2025
Web3DB: Web 3.0 RDBMS for Individual Data Ownership.
CoRR, April, 2025
Few-Shot Website Fingerprinting With Distribution Calibration.
IEEE Trans. Dependable Secur. Comput., 2025
ReZG: Retrieval-augmented zero-shot counter narrative generation for hate speech.
Neurocomputing, 2025
VuldiffFinder: Discovering inconsistencies in unstructured vulnerability information.
Comput. Secur., 2025
Towards cost optimization in security-aware service function chaining and embedding over multi-vendor edge networks.
Comput. Networks, 2025
2024
HAIGEN: Towards Human-AI Collaboration for Facilitating Creativity and Style Generation in Fashion Design.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., August, 2024
A green computing method for encrypted IoT traffic recognition based on traffic fingerprint graphs.
Peer Peer Netw. Appl., May, 2024
Detecting Offensive Language Based on Graph Attention Networks and Fusion Features.
IEEE Trans. Comput. Soc. Syst., February, 2024
Comprehensive vulnerability aspect extraction.
Appl. Intell., February, 2024
Fair$^{2}$2Trade: Digital Trading Platform Ensuring Exchange and Distribution Fairness.
IEEE Trans. Dependable Secur. Comput., 2024
Analyzing topics in social media for improving digital twinning based product development.
Digit. Commun. Networks, 2024
Interaction matters: Encrypted traffic classification via status-based interactive behavior graph.
Appl. Soft Comput., 2024
Anomaly Detection Under Normality-Shifted IoT Scenario: Filter, Detection, and Adaption.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024
PrivHChain: Monitoring the Supply Chain of Controlled Substances with Privacy-Preserving Hierarchical Blockchain.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024
GrAC: Graph-Based Anonymous Credentials from Identity Graphs on Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2024
SCAFT: A Scalable Crowd-Assisted Fair Trading Protocol.
Proceedings of the IEEE International Conference on Blockchain, 2024
2023
RAUCG: Retrieval-Augmented Unsupervised Counter Narrative Generation for Hate Speech.
CoRR, 2023
TISIN: Traceable Information Sharing in Intermittent Networks.
Proceedings of the IEEE Military Communications Conference, 2023
BDTS: Blockchain-Based Data Trading System.
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Cost Optimization in Security-Aware Service Function Chain Deployment with Diverse Vendors.
Proceedings of the IEEE Global Communications Conference, 2023
2022
ProvNet: Networked bi-directional blockchain for data sharing with verifiable provenance.
J. Parallel Distributed Comput., 2022
BDTS: A Blockchain-based Data Trading System with Fair Exchange.
CoRR, 2022
Detecting Offensive Language on Social Networks: An End-to-end Detection Method based on Graph Attention Networks.
CoRR, 2022
Trac<sup>2</sup>Chain: trackability and traceability of graph data in blockchain with linkage privacy.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Monitoring Provenance of Delegated Personal Data with Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2022
2021
Histogram Publication over Numerical Values under Local Differential Privacy.
Wirel. Commun. Mob. Comput., 2021
Learning disentangled user representation with multi-view information fusion on social networks.
Inf. Fusion, 2021
Susceptible user search for defending opinion manipulation.
Future Gener. Comput. Syst., 2021
Using Provenance to Evaluate Risk and Benefit of Data Sharing.
Proceedings of the 13th International Workshop on Theory and Practice of Provenance, 2021
Prv<sup>2</sup>chain: Storage of Tree-structured Provenance Records in Blockchain with Linkage Privacy.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
FairTrade: Efficient Atomic Exchange-based Fair Exchange Protocol for Digital Data Trading.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
2020
Job Scheduling to Minimize Total Completion Time on Multiple Edge Servers.
IEEE Trans. Netw. Sci. Eng., 2020
Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing.
KSII Trans. Internet Inf. Syst., 2020
Budgeted Persuasion on User Opinions via Varying Susceptibility.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020
2019
A Novel Task Allocation Algorithm in Mobile Crowdsensing with Spatial Privacy Preservation.
Wirel. Commun. Mob. Comput., 2019
A Second-Order Diffusion Model for Influence Maximization in Social Networks.
IEEE Trans. Comput. Soc. Syst., 2019
Anomaly residual prediction with spatial-temporal and perceptual constraints.
J. Electronic Imaging, 2019
Privacy Preserving Machine Learning with Limited Information Leakage.
Proceedings of the Network and System Security - 13th International Conference, 2019
NTIRE 2019 Challenge on Real Image Super-Resolution: Methods and Results.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019
NTIRE 2019 Challenge on Real Image Denoising: Methods and Results.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019
2018
Physarum-inspired routing protocol for energy harvesting wireless sensor networks.
Telecommun. Syst., 2018
Relay selection based on social relationship prediction and information leakage reduction for mobile social networks.
Math. Found. Comput., 2018
2017
Visual Tracking by Deep Discriminative Map.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017
Outsourcing Encrypted Excel Files.
Proceedings of the Information Security Practice and Experience, 2017
Deep Scale Feature for Visual Tracking.
Proceedings of the Image and Graphics - 9th International Conference, 2017
Robust visual tracking with deep feature fusion.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
2016
A Short-Time Three-Phase Single-Rail Precharge Logic against Differential Power Analysis.
IEICE Trans. Electron., 2016
2015
A low power and high speed CAM design using pulsed voltage for search-line.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015