2025
Fine-grained flood disaster information extraction incorporating multiple semantic features.
Int. J. Digit. Earth, December, 2025
The Challenge of Identifying the Origin of Black-Box Large Language Models.
CoRR, March, 2025
Synthetic Artifact Auditing: Tracing LLM-Generated Synthetic Data Usage in Downstream Applications.
CoRR, February, 2025
2024
A Two-Layer Dynamic ECU Group Management Scheme for In-Vehicle CAN Bus.
IEEE Trans. Intell. Transp. Syst., August, 2024
A Multilevel Electronic Control Unit Re-Encryption Scheme for Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., January, 2024
NeFF: Neural Feature Fields for Few-Shot View Synthesis Addressing the Shape-Radiance Ambiguity.
IEEE Signal Process. Lett., 2024
Breaking Agents: Compromising Autonomous LLM Agents Through Malfunction Amplification.
CoRR, 2024
Rapid Adoption, Hidden Risks: The Dual Impact of Large Language Model Customization.
CoRR, 2024
Instruction Backdoor Attacks Against Customized LLMs.
Proceedings of the 33rd USENIX Security Symposium, 2024
Quantifying Privacy Risks of Prompts in Visual Prompt Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024
You Only Prompt Once: On the Capabilities of Prompt Learning on Large Language Models to Tackle Toxic Content.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Test-Time Poisoning Attacks Against Test-Time Adaptation Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Composite Backdoor Attacks Against Large Language Models.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2024, 2024
Unsupervised Learning of Facial Optical Flow via Occlusion-Aware Global-Local Matching.
Proceedings of the IEEE International Conference on Acoustics, 2024
Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
"Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Driveable 3D Human Reconstruction Focusing on Facial Precision Enhancement.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2024
Overview and Trend of Large-scale Model Deployment Mode.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2024
Human Model Reconstruction with Facial Region Optimization: A Fusion Nerf Approach.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2024
Research on Multi-level Trustworthy Multimedia Data Broadcasting Network Based on Blockchain Oracles.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2024
Research on New Media Digital Copyright Registration and Trading Based on Blockchain.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2024
FAKEPCD: Fake Point Cloud Detection via Source Attribution.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Exploiting UAV for Air-Ground Integrated Federated Learning: A Joint UAV Location and Resource Optimization Approach.
IEEE Trans. Green Commun. Netw., September, 2023
Joint Training and Resource Allocation Optimization for Federated Learning in UAV Swarm.
IEEE Internet Things J., February, 2023
Comprehensive Assessment of Toxicity in ChatGPT.
CoRR, 2023
On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts.
CoRR, 2023
Prompt Backdoors in Visual Prompt Learning.
CoRR, 2023
Robustness Over Time: Understanding Adversarial Examples' Effectiveness on Longitudinal Versions of Large Language Models.
CoRR, 2023
Watermarking Diffusion Model.
CoRR, 2023
A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots.
Proceedings of the 32nd USENIX Security Symposium, 2023
One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles.
Proceedings of the 32nd USENIX Security Symposium, 2023
Backdoor Attacks Against Dataset Distillation.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Generated Graph Detection.
Proceedings of the International Conference on Machine Learning, 2023
Adaptive Resource Allocation Based on Scoring Mechanism and Priority for 3D rendering.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023
Research on 3D Driveable Digital Human Generation System.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023
Research on 3D Object Reconstruction Based on Single-view RGB Image.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023
Edge Fusion of Intelligent Industrial Park Based on MatrixOne and Pravega.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023
A Design of Edge Distributed Video Analysis System Based on Serverless Computing Service.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023
Computing Offloading Based on Deep Reinforcement Learning For Virtual Reality Scene.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023
An Intelligent Industrial Vision Scheme for Flexible Manufacturing Based on 5G Edge Cloud Collaboration.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023
An Adaptive Video Streaming Delivery Structure based on Mobile Edge Intelligent.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023
Optimization of VR Video Wireless Transmission Based on Fountain Code.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023
Resource Pre-caching Strategy of Digital Twin System Based on Hierarchical MEC Architecture.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023
Deployment Strategy of Edge Computing Server for 3D Video Transmission in Digital Twin Cities.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023
Federated Learning Model Training Mechanism with Edge Cloud Collaboration for Services in Smart Cities.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023
2022
Gradient boosting survival tree with applications in credit scoring.
J. Oper. Res. Soc., 2022
Backdoor Attacks in the Supply Chain of Masked Image Modeling.
CoRR, 2022
A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned.
Proceedings of the 31st USENIX Security Symposium, 2022
Inference Attacks Against Graph Neural Networks.
Proceedings of the 31st USENIX Security Symposium, 2022
Design and Implementation of Distributed Rendering System.
Proceedings of the IEEE Smartworld, 2022
Model Stealing Attacks Against Inductive Graph Neural Networks.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Amplifying Membership Exposure via Data Poisoning.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Towards Understanding the Robustness Against Evasion Attack on Categorical Data.
Proceedings of the Tenth International Conference on Learning Representations, 2022
Finding MNEMON: Reviving Memories of Node Embeddings.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
CERBERUS: Exploring Federated Prediction of Security Events.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
On the Privacy Risks of Cell-Based NAS Architectures.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
5G and F5G Converged Network Architecture for Fusion System of Video and 3D Model in Intelligent Park.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2022
Fine-grained object tracking system infrastructure based on cloud-edge collaboration.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2022
Multimedia Analytics Based On Air-assisted Vehicle Network In Smart City.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2022
A QoE-driven Adaptive Transmission Scheme for Streaming Media Service.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2022
An Algorithm of Emotion Recognition And Valence of Drivers on Multimodal Data.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2022
Edge-to-Cloud Intelligent Vehicle-Infrastructure Based on 5G Time-Sensitive Network Integration.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2022
2021
UAVs as an Intelligent Service: Boosting Edge Intelligence for Air-Ground Integrated Networks.
IEEE Netw., 2021
Node-Level Membership Inference Attacks Against Graph Neural Networks.
CoRR, 2021
JABBIC Lookups: A Backend Telemetry-Based System for Malware Triage.
Proceedings of the Security and Privacy in Communication Networks, 2021
Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Understanding Worldwide Private Information Collection on Android.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Industrial Vision Optimization Distributed Strategy based on Edge Intelligence Collaboration.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021
Industrial Intelligent Edge Computing System based on 5G.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021
Stock Trend Prediction of Communication Industry Based on LSTM Neural Network Algorithm and Research of Industry Development Strategy: - A Case Study of Zhongxing Telecommunication Equipment Corporation.
Proceedings of the ICCMB 2021: The 4th International Conference on Computers in Management and Business, Singapore, 30 January, 2021, 2021
Pragmatic Benchmarking for Research Computing.
Proceedings of the 2021 IEEE High Performance Extreme Computing Conference, 2021
Joint UAV Location and Resource Allocation for Air-Ground Integrated Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2021
ANDRuspex: Leveraging Graph Representation Learning to Predict Harmful App Installations on Mobile Devices.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
2020
A reference map of the human binary protein interactome.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Nat., 2020
Empowering the Edge Intelligence by Air-Ground Integrated Federated Learning in 6G Networks.
CoRR, 2020
UAVs as a Service: Boosting Edge Intelligence for Air-Ground Integrated Networks.
CoRR, 2020
Attackability Characterization of Adversarial Evasion Attack on Discrete Data.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020
The Tangled Genealogy of IoT Malware.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Water Temperature Observation by Coastal Acoustic Tomography in Artificial Upwelling Area.
Sensors, 2019
ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks.
Proceedings of the 28th USENIX Security Symposium, 2019
Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization.
Proceedings of the International Joint Conference on Neural Networks, 2019
Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
IoT Security and Privacy Labels.
Proceedings of the Privacy Technologies and Policy - 7th Annual Privacy Forum, 2019
2018
Before Toasters Rise Up: A View into the Emerging IoT Threat Landscape.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Multi-label Learning with Highly Incomplete Data via Collaborative Embedding.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018
Tiresias: Predicting Security Events Through Deep Learning.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
SparseLoc: Indoor Localization Using Sparse Representation.
IEEE Access, 2017
Accurate cyber-physical system simulation for distributed visual search applications.
Proceedings of the 3rd IEEE International Forum on Research and Technologies for Society and Industry, 2017
Mixed Installation to Optimize the Position and Type Selection of Turbines for Wind Farms.
Proceedings of the Neural Information Processing - 24th International Conference, 2017
Towards Deeper Insights into Deep Learning from Imbalanced Data.
Proceedings of the Computer Vision - Second CCF Chinese Conference, 2017
Marmite: Spreading Malicious File Reputation Through Download Graphs.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Mini-Batch Spectral Clustering.
CoRR, 2016
Insights into rooted and non-rooted Android mobile devices with behavior analytics.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Accurate spear phishing campaign attribution and early detection.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Partially Supervised Graph Embedding for Positive Unlabelled Feature Selection.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016
Content-Agnostic Malware Detection in Heterogeneous Malicious Distribution Graph.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016
2015
Quality of Experience Study on Dynamic Adaptive Streaming Based on HTTP.
IEICE Trans. Commun., 2015
Accelerating Support Vector Machine Learning with GPU-Based MapReduce.
Proceedings of the 2015 IEEE International Conference on Systems, 2015
All your Root Checks are Belong to Us: The Sad State of Root Detection.
Proceedings of the 13th ACM International Symposium on Mobility Management and Wireless Access, 2015
A Method of Traffic Travel Status Segmentation Based on Position Trajectories.
Proceedings of the IEEE 18th International Conference on Intelligent Transportation Systems, 2015
2014
Risk-Sensitive Reinforcement Learning.
Neural Comput., 2014
Study of collective user behaviour in Twitter: a fuzzy approach.
Neural Comput. Appl., 2014
A Software Platform Design for Objective Video QoE Assessment.
J. Softw., 2014
A Novel Structure of HTTP Adaptive Streaming Based on Unequal Error Protection Rateless Code.
IEICE Trans. Inf. Syst., 2014
Maximum achievable arrival rate of secondary users under GoS constraints in cognitive radio networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014
A method of QoE evaluation for adaptive streaming based on bitrate distribution.
Proceedings of the IEEE International Conference on Communications, 2014
Bandwidth estimation of rate adaption algorithm in DASH.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014
Risk-averse reinforcement learning for algorithmic trading.
Proceedings of the IEEE Conference on Computational Intelligence for Financial Engineering & Economics, 2014
A unified framework for risk-sensitive Markov control processes.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014
An intelligent video streaming delivery of SVC based on rateless UEP convolutional code.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014
MR-TRIAGE: Scalable multi-criteria clustering for big data security intelligence applications.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014
2013
Risk-Sensitive Markov Control Processes.
SIAM J. Control. Optim., 2013
Construction of approximation spaces for reinforcement learning.
J. Mach. Learn. Res., 2013
Performance Evaluation and Accuracy Upgrading of PESQ in Chinese Environment.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013
A study on Quality of Experience for adaptive streaming service.
Proceedings of the IEEE International Conference on Communications, 2013
2012
Enhancing privacy in cloud computing via policy-based obfuscation.
J. Supercomput., 2012
QoE-based evaluation model on video streaming service quality.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012
Large-scale multimedia data mining using MapReduce framework.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
2011
Evaluation of XPath queries with preducates: an Eulerian cycle theory based sequencing approach.
Comput. Syst. Sci. Eng., 2011
A Unified Framework for Risk-sensitive Markov Decision Processes with Finite State and Action Spaces
CoRR, 2011
2010
Discovery of time-varying relations using fuzzy formal concept analysis and associations.
Int. J. Intell. Syst., 2010
Context-Aware Privacy Design Pattern Selection.
Proceedings of the Trust, 2010
Soft Concept Hierarchies to Summarise Data Streams and Highlight Anomalous Changes.
Proceedings of the Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications, 2010
Intelligent user search behaviour knowledge discovery.
Proceedings of the FUZZ-IEEE 2010, 2010
Text fragment extraction using incremental evolving fuzzy grammar fragments learner.
Proceedings of the FUZZ-IEEE 2010, 2010
2009
Order Independent Incremental Evolving Fuzzy Grammar Fragment Learner.
Proceedings of the Ninth International Conference on Intelligent Systems Design and Applications, 2009
Minimal Combination for Incremental Grammar Fragment Learning.
Proceedings of the Joint 2009 International Fuzzy Systems Association World Congress and 2009 European Society of Fuzzy Logic and Technology Conference, 2009
Data Integration, Approximate Categorisation and Fuzzy Associations.
Proceedings of the Joint 2009 International Fuzzy Systems Association World Congress and 2009 European Society of Fuzzy Logic and Technology Conference, 2009
A Privacy Manager for Cloud Computing.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009
Data Protection-Aware Design for Cloud Services.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009
mTRACK - Monitoring time-varying relations in approximately categorised knowledge.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009
Intelligent Security Data Analysis.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Fuzzy Association Rules to Summarise Multiple Taxonomies in Large Databases.
Proceedings of the Scalable Fuzzy Algorithms for Data Management and Analysis, 2009
2008
Incremental Evolution of Fuzzy Grammar Fragments to Enhance Instance Matching and Text Mining.
IEEE Trans. Fuzzy Syst., 2008
Granular Association Rules for Multiple Taxonomies: A Mass Assignment Approach.
Proceedings of the Uncertainty Reasoning for the Semantic Web I, 2008
Automated semantic tagging using fuzzy grammar fragments.
Proceedings of the FUZZ-IEEE 2008, 2008
Granular Association Analysis.
Proceedings of the 2008 ECSIS Symposium on Bio-inspired, 2008
2007
A Mass Assignment Approach to Granular Association Rules for Multiple Taxonomies.
Proceedings of the Third ISWC Workshop on Uncertainty Reasoning for the Semantic Web Busan, 2007
Finding Soft Relations in Granular Information Hierarchies.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007
Computational Intelligence Support for Smart Queries and Adaptive Data.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007
2005
Accelerating data retrieval steps in XML documents.
PhD thesis, 2005
Improving Access to Multimedia Using Multi-source Hierarchical Meta-data.
Proceedings of the Adaptive Multimedia Retrieval: User, 2005
Efficient XPath Evaluation.
Proceedings of the Advances in Databases and Information Systems, 2005
2004
A Self-adaptive Scope Allocation Scheme for Labeling Dynamic XML Documents.
Proceedings of the Database and Expert Systems Applications, 15th International Conference, 2004
2003
Clustering Schemaless XML Documents.
Proceedings of the On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE, 2003
2000
Multi-slice helical CT: scan and image temporal resolution.
IEEE Trans. Medical Imaging, 2000