2025
Causal-LLaVA: Causal Disentanglement for Mitigating Hallucination in Multimodal Large Language Models.
CoRR, May, 2025
2024
Automatic measurement of fetal abdomen subcutaneous soft tissue thickness from ultrasound image based on a U-shaped attention network with morphological method.
Int. J. Imaging Syst. Technol., January, 2024
Repetitive Transcranial Magnetic Stimulation on Individualized Spots Based on Task functional Magnetic Resonance Imaging Improves Swallowing Function in Poststroke Dysphagia.
Brain Connect., 2024
Enhancing Database Encryption: Adaptive Measures for Digital Assets Against LLMs-Based Reverse Engineering.
Proceedings of the Annual Computer Security Applications Conference, 2024
2023
A Self-Attention-Based Stock Prediction Method Using Long Short-Term Memory Network Architecture.
Proceedings of the Data Science, 2023
2022
A high precision intrusion detection system for network security communication based on multi-scale convolutional neural network.
Future Gener. Comput. Syst., 2022
Open-Set Intrusion Detection with MinMax Autoencoder and Pseudo Extreme Value Machine.
Proceedings of the International Joint Conference on Neural Networks, 2022
2021
Zero-Shot Feature Selection via Transferring Supervised Knowledge.
Int. J. Data Warehous. Min., 2021
A Novel Tree-based Neural Network for Android Code Smells Detection.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
2020
Edge2vec: Edge-based Social Network Embedding.
ACM Trans. Knowl. Discov. Data, 2020
Extending LINE for Network Embedding With Completely Imbalanced Labels.
Int. J. Data Warehous. Min., 2020
Network Embedding with Completely-imbalanced Labels.
CoRR, 2020
TCN-ATT: A Non-recurrent Model for Sequence-Based Malware Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020
OpenSMax: Unknown Domain Generation Algorithm Detection.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020
BiSample: Bidirectional Sampling for Handling Missing Data with Local Differential Privacy.
Proceedings of the Database Systems for Advanced Applications, 2020
2019
DeepDirect: Learning Directions of Social Ties with Edge-Based Network Embedding.
IEEE Trans. Knowl. Data Eng., 2019
Feature Selection via Transferring Knowledge Across Different Classes.
ACM Trans. Knowl. Discov. Data, 2019
基于注意力机制的恶意软件调用序列检测 (Attention Mechanism Based Detection of Malware Call Sequences).
计算机科学, 2019
Zero-shot Feature Selection via Exploiting Semantic Knowledge.
CoRR, 2019
Conditional Analysis for Key-Value Data with Local Differential Privacy.
CoRR, 2019
Distributed Clustering in the Anonymized Space with Local Differential Privacy.
CoRR, 2019
DeepDirect: Learning Directions of Social Ties with Edge-Based Network Embedding (Extended Abstract).
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019
Test4Deep: an Effective White-Box Testing for Deep Neural Networks.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019
2018
Efficient Computation of G-Skyline Groups.
IEEE Trans. Knowl. Data Eng., 2018
CRITIC-Based Node Importance Evaluation in Skeleton-Network Reconfiguration of Power Grids.
IEEE Trans. Circuits Syst. II Express Briefs, 2018
Efficient Computation of G-Skyline Groups (Extended Abstract).
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
Randomized Bit Vector: Privacy-Preserving Encoding Mechanism.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018
RSDNE: Exploring Relaxed Similarity and Dissimilarity from Completely-Imbalanced Labels for Network Embedding.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018
2017
Information-Balance-Aware Approximated Summarization of Data Provenance.
Sci. Program., 2017
云服务环境下的密钥管理问题和挑战 (Key Management Issues and Challenges in Cloud).
计算机科学, 2017
Equivalence between LINE and Matrix Factorization.
CoRR, 2017
Multiple Source Detection without Knowing the Underlying Propagation Model.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017
2016
Transition Adjacency Relation Computation Based on Unfolding: Potentials and Challenges.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016
Causality Based Propagation History Ranking in Social Networks.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016
Preference Join on Heterogeneous Data.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016
2015
Computation of Transition Adjacency Relations Based on Complete Prefix Unfolding (Technical Report).
CoRR, 2015
MAVis: A Multiple Microblogs Analysis and Visualization Tool.
Proceedings of the Database Systems for Advanced Applications, 2015
A Context-Aware Approach for Dynamic GUI Testing of Android Applications.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
2014
Towards Policy Retrieval for Provenance Based Access Control Model.
Proceedings of the 13th IEEE International Conference on Trust, 2014
KP-ABE with Attribute Extension: Towards Functional Encryption Schemes Integration.
Proceedings of the Sixth International Symposium on Parallel Architectures, 2014
User Interests Imbalance Exploration in Social Recommendation: A Fitness Adaptation.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014
Index-Based OLAP Aggregation for In-Memory Cluster Computing.
Proceedings of the International Conference on Cloud Computing and Big Data, 2014
DZMQ: A Decentralized Distributed Messaging System for Realtime Web Applications and Services.
Proceedings of the 11th Web Information System and Application Conference, 2014
2013
A Multidimensional OLAP Engine Implementation in Key-Value Database Systems.
Proceedings of the Advancing Big Data Benchmarks, 2013
A Practice of TPC-DS Multidimensional Implementation on NoSQL Database Systems.
Proceedings of the Performance Characterization and Benchmarking, 2013
Exploring big data in small forms: A multi-layered knowledge extraction of social networks.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013
2010
Synthesizing: Art of Anonymization.
Proceedings of the Database and Expert Systems Applications, 21st International Conference, 2010
Implementation of TPC-DS Testing Tool.
Proceedings of the Second International Workshop on Database Technology and Applications, 2010
2009
Privacy Aware Engineering: A Case Study.
J. Softw., 2009
Towards Compliance and Accountability: a Framework for Privacy Online.
J. Comput., 2009
Trust and Privacy in Dissemination Control.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009
An Improved Weighted-Feature Clustering Algorithm for K-anonymity.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
A Practical Database Intrusion Detection System Framework.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009
2008
On Access-Unrestricted Data Anonymity and Privacy Inference Disclosure Control.
Int. J. Inf. Secur. Priv., 2008
A Personalized (a, k)-Anonymity Model.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Dynamic Purpose-Based Access Control.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008
Secure Dataspace with Access Policies.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008
A Multi-Dimensional K-Anonymity Model for Hierarchical Data.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
A Configurable Web Service Performance Testing Framework.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008
An Extensible Data Model with Security Support for Dataspace Management.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008
Privacy Inference Attacking and Prevention on Multiple Relative K-Anonymized Microdata Sets.
Proceedings of the Progress in WWW Research and Development, 2008
2007
Risk & Distortion Based K-Anonymity.
Proceedings of the Information Security Applications, 8th International Workshop, 2007
Achieving <i>k</i> -Anonymity Via a Density-Based Clustering Method.
Proceedings of the Advances in Data and Web Management, 2007
Study on Linked List-based Algorithm for Metarule-guided Mining of Multidimensional Quantitative Association Rules.
Proceedings of the Third International Conference on Natural Computation, 2007
Detecting Change in Data Stream: Using Sampling Technique.
Proceedings of the Third International Conference on Natural Computation, 2007
Privacy Protection on Multiple Sensitive Attributes.
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Capture Inference Attacks for K-Anonymity with Privacy Inference Logic.
Proceedings of the Advances in Databases: Concepts, 2007
2006
Towards a dynamic multi-policy dissemination control model: (DMDCON).
SIGMOD Rec., 2006
Role-Based Peer-to-Peer Model: Capture Global Pseudonymity for Privacy Protection.
Proceedings of the Advances in Web-Age Information Management, 2006
Towards the Diversity of Sensitive Attributes in k-Anonymity.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006
Towards an Anti-inference (K, l)-Anonymity Model with Value Association Rules.
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006
Towards a More Reasonable Generalization Cost Metric for K-Anonymization.
Proceedings of the Flexible and Efficient Information Handling, 2006
Resource Management Continuity With Constraint Inheritance Relation.
Proceedings of the The First International Conference on Availability, 2006
1994
Modélisation et simulation des systèmes de production : une approche orientée-objets. (Object-riented modeling and simulation for manufacturing systems).
PhD thesis, 1994