2025
Label-free Prediction of Vascular Connectivity in Perfused Microvascular Networks in vitro.
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, February, 2025
Toward Copyright Integrity and Verifiability via Multi-Bit Watermarking for Intelligent Transportation Systems.
CoRR, February, 2025
MT-BAAN: Multi-View Topological Bilinear Aggregation Attention Network Model for Alzheimer's Disease Diagnosis.
Int. J. Imaging Syst. Technol., January, 2025
U-GIFT: Uncertainty-Guided Firewall for Toxic Speech in Few-Shot Scenario.
CoRR, January, 2025
GCCNet: A Novel Network Leveraging Gated Cross-Correlation for Multi-View Classification.
IEEE Trans. Multim., 2025
Linguistic Steganalysis via Text Dual Attention Fusing Statistical and Multi-Layer Semantic Features.
IEEE Signal Process. Lett., 2025
Multi-Classification of Linguistic Steganography Driven by Large Language Models.
IEEE Signal Process. Lett., 2025
Linguistic Steganalysis via LLMs: Two Modes for Efficient Detection of Strongly Concealed Stego.
IEEE Signal Process. Lett., 2025
Dynamically allocated interval-based generative linguistic steganography with roulette wheel.
Appl. Soft Comput., 2025
Immersive Digital Imaging Experience: An Empirical Study on Audiences' Switching Intention to Metaverse Online Art Museum.
IEEE Access, 2025
HybridFlow: A Flexible and Efficient RLHF Framework.
Proceedings of the Twentieth European Conference on Computer Systems, 2025
GLoCIM: Global-view Long Chain Interest Modeling for news recommendation.
Proceedings of the 31st International Conference on Computational Linguistics, 2025
GURecon: Learning Detailed 3D Geometric Uncertainties for Neural Surface Reconstruction.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
2024
Semantic-Aware UAV Swarm Coordination in the Metaverse: A Reputation-Based Incentive Mechanism.
IEEE Trans. Mob. Comput., December, 2024
Generative Image Steganography Based on Guidance Feature Distribution.
ACM Trans. Multim. Comput. Commun. Appl., November, 2024
Federated Learning Powered Semantic Communication for UAV Swarm Cooperation.
IEEE Wirel. Commun., August, 2024
A Semantic Controllable Long Text Steganography Framework Based on LLM Prompt Engineering and Knowledge Graph.
IEEE Signal Process. Lett., 2024
Spatio-temporal coherent snapshot compressed imaging with time-varying composite phase masks.
Signal Process., 2024
Research on multi-center assisted diagnosis of ASD based on multimodal feature fusion.
Int. J. Imaging Syst. Technol., 2024
An exact solution method for <i>seru</i> scheduling problems considering past-sequence-dependent setup time and adjustment activities.
Int. J. Appl. Decis. Sci., 2024
State-of-the-art Advances of Deep-learning Linguistic Steganalysis Research.
CoRR, 2024
Current Status and Trends in Image Anti-Forensics Research: A Bibliometric Analysis.
CoRR, 2024
LICM: Effective and Efficient Long Interest Chain Modeling for News Recommendation.
CoRR, 2024
Pseudo-label Based Domain Adaptation for Zero-Shot Text Steganalysis.
CoRR, 2024
An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration.
CoRR, 2024
LLsM: Generative Linguistic Steganography with Large Language Model.
CoRR, 2024
Robust 3D phase retrieval via compressed support detection from snapshot diffraction pattern.
Comput. Biol. Medicine, 2024
MvMRL: a multi-view molecular representation learning method for molecular property prediction.
Briefings Bioinform., 2024
Hyperscale data analysis oriented optimization mechanisms for higher education management systems platforms with evolutionary intelligence.
Appl. Soft Comput., 2024
DI-GAE: A Dynamic and Resource-Efficient Attack Detection Framework with Incremental Learning and Graph Autoencoders.
Proceedings of the 23rd IEEE International Conference on Trust, 2024
Attack Behavior Extraction Based on Heterogeneous Threat Intelligence Graphs and Data Augmentation.
Proceedings of the International Joint Conference on Neural Networks, 2024
An Images Regeneration Method for CG Anti-Forensics Based on Sensor Device Trace.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
The Continuum Hypothesis Implies the Existence of Non-principal Arithmetical Ultrafilters - A Coq Formal Verification.
Proceedings of the Formal Methods and Software Engineering, 2024
Controllable Semantic Linguistic Steganography via Summarization Generation.
Proceedings of the IEEE International Conference on Acoustics, 2024
Multi-Grained Multimodal Interaction Network for Sentiment Analysis.
Proceedings of the IEEE International Conference on Acoustics, 2024
An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2024, 2024
Research on Personalized Hybrid Recommendation System for English Word Learning.
Proceedings of the Artificial Intelligence in Education. Posters and Late Breaking Results, Workshops and Tutorials, Industry and Innovation Tracks, Practitioners, Doctoral Consortium and Blue Sky, 2024
2023
ConLBS: An Attack Investigation Approach Using Contrastive Learning with Behavior Sequence.
Sensors, December, 2023
Large capacity generative image steganography via image style transfer and feature-wise deep fusion.
Appl. Intell., December, 2023
MCW: A Generalizable Deepfake Detection Method for Few-Shot Learning.
Sensors, October, 2023
Intelligent analysis system of college students' employment and entrepreneurship situation: Big data and artificial intelligence-driven approach.
Comput. Electr. Eng., September, 2023
V-A3tS: A rapid text steganalysis method based on position information and variable parameter multi-head self-attention controlled by length.
J. Inf. Secur. Appl., June, 2023
Evolutionary machine learning builds smart education big data platform: Data-driven higher education.
Appl. Soft Comput., March, 2023
Linguistic Steganalysis by Enhancing and Integrating Local and Global Features.
IEEE Signal Process. Lett., 2023
RLS-DTS: Reinforcement-Learning Linguistic Steganalysis in Distribution-Transformed Scenario.
IEEE Signal Process. Lett., 2023
Web of science-based virtual brand communities: a bibliometric review between 2000 and 2020.
Internet Res., 2023
Consumer behaviour data mining of social e-commerce platform based on improved spectral clustering algorithm.
Int. J. Web Based Communities, 2023
Reformulation and exact solution method for <i>seru</i> scheduling problem with learning effect and job deterioration.
Int. J. Appl. Decis. Sci., 2023
UP4LS: User Profile Constructed by Multiple Attributes for Enhancing Linguistic Steganalysis.
CoRR, 2023
How Older Adults' Moments Sharing in SNS Contributes to Their Subjective Well-Being?
Proceedings of the E-Business. Digital Empowerment for an Intelligent Future, 2023
Robust Secret Data Hiding for Transformer-based Neural Machine Translation.
Proceedings of the International Joint Conference on Neural Networks, 2023
Neural Linguistic Steganography with Controllable Security.
Proceedings of the International Joint Conference on Neural Networks, 2023
A Robust Generative Image Steganography Method based on Guidance Features in Image Synthesis.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
T-GraphDTA: A Drug-Target Binding Affinity Prediction Framework Based on Protein Pre-training Model and Hybrid Graph Neural Network.
Proceedings of the Applied Intelligence - First International Conference, 2023
2022
Linguistic Steganalysis Merging Semantic and Statistical Features.
IEEE Signal Process. Lett., 2022
Faithful quantum entanglement purification and concentration using heralded high-fidelity parity-check detectors based on quantum-dot-microcavity systems.
Quantum Inf. Process., 2022
A social commerce purchasing decision model with trust network and item review information.
Knowl. Based Syst., 2022
Two statistical traffic features for certain APT group identification.
J. Inf. Secur. Appl., 2022
Degree Conditions for Completely Independent Spanning Trees of Bipartite Graphs.
Graphs Comb., 2022
Integration of multi-omics technologies for crop improvement: Status and prospects.
Frontiers Bioinform., 2022
LogKernel A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering.
CoRR, 2022
Chinese Short Text Entity Linking Model Based on PET.
Proceedings of the 4th World Symposium on Software Engineering, 2022
T-GRU: conTextual Gated Recurrent Unit model for high quality Linguistic Steganography.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
Sense-aware BERT and Multi-task Fine-tuning for Multimodal Sentiment Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2022
An encrypted traffic classification method based on contrastive learning.
Proceedings of the 8th International Conference on Communication and Information Processing, 2022
A CNN Based Visual Audio Steganography Model.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
Distant Supervised Relation Extraction Based on Sentence-Level Attention with Relation Alignment.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
A Robust Deepfake Video Detection Method based on Continuous Frame Face-swapping.
Proceedings of the International Conference on Artificial Intelligence, 2022
2021
Topic-aware Neural Linguistic Steganography Based on Knowledge Graphs.
Trans. Data Sci., 2021
Quantum secure multi-party summation protocol based on blind matrix and quantum Fourier transform.
Quantum Inf. Process., 2021
A video steganalysis method based on coding cost variation.
Int. J. Distributed Sens. Networks, 2021
The prognosis prediction significance of Hounsfield unit value for stroke patients treated by intravenous thrombolysis.
BMC Medical Imaging, 2021
Research on Energy Saving Mechanism of NB-IoT Based on eDRX.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021
A Reversible Digital Watermarking Algorithm Based on Medical Images via Threshold Segmentation and Contrast Enhancement.
Proceedings of the Image and Graphics - 11th International Conference, 2021
A Controllable Image Steganography with Chaos and User Key.
Proceedings of the Image and Graphics - 11th International Conference, 2021
Carrier Robust Reversible Watermark Model Based on Image Block Chain Authentication.
Proceedings of the Image and Graphics - 11th International Conference, 2021
User Experience for Multi-Device Ecosystems: Challenges and Opportunities.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
2020
Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2020
Sustainable quality control mechanism of heavy truck production process for Plant-wide production process.
Int. J. Prod. Res., 2020
A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction.
Circuits Syst. Signal Process., 2020
Construction of Two Statistical Anomaly Features for Small-Sample APT Attack Traffic Classification.
CoRR, 2020
Constructing feature variation coefficients to evaluate feature learning capabilities of convolutional layers in steganographic detection algorithms of spatial domain.
CoRR, 2020
A "User-Knowledge-Product" Co-Creation Cyberspace Model for Product Innovation.
Complex., 2020
A Two-Stage Generative Adversarial Networks With Semantic Content Constraints for Adversarial Example Generation.
IEEE Access, 2020
Enhancing the interoperability between deep learning frameworks by model conversion.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020
DUES-Adapt: Exploring Distributed User Experience With Neural UI Adaptation.
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the IUI '20: 25th International Conference on Intelligent User Interfaces, 2020
An empirical study on program failures of deep learning jobs.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
2019
Invisible steganography via generative adversarial networks.
Multim. Tools Appl., 2019
A Sequential Design Approach for Calibrating Dynamic Computer Simulators.
SIAM/ASA J. Uncertain. Quantification, 2019
A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting.
J. Inf. Secur. Appl., 2019
Using Downward-Looking Lidar to Detect and Track Traffic.
Proceedings of the IECON 2019, 2019
Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
2018
Temperature Compensation of Elasto-Magneto-Electric (EME) Sensors in Cable Force Monitoring Using BP Neural Network.
Sensors, 2018
Modified PSO algorithms with "Request and Reset" for leak source localization using multiple robots.
Neurocomputing, 2018
Efficient feature learning and multi-size image steganalysis based on CNN.
CoRR, 2018
Invisible Steganography via Generative Adversarial Network.
CoRR, 2018
Analysis of Message Attacks in Aviation Data-Link Communication.
IEEE Access, 2018
An Image Steganography Algorithm Based on Pixel Block Difference and Variable Modulus Function.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018
Attack Pattern Mining Algorithm Based on Fuzzy Clustering and Sequence Pattern from Security Log.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018
Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Hotspots Trends and Spatio-Temporal Distributions for an Investigative in the Field of Chinese Educational Technology.
Proceedings of the 26th International Conference on Geoinformatics, 2018
2017
Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering.
Secur. Commun. Networks, 2017
Efficient entanglement concentration of arbitrary unknown less-entangled three-atom W states via photonic Faraday rotation in cavity QED.
Quantum Inf. Process., 2017
Robust video watermarking algorithm for H.264/AVC based on JND model.
KSII Trans. Internet Inf. Syst., 2017
Efficient data possession-checking protocol with deduplication in cloud.
Int. J. Distributed Sens. Networks, 2017
Dynamic data integrity auditing for secure outsourcing in the cloud.
Concurr. Comput. Pract. Exp., 2017
Attack pattern mining algorithm based on security log.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
A Steganography Algorithm Based on MP3 Linbits Bit of Huffman Codeword.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017
Optimal full-duplex relay selection for physical layer security in cooperative wireless networks.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017
2016
Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems.
Int. J. Distributed Sens. Networks, 2016
Testing Contextuality in Cyclic Psychophysical Systems of High Ranks.
Proceedings of the Quantum Interaction - 10th International Conference, 2016
Privacy preservation based on rotation perturbation in weighted social networks.
Proceedings of the 16th International Symposium on Communications and Information Technologies, 2016
Detecting False Information of Social Network in Big Data.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016
Efficiently secure multiparty computation based on homomorphic encryption.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016
Phishing sites detection based on Url Correlation.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016
An attack pattern mining algorithm based on fuzzy logic and sequence pattern.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016
An Android malware detection method based on AndroidManifest file.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016
2015
Efficient multipartite entanglement concentration protocol for nitrogen-vacancy center and microresonator coupled systems.
Quantum Inf. Process., 2015
Defense Strategy of Network Security based on Dynamic Classification.
KSII Trans. Internet Inf. Syst., 2015
An improved algorithm for community discovery in social networks based on label propagation.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015
2014
Smart Elasto-Magneto-Electric (EME) Sensors for Stress Monitoring of Steel Cables: Design Theory and Experimental Validation.
Sensors, 2014
Nonlocal entanglement concentration of separate nitrogen-vacancy centers coupling to microtoroidal resonators.
Quantum Inf. Comput., 2014
Hamiltonian cycle embedding for fault tolerance in balanced hypercubes.
Appl. Math. Comput., 2014
Building an Online Collaborative Learning Community in Ubiquitous Learning Environment.
Proceedings of the Proceeding of the 22nd International Conference on Computers in Education, 2014
2013
Multipartite electronic entanglement purification using quantum-dot spin and microcavity system.
Quantum Inf. Process., 2013
Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation.
J. Multim., 2013
IBC-Based Entity Authentication Protocols for Federated Cloud Systems.
KSII Trans. Internet Inf. Syst., 2013
2012
Controlled remote state preparation of arbitrary two and three qubit states via the Brown state.
Quantum Inf. Process., 2012
A Video Watermarking Algorithm of H.264/AVC for Content Authentication.
J. Networks, 2012
Cone-beam computed tomography study of root and canal morphology of mandibular premolars in a western Chinese population.
BMC Medical Imaging, 2012
2011
Research of Spatial Domain Image Digital Watermarking Payload.
EURASIP J. Inf. Secur., 2011
The effect of a manual instrumentation technique on five types of premolar root canal geometry assessed by microcomputed tomography and three-dimensional reconstruction.
BMC Medical Imaging, 2011
Wavelet neural network based intelligent assessment of ceramic green technology research.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011
Intelligent green production of raw materials in ceramic technology of choice.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011
2010
A Modified AES Algorithm for the Platform of Smartphone.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010
2009
Research of nano-material doped fiber in SBS slow light system.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009
Flat suppercontinuum generation in the inner cladding fiber with InP nano thin film.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009
Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
2008
The Development of a General Auxiliary Diagnosis System for Common Disease of Animal.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 2, 2008
Knowledge Acquisition and Representation of the General Auxiliary Diagnosis System for Common Disease of Animal.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 2, 2008
The Relationship between Monthdisease incidence Rate and climatic factor of Classical Swine Fever.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 2, 2008
One Prediction Model Based on BP Neural Network for Newcastle Disease.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 2, 2008
2006
A New Watermarking Protocol of Copyright Protection.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Analysis of Current Steganography Tools: Classifications & Features.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
2005
Flame Image of Pint-Sized Power Plant's Boiler Denoising Using Wavelet-Domain HMT Models.
Proceedings of the Advances in Intelligent Computing, 2005