2025
Active Learning-Based Backtracking Attack Against Source Location Privacy of Cyber-Physical System.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2025
ICCG: low-cost and efficient consistency with adaptive synchronization for metadata replication.
Frontiers Comput. Sci., January, 2025
Differentially Private Distance Query with Asymmetric Noise.
CoRR, January, 2025
Population Aware Diffusion for Time Series Generation.
CoRR, January, 2025
2024
Propagation Structure Fusion for Rumor Detection Based on Node-Level Contrastive Learning.
IEEE Trans. Neural Networks Learn. Syst., December, 2024
Early prediction of sudden cardiac death risk with Nested LSTM based on electrocardiogram sequential features.
BMC Medical Informatics Decis. Mak., December, 2024
Tensor-Based Joint Symbol Detection, User Localization and Tracking for THz Systems With Dual-Wideband Effects.
IEEE Trans. Veh. Technol., November, 2024
An online ensemble classification algorithm for multi-class imbalanced data stream.
Knowl. Inf. Syst., November, 2024
A Large-Scale Node Lightweight Consensus Algorithm of Blockchain for Internet of Things.
IEEE Internet Things J., November, 2024
Concept drift detection methods based on different weighting strategies.
Int. J. Mach. Learn. Cybern., October, 2024
Minimizing the cost of periodically replicated systems via model and quantitative analysis.
Frontiers Comput. Sci., October, 2024
Tensor Decompositions for Integrated Sensing and Communications.
IEEE Commun. Mag., September, 2024
ReDas: A Lightweight Architecture for Supporting Fine-Grained Reshaping and Multiple Dataflows on Systolic Array.
IEEE Trans. Computers, August, 2024
Dancing with the sound in edge computing environments.
Wirel. Networks, July, 2024
Prediction Method for Dynamic Subsidence Basin in Mining Area Based on SBAS-InSAR and Time Function.
Remote. Sens., June, 2024
An Enhanced Authentication and Key Agreement Protocol for Smart Grid Communication.
IEEE Internet Things J., June, 2024
ATA-Cache: Contention Mitigation for GPU Shared L1 Cache With Aggregated Tag Array.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., May, 2024
Mining Top-K constrained cross-level high-utility itemsets over data streams.
Knowl. Inf. Syst., May, 2024
Efficient and Secure Blockchain Consensus Algorithm for Heterogeneous Industrial Internet of Things Nodes Based on Double-DAG.
IEEE Trans. Ind. Informatics, April, 2024
Online active learning method for multi-class imbalanced data stream.
Knowl. Inf. Syst., April, 2024
Adaptive Quality Control With Uncertainty for a Pharmaceutical Cyber-Physical System Based on Data and Knowledge Integration.
IEEE Trans. Ind. Informatics, March, 2024
Disperse Asymmetric Subspace Relation Hashing for Cross-Modal Retrieval.
IEEE Trans. Circuits Syst. Video Technol., January, 2024
Channel Parameter Estimation and Location Sensing in mmWave Systems Under Phase Noise via Nested PARAFAC Analysis.
IEEE Trans. Signal Process., 2024
Dual-View Curricular Optimal Transport for Cross-Lingual Cross-Modal Retrieval.
IEEE Trans. Image Process., 2024
Scalable Universal Adversarial Watermark Defending Against Facial Forgery.
IEEE Trans. Inf. Forensics Secur., 2024
Smart Contract Assisted Privacy-Preserving Data Aggregation and Management Scheme for Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2024
DMSPS: Dynamically mixed soft pseudo-label supervision for scribble-supervised medical image segmentation.
Medical Image Anal., 2024
Dynamic computation scheduling for hybrid energy mobile edge computing networks.
J. Syst. Archit., 2024
High utility itemsets mining based on hybrid harris hawk optimization and beluga whale optimization algorithms.
J. Intell. Fuzzy Syst., 2024
A novel device placement approach based on position-aware subgraph neural networks.
Neurocomputing, 2024
Game theory attack pricing for mining pools in blockchain-based IoT.
Digit. Commun. Networks, 2024
CopyrightMeter: Revisiting Copyright Protection in Text-to-image Models.
,
,
,
,
,
,
,
,
,
,
CoRR, 2024
GenTel-Safe: A Unified Benchmark and Shielding Framework for Defending Against Prompt Injection Attacks.
CoRR, 2024
FP-VEC: Fingerprinting Large Language Models via Efficient Vector Addition.
CoRR, 2024
Figure it Out: Analyzing-based Jailbreak Attack on Large Language Models.
CoRR, 2024
Debatrix: Multi-dimensinal Debate Judge with Iterative Chronological Analysis Based on LLM.
CoRR, 2024
A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective.
,
,
,
,
,
,
,
,
,
,
CoRR, 2024
E-SAGE: Explainability-Based Defense Against Backdoor Attacks on Graph Neural Networks.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024
Stress Detection Using Multimodal Physiological Signals With Machine Learning From Wearable Devices.
Proceedings of the IEEE Symposium on Computers and Communications, 2024
BitNN: A Bit-Serial Accelerator for K-Nearest Neighbor Search in Point Clouds.
Proceedings of the 51st ACM/IEEE Annual International Symposium on Computer Architecture, 2024
Design and Kinematics Characteristic Analysis of a 3-PURU/S Photoelectric Stabilized Platform.
Proceedings of the Intelligent Robotics and Applications - 17th International Conference, 2024
Super-Resolution-Based Change Detection Network with Self-attention for Images with Different Resolutions.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Multi-Objective Forward Reasoning and Multi-Reward Backward Refinement for Product Review Summarization.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024
FuseFPS: Accelerating Farthest Point Sampling with Fusing KD-tree Construction for Point Clouds.
Proceedings of the 29th Asia and South Pacific Design Automation Conference, 2024
The Application of Blockchain Technology in the Area of Satellite Remote Sensing Data.
Proceedings of the 12th International Conference on Agro-Geoinformatics, 2024
Debatrix: Multi-dimensional Debate Judge with Iterative Chronological Analysis Based on LLM.
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
Efficient Sparse Bayesian Channel Estimation for Near-Field Ultra-Scale Massive MIMO Systems.
IEEE Wirel. Commun. Lett., December, 2023
Event-Triggered Positive Filter Design for Positive Polynomial Fuzzy Systems via Premise Integration and Membership-Function-Dependent Methods.
IEEE Trans. Fuzzy Syst., November, 2023
QuickFPS: Architecture and Algorithm Co-Design for Farthest Point Sampling in Large-Scale Point Clouds.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., November, 2023
A survey of high utility sequential patterns mining methods.
J. Intell. Fuzzy Syst., November, 2023
A novel Jinnan individual cattle recognition approach based on mutual attention learning scheme.
Expert Syst. Appl., November, 2023
Lightweight zero-knowledge authentication scheme for IoT embedded devices.
Comput. Networks, November, 2023
High utility pattern mining algorithm over data streams using ext-list.
Appl. Intell., November, 2023
A Weighted Ensemble Classification Algorithm Based on Nearest Neighbors for Multi-Label Data Stream.
ACM Trans. Knowl. Discov. Data, June, 2023
Hybrid Beamforming With Sub-Connected Structure for MmWave Massive Multi-User MIMO Relay Systems.
IEEE Trans. Green Commun. Netw., June, 2023
FCHM-stream: fast closed high utility itemsets mining over data streams.
Knowl. Inf. Syst., June, 2023
Mining closed high utility patterns with negative utility in dynamic databases.
Appl. Intell., May, 2023
Prevention method of block withholding attack based on miners' mining behavior in blockchain.
Appl. Intell., May, 2023
A multi-level weighted concept drift detection method.
J. Supercomput., March, 2023
A survey of multi-label classification based on supervised and semi-supervised learning.
Int. J. Mach. Learn. Cybern., March, 2023
Dynamic ensemble selection classification algorithm based on window over imbalanced drift data stream.
Knowl. Inf. Syst., March, 2023
An efficient algorithm for mining closed high utility itemsets over data streams with one dataset scan.
Knowl. Inf. Syst., January, 2023
TSML: A New Pig Behavior Recognition Method Based on Two-Stream Mutual Learning Network.
Sensors, 2023
A survey of multi-class imbalanced data classification methods.
J. Intell. Fuzzy Syst., 2023
Label embedding asymmetric discrete hashing for efficient cross-modal retrieval.
Eng. Appl. Artif. Intell., 2023
Uncovering Promises and Challenges of Federated Learning to Detect Cardiovascular Diseases: A Scoping Literature Review.
CoRR, 2023
Deep Reinforcement Learning-driven Cross-Community Energy Interaction Optimal Scheduling.
CoRR, 2023
Privacy-Enhancing Technologies in Federated Learning for the Internet of Healthcare Things: A Survey.
CoRR, 2023
ATA-Cache: Contention Mitigation for GPU Shared L1 Cache with Aggregated Tag Array.
CoRR, 2023
ReDas: Supporting Fine-Grained Reshaping and Multiple Dataflows on Systolic Array.
CoRR, 2023
Data-Driven Distributionally Robust Scheduling of Community Integrated Energy Systems with Uncertain Renewable Generations Considering Integrated Demand Response.
CoRR, 2023
Abdominal Organs and Pan-Cancer Segmentation Based on Self-supervised Pre-training and Self-training.
Proceedings of the Fast, Low-resource, and Accurate Organ and Pan-cancer Segmentation in Abdomen CT, 2023
Scribble-Based 3D Multiple Abdominal Organ Segmentation via Triple-Branch Multi-Dilated Network with Pixel- and Class-Wise Consistency.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023
Intrusion Detection System for IoHT Devices using Federated Learning.
Proceedings of the IEEE INFOCOM 2023, 2023
Design of Underwater Vehicle for Ship Draft Observation.
Proceedings of the 9th International Conference on Mechatronics and Robotics Engineering, 2023
FairShare: An Incentive-Based Fairness-Aware Data Sharing Framework for Federated Learning.
Proceedings of the Intelligent Robotics and Applications - 16th International Conference, 2023
Adversarial Attacks on Skeleton-Based Sign Language Recognition.
Proceedings of the Intelligent Robotics and Applications - 16th International Conference, 2023
Persistent Clean-Label Backdoor on Graph-Based Semi-supervised Cybercrime Detection.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
IAG: Induction-Augmented Generation Framework for Answering Reasoning Questions.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
Argue with Me Tersely: Towards Sentence-Level Counter-Argument Generation.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
Hi-ArG: Exploring the Integration of Hierarchical Argumentation Graphs in Language Pretraining.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
Contrastive Learning for Rumor Detection via Fitting Beta Mixture Model.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
Fine-grained Face Anti-Spoofing based on Recursive Self-Attention and Multi-Scale Fusion.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023
PerCBA: Persistent Clean-label Backdoor Attacks on Semi-Supervised Graph Node Classification.
Proceedings of the IJCAI-23 Joint Workshop on Artificial Intelligence Safety and Safe Reinforcement Learning (AISafety-SafeRL 2023) co-located with the 32nd International Joint Conference on Artificial Intelligence(IJCAI2023), 2023
Hence, Socrates is mortal: A Benchmark for Natural Language Syllogistic Reasoning.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023
Query Structure Modeling for Inductive Logical Reasoning Over Knowledge Graphs.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023
2022
Estimation of Domain of Attraction for Discrete-Time Positive Interval Type-2 Polynomial Fuzzy Systems With Input Saturation.
IEEE Trans. Fuzzy Syst., 2022
Stabilization Analysis and Impulsive Controller Design for Positive Interval Type-2 Polynomial Fuzzy Systems.
IEEE Trans. Fuzzy Syst., 2022
FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners.
Sensors, 2022
A Novel Data-Driven Evaluation Framework for Fork after Withholding Attack in Blockchain Systems.
Sensors, 2022
A Novel Improved YOLOv3-SC Model for Individual Pig Detection.
Sensors, 2022
Utility-Oriented Computation Scheduling for Energy-Efficient Mobile Edge Computing Networks.
IEEE Open J. Comput. Soc., 2022
An overview of high utility itemsets mining methods based on intelligent optimization algorithms.
Knowl. Inf. Syst., 2022
Incrementally updating high utility quantitative itemsets mining algorithm.
J. Intell. Fuzzy Syst., 2022
Review of ensemble classification over data streams based on supervised and semi-supervised.
J. Intell. Fuzzy Syst., 2022
Interval type-2 T-S fuzzy MPC for CPS under hybrid attacks over a multi-channel framework.
J. Frankl. Inst., 2022
A balm: defend the clique-based attack from a fundamental aspect.
J. Comb. Optim., 2022
A two-stage deep learning model based on feature combination effects.
Neurocomputing, 2022
Mining high utility pattern with negative items in dynamic databases.
Int. J. Intell. Syst., 2022
More relaxed stability analysis and positivity analysis for positive polynomial fuzzy systems via membership functions dependent method.
Fuzzy Sets Syst., 2022
A secure relay selection scheme based on cooperative jamming for Underwater Acoustic Sensor Networks.
Comput. Networks, 2022
Medical expert and machine learning analysis of lumbar disc herniation based on magnetic resonance imaging.
Comput. Methods Programs Biomed., 2022
An Attention Enhanced Cross-Modal Image-Sound Mutual Generation Model for Birds.
Comput. J., 2022
A survey of active and passive concept drift handling methods.
Comput. Intell., 2022
Embedding temporal networks inductively via mining neighborhood and community influences.
Appl. Intell., 2022
Frequency Hopping Signal Sorting of UAV Based on Image Noise Reduction Technology.
Proceedings of the 4th International Conference on Video, Signal and Image Processing, 2022
NE-WNA: A Novel Network Embedding Framework Without Neighborhood Aggregation.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022
Efficient Semi-supervised Multi-organ Segmentation Using Uncertainty Rectified Pyramid Consistency.
Proceedings of the Fast and Low-Resource Semi-supervised Abdominal Organ Segmentation, 2022
Algorithm for Integrating Multi-Proximity for Trust-Based Group Recommendation in Ridesharing.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2022
SLIME: program-sensitive energy allocation for fuzzing.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
LSTN: Long Short-Term Traffic Flow Forecasting with Transformer Networks.
Proceedings of the 26th International Conference on Pattern Recognition, 2022
Incorporating Self Attention Mechanism into Polarization spectral image Reflection Network.
Proceedings of the 5th International Conference on Big Data Technologies, 2022
Graph Representation Learning via Adaptive Multi-layer Neighborhood Diffusion Contrast.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
Curriculum Contrastive Learning for Fake News Detection.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
AI-Driven Multiobjective Scheduling Algorithm of Flood Control Materials Based on Pareto Artificial Bee Colony.
Wirel. Commun. Mob. Comput., 2021
Tensor-Based Joint Channel Estimation and Symbol Detection for Time-Varying mmWave Massive MIMO Systems.
IEEE Trans. Signal Process., 2021
Adversarial Examples versus Cloud-Based Detectors: A Black-Box Empirical Study.
IEEE Trans. Dependable Secur. Comput., 2021
An Attenuation Model of Node Signals in Wireless Underground Sensor Networks.
Remote. Sens., 2021
An augmented reality-based multimedia environment for experimental education.
Multim. Tools Appl., 2021
Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets.
Mob. Networks Appl., 2021
An overview of complex data stream ensemble classification.
J. Intell. Fuzzy Syst., 2021
Mining of top-k high utility itemsets with negative utility.
J. Intell. Fuzzy Syst., 2021
ETKDS: An efficient algorithm of Top-K high utility itemsets mining over data streams under sliding window model.
J. Intell. Fuzzy Syst., 2021
A Survey of incremental high-utility pattern mining based on storage structure.
J. Intell. Fuzzy Syst., 2021
Machine learning research towards combating COVID-19: Virus detection, spread prevention, and medical assistance.
J. Biomed. Informatics, 2021
Nonlinear time series prediction algorithm based on AD-SSNET for artificial intelligence-powered Internet of Things.
Int. J. Distributed Sens. Networks, 2021
Miner revenue optimization algorithm based on Pareto artificial bee colony in blockchain network.
EURASIP J. Wirel. Commun. Netw., 2021
Coordinating Flexible Demand Response and Renewable Uncertainties for Scheduling of Community Integrated Energy Systems with an Electric Vehicle Charging Station: A Bi-level Approach.
CoRR, 2021
A Secure and Privacy-Preserving Machine Learning Model Sharing Scheme for Edge-Enabled IoT.
IEEE Access, 2021
Review of Classification Methods on Unbalanced Data Sets.
IEEE Access, 2021
Efficient Hybrid Beamforming Design in mmWave Massive MU-MIMO DF Relay Systems With the Mixed-Structure.
IEEE Access, 2021
Survey of Machine Learning and Deep Learning Techniques for Travel Demand Forecasting.
Proceedings of the 2021 IEEE SmartWorld, 2021
A Computer-Vision Based Engagement Evaluation System for More Effective Learning Design.
Proceedings of the SIGITE '21: The 22nd Annual Conference on Information Technology Education, SnowBird, UT, USA, October 6, 2021
Automatic Face Mask Detection Using Deep Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
DNANet: Dense Nested Attention Network for Single Image Dehazing.
Proceedings of the IEEE International Conference on Acoustics, 2021
SageDy: A Novel Sampling and Aggregating Based Representation Learning Approach for Dynamic Networks.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021
Perceptions of Information Systems Security Compliance: An Empirical Study in Higher Education Setting.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proof of Greatest Number Program and Find.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021
A Novel Modified Sparrow Search Algorithm Based on Adaptive Weight and Improved Boundary Constraints.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021
2020
Public Blockchains Scalability: An Examination of Sharding and Segregated Witness.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020
Blockchain-Based Certification for Education, Employment, and Skill with Incentive Mechanism.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020
Stability Analysis and Estimation of Domain of Attraction for Positive Polynomial Fuzzy Systems With Input Saturation.
IEEE Trans. Fuzzy Syst., 2020
Blockchain Architecture forAuditing Automation and TrustBuilding in Public Markets.
CoRR, 2020
Blockchain Architecture for Auditing Automation and Trust Building in Public Markets.
Computer, 2020
SCGA-Net: Skip Connections Global Attention Network for Image Restoration.
Comput. Graph. Forum, 2020
Not All Areas Are Equal: A Novel Separation-Restoration-Fusion Network for Image Raindrop Removal.
Comput. Graph. Forum, 2020
Survey on data analysis in social media: A practical application aspect.
Big Data Min. Anal., 2020
A Survey of Key Technologies for High Utility Patterns Mining.
IEEE Access, 2020
Semi-Blind Receivers for Multi-User Massive MIMO Relay Systems Based on Block Tucker2-PARAFAC Tensor Model.
IEEE Access, 2020
A Novel Computing Power Allocation Algorithm for Blockchain System in Multiple Mining Pools Under Withholding Attack.
IEEE Access, 2020
A Novel Anti-attack Revenue Optimization Algorithm in the Proof-of-Work Based Blockchain.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020
Budget Feasible Roadside Unit Allocation Mechanism in Vehicular Ad-Hoc Networks.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020
A Theory-Based Course Development Framework: A Case Study.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020
A Novel Framework for Collaborated IT Project with the Consideration of Data Security and Privacy.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020
Seeking the Goals of K-12 Computing Education: A Text Analysis based Literature Review.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020
Converting Handwritten Text to Editable Format via Gesture Recognition for Education.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020
Abnormal Activity Detection in Edge Computing: A Transfer Learning Approach.
Proceedings of the International Conference on Computing, Networking and Communications, 2020
Lung Pattern Classification Via DCNN.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
Promoting Information Security Policy Compliance - An Empirical Study.
Proceedings of the 26th Americas Conference on Information Systems, 2020
Large-Scale Multi-View Subspace Clustering in Linear Time.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
Effects of and Defenses Against Adversarial Attacks on a Traffic Light Classification CNN.
Proceedings of the 2020 ACM Southeast Conference, 2020
Integrating Blockchain Technology into Healthcare.
Proceedings of the 2020 ACM Southeast Conference, 2020
A Chatbot-based Mobile Application to Predict and Early-prevent Human Mental Illness.
Proceedings of the 2020 ACM Southeast Conference, 2020
Machine Learning in the Analysis of Mental Disease.
Proceedings of the 2020 ACM Southeast Conference, 2020
Implementing Capsule Neural Networks in Traffic Light Image Recognition.
Proceedings of the 2020 ACM Southeast Conference, 2020
2019
Mild cognitive impairment understanding: an empirical study by data-driven approach.
BMC Bioinform., December, 2019
Efficient methods to set decay factor of time decay model over data streams.
J. Intell. Fuzzy Syst., 2019
ShareSafe: An Improved Version of SecGraph.
KSII Trans. Internet Inf. Syst., 2019
Observer-based control of positive polynomial fuzzy systems with unknown time delay.
Neurocomputing, 2019
PatHT: an efficient methodof classification over evolving data streams.
Int. Arab J. Inf. Technol., 2019
Discovering Travel Community for POI Recommendation on Location-Based Social Networks.
Complex., 2019
Fast image captioning using LSTM.
Clust. Comput., 2019
An efficient ride-sharing recommendation for maximizing acceptance on geo-social data.
CCF Trans. Pervasive Comput. Interact., 2019
Spreading social influence with both positive and negative opinions in online networks.
Big Data Min. Anal., 2019
Optimal Hybrid Beamforming Design for Millimeter-Wave Massive Multi-User MIMO Relay Systems.
IEEE Access, 2019
Practice What You Preach - Building a Capstone Management System as Undergraduate IT Capstone Projects.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019
An Architecture for Blockchain-Enabled Collaborative Signature-based Intrusion Detection System.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019
Untampered Electronic Voting in Entertainment Industry: A Blockchain-based Implementation.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019
Understand the Emerging Demands of Computing Education for Non-CS Major Students.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019
The Adversarial Attacks Threats on Computer Vision: A Survey.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019
Pattern-Adaptive Time Series Prediction via Online Learning and Paralleled Processing using CUDA.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019
Finding a Niche and Developing an Undergraduate Data Analytics Course.
Proceedings of the IEEE Frontiers in Education Conference, 2019
A Community-based Computational and Engineering Sciences Initiative toward National Development (COESIND).
Proceedings of the IEEE Frontiers in Education Conference, 2019
What are the Non-majors Looking for in CS Classes?
Proceedings of the IEEE Frontiers in Education Conference, 2019
Incorporating Content Beyond Text: A High Reliable Twitter-Based Disaster Information System.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019
A2Text-Net: A Novel Deep Neural Network for Sarcasm Detection.
Proceedings of the 2019 IEEE First International Conference on Cognitive Machine Intelligence (CogMI), 2019
E^2 C-Chain: A Two-Stage Incentive Education Employment and Skill Certification Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2019
Understanding the Mobile Game App Activity.
Proceedings of the 2019 ACM Southeast Conference, 2019
Social Media Content Analytics beyond the Text: A Case Study of University Branding in Instagram.
Proceedings of the 2019 ACM Southeast Conference, 2019
AI Powered Book Recommendation System.
Proceedings of the 2019 ACM Southeast Conference, 2019
2018
Computation of Loss Distribution Based on the Structural Model for Credit Portfolios.
PhD thesis, 2018
Truthful Incentive Mechanisms for Geographical Position Conflicting Mobile Crowdsensing Systems.
IEEE Trans. Comput. Soc. Syst., 2018
Privacy preserving feature selection and Multiclass Classification for horizontally distributed data.
Math. Found. Comput., 2018
A survey on security and privacy issues of blockchain technology.
Math. Found. Comput., 2018
Influence analysis: A survey of the state-of-the-art.
Math. Found. Comput., 2018
Maximising influence in sensed heterogeneous social network with privacy preservation.
Int. J. Sens. Networks, 2018
Cognitive Approach for Location Privacy Protection.
IEEE Access, 2018
Understanding Data Breach: A Visualization Aspect.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Privacy Preserving Multiclass Classification for Horizontally Distributed Data.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018
An Energy-Efficient Secure Adaptive Cloud-of-Things (CoT) Framework to Facilitate Undergraduate STEM Education.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018
A Novel Blockchain-based Education Records Verification Solution.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018
Improving IoT Services in Smart-Home Using Blockchain Smart Contract.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
LSTM Recurrent Neural Networks for Influenza Trends Prediction.
Proceedings of the Bioinformatics Research and Applications - 14th International Symposium, 2018
Deep learning approach for cyberattack detection.
Proceedings of the IEEE INFOCOM 2018, 2018
On-Demand Virtual Lectures: Promoting Active Learning in Distance Learning.
Proceedings of the 2nd International Conference on E-Education, 2018
China's Efforts to Information Service for Visual-Impaired People.
Proceedings of the Computers Helping People with Special Needs, 2018
Designing Visually Interactive Learning Modules to Promote Students' Critical Thinking in Mathematics.
Proceedings of the IEEE Frontiers in Education Conference, 2018
Defend the Clique-based Attack for Data Privacy.
Proceedings of the Combinatorial Optimization and Applications, 2018
2017
Time constraint influence maximization algorithm in the age of big data.
Int. J. Comput. Sci. Eng., 2017
Evolution Mechanism of Atmospheric Pollution Based on Phase Reconstruction Theory and Time Series Data.
Int. J. Appl. Evol. Comput., 2017
TDMCS: an efficient method for mining closed frequent patterns over data streams based on time decay model.
Int. Arab J. Inf. Technol., 2017
Influence maximization by probing partial communities in dynamic online social networks.
Trans. Emerg. Telecommun. Technol., 2017
H _2 DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol.
Proceedings of the Security and Privacy in Communication Networks, 2017
Information Privacy of Cyber Transportation System: Opportunities and Challenges.
Proceedings of the 6th Annual Conference on Research in Information Technology, 2017
Near-Complete Privacy Protection: Cognitive Optimal Strategy in Location-Based Services.
Proceedings of the 2017 International Conference on Identification, 2017
Performance evaluation and analysis of a combined quasi-two-stage bridgeless PFC converter.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017
A quasi single-stage power factor correction converter based on a three-level boost converter.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017
An Improved Binary Chicken Swarm Optimization Algorithm for Solving 0-1 Knapsack Problem.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
2016
Truthful Incentive Mechanisms for Social Cost Minimization in Mobile Crowdsourcing Systems.
Sensors, 2016
概念漂移数据流挖掘算法综述 (Review of Concept Drift Data Streams Mining Techniques).
计算机科学, 2016
An exploration of broader influence maximization in timeliness networks with opportunistic selection.
J. Netw. Comput. Appl., 2016
The Roles of Social Network Mavens.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016
Data Aggregation Scheduling in Probabilistic Wireless Networks with Cognitive Radio Capability.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Predictive Contention Window-Based Broadcast Collision Mitigation Strategy for VANET.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016
Mining Public Business Knowledge: A Case Study in SEC's EDGAR.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016
Privacy Reserved Influence Maximization in GPS-Enabled Cyber-Physical and Online Social Networks.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016
An Efficient Social Event Invitation Framework Based on Historical Data of Smart Devices.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016
2015
A lazy associative classifier for time series.
Intell. Data Anal., 2015
Mining closed and multi-supports-based sequential pattern in high-dimensional dataset.
Int. Arab J. Inf. Technol., 2015
Optimal routing with scheduling and channel assignment in multi-power multi-radio wireless sensor networks.
Ad Hoc Networks, 2015
Whitespace measurement and virtual backbone construction for Cognitive Radio Networks: From the social perspective.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015
2014
Efficient Method for Mining Patterns from Highly Similar and Dense Database based on Prefix-Frequent-Items.
J. Softw., 2014
Selecting One Dependency Estimators in Bayesian Network Using Different MDL Scores and Overfitting Criterion.
J. Inf. Sci. Eng., 2014
Neighborhood-based uncertainty generation in social networks.
J. Comb. Optim., 2014
A Discriminative Shapelets Transformation for Time Series Classification.
Int. J. Pattern Recognit. Artif. Intell., 2014
Data aggregation scheduling in wireless networks with Cognitive Radio capability.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014
A survey of GPU accelerated SVM.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014
2013
Closed Sequential Pattern Mining in High Dimensional Sequences.
J. Softw., 2013
Generating Uncertain Networks Based on Historical Network Snapshots.
Proceedings of the Computing and Combinatorics, 19th International Conference, 2013
2012
Time Constraints with Temporal Logic Programming.
Proceedings of the Formal Methods and Software Engineering, 2012
2010
Broadband cognitive radio transmission based on sub-channel sensing and NC-OFDM.
Int. J. Commun. Networks Inf. Secur., 2010
2004
A coding and Modulation scheme for HDTV services in DMB-T.
IEEE Trans. Broadcast., 2004
2003
A combined code acquisition and symbol timing recovery method for TDS-OFDM.
IEEE Trans. Broadcast., 2003
A novel scheme of coding and modulation for digital television terrestrial broadcasting.
Proceedings of the IEEE 14th International Symposium on Personal, 2003
Code acquisition and symbol timing recovery method in TDS-OFDM for broadcast channels.
Proceedings of the IEEE 14th International Symposium on Personal, 2003