2024
ANNProof: Building a verifiable and efficient outsourced approximate nearest neighbor search system on blockchain.
Future Gener. Comput. Syst., 2024
Detecting Kernel Memory Bugs through Inconsistent Memory Management Intention Inferences.
Proceedings of the 33rd USENIX Security Symposium, 2024
Improving Indirect-Call Analysis in LLVM with Type and Data-Flow Co-Analysis.
Proceedings of the 33rd USENIX Security Symposium, 2024
Triton: A Flexible Hardware Offloading Architecture for Accelerating Apsara vSwitch in Alibaba Cloud.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the ACM SIGCOMM 2024 Conference, 2024
MuFuzz: Sequence-Aware Mutation and Seed Mask Guidance for Blockchain Smart Contract Fuzzing.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Clean-Image Backdoor Attacks.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2024, 2024
Speed-enhanced Subdomain Alignment for Long-term Stable Neural Decoding in Brain-computer Interfaces.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2024
2023
Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection.
IEEE Trans. Software Eng., July, 2023
Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting.
IEEE Trans. Inf. Forensics Secur., 2023
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform.
IEEE Trans. Dependable Secur. Comput., 2023
Empirical Review of Smart Contract and DeFi Security: Vulnerability Detection and Automated Repair.
CoRR, 2023
Cross-Modality Mutual Learning for Enhancing Smart Contract Vulnerability Detection on Bytecode.
Proceedings of the ACM Web Conference 2023, 2023
CoMeta: Enhancing Meta Embeddings with Collaborative Information in Cold-Start Problem of Recommendation.
Proceedings of the Knowledge Science, Engineering and Management, 2023
Demystifying Bitcoin Address Behavior via Graph Neural Networks.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023
2022
Who is gambling? Finding cryptocurrency gamblers using multi-modal retrieval methods.
Int. J. Multim. Inf. Retr., 2022
Smart Contract Vulnerability Detection Technique: A Survey.
CoRR, 2022
Poisoning Deep Learning Based Recommender Model in Federated Learning Scenarios.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
FedRecAttack: Model Poisoning Attack to Federated Recommendation.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
2021
A Truthful and Near-Optimal Mechanism for Colocation Emergency Demand Response.
IEEE Trans. Mob. Comput., 2021
Fast-RCM: Fast Tree-Based Unsupervised Rare-Class Mining.
IEEE Trans. Cybern., 2021
DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications.
CoRR, 2021
AI+X micro-program fosters interdisciplinary skills in China.
Commun. ACM, 2021
Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021
Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Towards Automated Reentrancy Detection for Smart Contracts Based on Sequential Models.
IEEE Access, 2020
Smart Contract Vulnerability Detection using Graph Neural Network.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
2019
De-Health: All Your Online Health Information Are Belong to Us.
CoRR, 2019
FDI: Quantifying Feature-based Data Inferability.
CoRR, 2019
Towards understanding the security of modern image captchas and underground captcha-solving services.
Big Data Min. Anal., 2019
A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
CATS: Cross-Platform E-Commerce Fraud Detection.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019
DeT: Defending Against Adversarial Examples via Decreasing Transferability.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
EduCoin: a Secure and Efficient Payment Solution for MOOC Environment.
Proceedings of the IEEE International Conference on Blockchain, 2019
2018
Toward Personalized Activity Level Prediction in Community Question Answering Websites.
ACM Trans. Multim. Comput. Commun. Appl., 2018
Evaluation of local community metrics: from an experimental perspective.
J. Intell. Inf. Syst., 2018
Rare category exploration with noisy labels.
Expert Syst. Appl., 2018
Online E-Commerce Fraud: A Large-Scale Detection and Analysis.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018
2017
Behavior pattern clustering in blockchain networks.
Multim. Tools Appl., 2017
Joint affinity aware grouping and virtual machine placement.
Microprocess. Microsystems, 2017
HHMO: A Hot-page Based Hybrid-copy Migration Optimization Method.
Ad Hoc Sens. Wirel. Networks, 2017
Group-Level Influence Maximization with Budget Constraint.
Proceedings of the Database Systems for Advanced Applications, 2017
2016
A formalized framework for incorporating expert labels in crowdsourcing environment.
J. Intell. Inf. Syst., 2016
Efficient consolidation-aware VCPU scheduling on multicore virtualization platform.
Future Gener. Comput. Syst., 2016
Rare category exploration via wavelet analysis: Theory and applications.
Expert Syst. Appl., 2016
Evaluation of Virtual Machine Performance on Large Pages.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016
A Hot-Page Aware Hybrid-Copy Migration Method.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering, 2016
Mining Arbitrary Shaped Clusters and Outputting a High Quality Dendrogram.
Proceedings of the Database and Expert Systems Applications, 2016
Modeling for Noisy Labels of Crowd Workers.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016
2015
<i>X</i>-Region: A framework for location privacy preservation in mobile peer-to-peer networks.
Int. J. Commun. Syst., 2015
Rare Category Detection Forest.
Proceedings of the Knowledge Science, Engineering and Management, 2015
Rare Category Exploration on Linear Time Complexity.
Proceedings of the Database Systems for Advanced Applications, 2015
2014
Mining regional co-location patterns with kNNG.
J. Intell. Inf. Syst., 2014
Toward seed-insensitive solutions to local community detection.
J. Intell. Inf. Syst., 2014
Prior-free rare category detection: More effective and efficient solutions.
Expert Syst. Appl., 2014
Unsupervised analysis of top-k core members in poly-relational networks.
Expert Syst. Appl., 2014
Rare category exploration.
Expert Syst. Appl., 2014
Recovering Missing Labels of Crowdsourcing Workers.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014
Rare Category Detection on O(dN) Time Complexity.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014
Learning from Crowds under Experts' Supervision.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014
DP: Dynamic Prepage in Postcopy Migration for Fixed-Size Data Load.
Proceedings of the Network and Parallel Computing, 2014
Towards effective and efficient mining of arbitrary shaped clusters.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014
2013
CLOVER: a faster prior-free approach to rare-category detection.
Knowl. Inf. Syst., 2013
EDA: an enhanced dual-active algorithm for location privacy preservation inmobile P2P networks.
J. Zhejiang Univ. Sci. C, 2013
Browse with a social web directory.
Proceedings of the 36th International ACM SIGIR conference on research and development in Information Retrieval, 2013
Commodity query by snapping.
Proceedings of the 36th International ACM SIGIR conference on research and development in Information Retrieval, 2013
Discovery of Regional Co-location Patterns with <i>k</i>-Nearest Neighbor Graph.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013
GMAC: A Seed-Insensitive Approach to Local Community Detection.
Proceedings of the Data Warehousing and Knowledge Discovery, 2013
2012
Spatial co-location pattern discovery without thresholds.
Knowl. Inf. Syst., 2012
SALS: semantics-aware location sharing based on cloaking zone in mobile social networks.
Proceedings of the First ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems, 2012
2011
Virt-LM: a benchmark for live migration of virtual machine (abstracts only).
SIGMETRICS Perform. Evaluation Rev., 2011
Worst-Case Performance Evaluation on Multiprocessor Task Scheduling with Resource Augmentation.
Int. J. Found. Comput. Sci., 2011
Virt-LM: a benchmark for live migration of virtual machine.
Proceedings of the ICPE'11, 2011
A Fine-Grained Performance-Based Decision Model for Virtualization Application Solution.
Proceedings of the Topics in Performance Evaluation, Measurement and Characterization, 2011
RADAR: Rare Category Detection via Computation of Boundary Degree.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2011
Informed Live Migration Strategies of Virtual Machines for Cluster Load Balancing.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011
2010
Evaluate the Performance and Scalability of Image Deployment in Virtual Data Center.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010
2009
Mining Spatial Co-location Patterns with Dynamic Neighborhood Constraint.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2009
Load Balancing in Server Consolidation.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
Cluster Analysis and Fuzzy Query in Ship Maintenance and Design.
Proceedings of the Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, 2009
Mining Spread Patterns of Spatio-temporal Co-occurrences over Zones.
Proceedings of the Computational Science and Its Applications, 2009
Performance Combinative Evaluation of Typical Virtual Machine Monitors.
Proceedings of the High Performance Computing and Applications, 2009
2008
Incremental Maintenance of Discovered Spatial Colocation Patterns.
Proceedings of the Workshops Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008
A Framework to Evaluate and Predict Performances in Virtual Machines Environment.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Performance Measuring and Comparing of Virtual Machine Monitors.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
2006
A Multiclass Classification Method Based on Output Design.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2006
Software Planned Learning and Recognition Based on the Sequence Learning and NARX Memory Model of Neural Network.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
A Multiclass Classification Framework for Document Categorization.
Proceedings of the Document Analysis Systems VII, 7th International Workshop, 2006
A P2P Architecture for Supporting Group Communication in CSCW Systems.
Proceedings of the 10th International Conference on CSCW in Design, 2006
An Incremental Learning Algorithm Based on Support Vector Domain Classifier.
Proceedings of the Firth IEEE International Conference on Cognitive Informatics, 2006
2005
Concept Updating with Support Vector Machines.
Proceedings of the Advances in Web-Age Information Management, 2005
Frame Rate Control in Distributed Game Engine.
Proceedings of the Entertainment Computing, 2005
Design and Implementation of a J2EE-Based Platform for Network Teaching.
Proceedings of the Advances in Web-Based Learning - ICWL 2005, 4th International Conference, Hong Kong, China, July 31, 2005
An Interval Set Classification Based on Support Vector Machines.
Proceedings of the Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, 2005
2004
Text Categorization Based on Domain Ontology.
Proceedings of the Web Information Systems, 2004
Support vector pursuit learning.
Proceedings of the IEEE International Conference on Systems, 2004
An Incremental Updating Method for Support Vector Machines.
Proceedings of the Advanced Web Technologies and Applications, 2004
2001
MA-C: A Multimedia Instruction Model based on Multi-Agent and CSCW.
Proceedings of the Sixth International Conference on Computer Supported Cooperative Work in Design, 2001