2025
IGU-Aug: Information-Guided Unsupervised Augmentation and Pixel-Wise Contrastive Learning for Medical Image Analysis.
IEEE Trans. Medical Imaging, January, 2025
Towards Accurate Unified Anomaly Segmentation.
CoRR, January, 2025
Bridged Semantic Alignment for Zero-shot 3D Medical Image Diagnosis.
CoRR, January, 2025
2024
Adversarial Medical Image With Hierarchical Feature Hiding.
IEEE Trans. Medical Imaging, April, 2024
Addressing fairness issues in deep learning-based medical image analysis: a systematic review.
npj Digit. Medicine, 2024
Which images to label for few-shot medical image analysis?
Medical Image Anal., 2024
HYATT-Net is Grand: A Hybrid Attention Network for Performant Anatomical Landmark Detection.
CoRR, 2024
E3D-GPT: Enhanced 3D Visual Foundation for Medical Vision-Language Model.
CoRR, 2024
APPLE: Adversarial Privacy-aware Perturbations on Latent Embedding for Unfairness Mitigation.
CoRR, 2024
FairMedFM: Fairness Benchmarking for Medical Imaging Foundation Models.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
SIX-Net: Spatial-Context Information miX-up for Electrode Landmark Detection.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2024, 2024
HySparK: Hybrid Sparse Masking for Large Scale Medical Image Pre-training.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2024, 2024
PhantomPatch: Easy-ignoring Attacks on Object Detectors Using Ghosting Artifacts.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2024
Nowhere to Hide: Toward Robust Reactive Medical Adversarial Defense.
Proceedings of the IEEE International Symposium on Biomedical Imaging, 2024
Long-Tailed Multi-Label Classification with Noisy Label of Thoracic Diseases from Chest X-Ray.
Proceedings of the IEEE International Symposium on Biomedical Imaging, 2024
CARZero: Cross-Attention Alignment for Radiology Zero-Shot Classification.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
DND: Deep Learning-Based Directed Network Disintegrator.
IEEE J. Emerg. Sel. Topics Circuits Syst., September, 2023
Load Balancing of Double Queues and Utility-Workload Tradeoff in Heterogeneous Mobile Edge Computing.
IEEE Trans. Wirel. Commun., July, 2023
Performance-Power Tradeoff in Heterogeneous SaaS Clouds With Trustworthiness Guarantee.
IEEE Trans. Computers, June, 2023
ECAMP: Entity-centered Context-aware Medical Vision Language Pre-training.
CoRR, 2023
Unsupervised augmentation optimization for few-shot medical image segmentation.
CoRR, 2023
UOD: Universal One-Shot Detection of Anatomical Landmarks.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023
FairAdaBN: Mitigating Unfairness with Adaptive Batch Normalization and Its Application to Dermatological Disease Classification.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023
2022
Information-guided pixel augmentation for pixel-wise contrastive learning.
CoRR, 2022
A Survey of Fairness in Medical Image Analysis: Concepts, Algorithms, Evaluations, and Challenges.
CoRR, 2022
DATR: Domain-adaptive transformer for multi-domain landmark detection.
CoRR, 2022
Relative distance matters for one-shot landmark detection.
CoRR, 2022
Rib Suppression in Digital Chest Tomosynthesis.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2022, 2022
Which images to label for few-shot medical landmark detection?
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
2021
Towards Flexible and Truthful Incentive for Multichannel Allocation in DSA.
IEEE Trans. Veh. Technol., 2021
Label-Free Segmentation of COVID-19 Lesions in Lung CT.
IEEE Trans. Medical Imaging, 2021
Optimal Mobile Crowdsensing Incentive Under Sensing Inaccuracy.
IEEE Internet Things J., 2021
Medical Aegis: Robust adversarial protectors for medical images.
CoRR, 2021
You only Learn Once: Universal Anatomical Landmark Detection.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2021 - 24th International Conference, Strasbourg, France, September 27, 2021
One-Shot Medical Landmark Detection.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2021 - 24th International Conference, Strasbourg, France, September 27, 2021
A Hierarchical Feature Constraint to Camouflage Medical Adversarial Attacks.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2021 - 24th International Conference, Strasbourg, France, September 27, 2021
Delica: Decentralized Lightweight Collective Attestation for Disruptive IoT Networks.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
2020
Miss the Point: Targeted Adversarial Attack on Multiple Landmark Detection.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2020, 2020
Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
2019
Energy-Aware RFID Authentication in Edge Computing.
IEEE Access, 2019
3D U<sup>2</sup>-Net: A 3D Universal U-Net for Multi-domain Medical Image Segmentation.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2019, 2019
2017
Efficient and Consistent Key Extraction Based on Received Signal Strength for Vehicular Ad Hoc Networks.
IEEE Access, 2017
Certia: Certifying Interface Automata for Cyber-Physical Systems.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017
APDL: A Practical Privacy-Preserving Deep Learning Model for Smart Devices.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017
2016
On the architecture and development life cycle of secure cyber-physical systems.
J. Commun. Inf. Networks, 2016
Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags.
Proceedings of the 3rd ACM Workshop on Mobile Sensing, Computing and Communication, 2016
2015
Vulnerability aware graphs for RFID protocol security benchmarking.
J. Comput. Syst. Sci., 2015
2014
A demand-aware location privacy protection scheme in continuous location-based services.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014
Verifying Secure Interface Composition for Component-Based System Designs.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014
2013
MAP: Towards Authentication for Multiple Tags.
Int. J. Distributed Sens. Networks, 2013
Random Graph Based Benchmarking Methodology for RFID Security Protocols.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013
2011
MAP: Authenticating Multiple-Tags.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
Privacy Leakage in Access Mode: Revisiting Private RFID Authentication Protocols.
Proceedings of the International Conference on Parallel Processing, 2011
2010
A Desynchronization Tolerant RFID Private Authentication Protocol.
Proceedings of the Wireless Algorithms, 2010
Utilizing RF Interference to Enable Private Estimation in RFID Systems.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010
2009
Randomizing RFID Private Authentication.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
An Enhanced Synchronization Approach for RFID Private Authentication.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
2008
New Programming Model for Pervasive Computing.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008
2007
Energy Efficient Multi-rate Based Time Slot Pre-schedule Scheme in WSNs for Ubiquitous Environment.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007
2006
Applying language modeling to session identification from database trace logs.
Knowl. Inf. Syst., 2006
Mining and Modeling Database User Access Patterns.
Proceedings of the Foundations of Intelligent Systems, 16th International Symposium, 2006
2005
A Distance-Based Algorithm for Clustering Database User Sessions.
Proceedings of the Foundations of Intelligent Systems, 15th International Symposium, 2005
A Machine Learning Approach to Identifying Database Sessions Using Unlabeled Data.
Proceedings of the Data Warehousing and Knowledge Discovery, 2005
Finding and Analyzing Database User Sessions.
Proceedings of the Database Systems for Advanced Applications, 2005
2004
Characterizing Database User's Access Patterns.
Proceedings of the Database and Expert Systems Applications, 15th International Conference, 2004
2003
SQL-Relay: An Event-Driven Rule-Based Database Gateway.
Proceedings of the Advances in Web-Age Information Management, 2003
Using User Access Patterns for Semantic Query Caching.
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003