference on Information and Knowledge Management, 2008
A light weighted damage tracking quarantine and recovery scheme for mission-critical database systems.
Proceedings of the 17th ACM Conference on Information and Knowledge Management, 2008
2007
Automatic Extraction of Table Metadata from Digital Documents.
Bull. IEEE Tech. Comm. Digit. Libr., 2007
Automatic searching of tables in digital libraries.
Proceedings of the 16th International Conference on World Wide Web, 2007
TableSeer: automatic table metadata extraction and searching in digital libraries.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2007
Searching for Tables in Digital Documents.
Proceedings of the 9th International Conference on Document Analysis and Recognition (ICDAR 2007), 2007
TableRank: A Ranking Algorithm for Table Search and Retrieval.
Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, 2007
2006
Modeling of pollution in p2p file sharing systems.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006
Towards Database Firewall: Mining the Damage Spreading Patterns.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
Towards Database Firewalls.
Proceedings of the Data and Applications Security XIX, 2005