Jiachun Li

Orcid: 0009-0009-4486-9975

According to our database1, Jiachun Li authored at least 40 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
De-Anonymizing Avatars in Virtual Reality: Attacks and Countermeasures.
IEEE Trans. Mob. Comput., December, 2024

Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables.
IEEE Trans. Inf. Forensics Secur., 2024

Privacy-Preserving Liveness Detection for Securing Smart Voice Interfaces.
IEEE Trans. Dependable Secur. Comput., 2024

FDAA: A feature distribution-aware transferable adversarial attack method.
Neural Networks, 2024

MIRAGE: Evaluating and Explaining Inductive Reasoning Process in Language Models.
CoRR, 2024

The Power of Adaptivity in Experimental Design.
CoRR, 2024

RWKU: Benchmarking Real-World Knowledge Unlearning for Large Language Models.
CoRR, 2024

Towards Faithful Chain-of-Thought: Large Language Models are Bridging Reasoners.
CoRR, 2024

On the Optimal Regret of Locally Private Linear Contextual Bandit.
CoRR, 2024

Differentially Private Estimation of CATE in Adaptive Experiment.
CoRR, 2024

Privacy Preserving Adaptive Experiment Design.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Towards Scalable GPU-Accelerated SNN Training via Temporal Fusion.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2024, 2024

LINKED: Eliciting, Filtering and Integrating Knowledge in Large Language Model for Commonsense Reasoning.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024

Leros: Learning Explicit Reasoning on Synthesized Data for Commonsense Question Answering.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024

Focus on Your Question! Interpreting and Mitigating Toxic CoT Problems in Commonsense Reasoning.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024

2023
A variable adversarial attack method based on filtering.
Comput. Secur., November, 2023

Secure and Efficient UAV Tracking in Space-Air-Ground Integrated Network.
IEEE Trans. Veh. Technol., August, 2023

Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches.
CoRR, 2023

What Events Do Pre-trained Language Models Learn from Text? Probing Event-Based Commonsense Knowledge by Confidence Sorting.
Proceedings of the Natural Language Processing and Chinese Computing, 2023

De-anonymization Attacks on Metaverse.
Proceedings of the IEEE INFOCOM 2023, 2023

MagFingerprint: A Magnetic Based Device Fingerprinting in Wireless Charging.
Proceedings of the IEEE INFOCOM 2023, 2023

GB-IDS: An Intrusion Detection System for CAN Bus Based on Graph Analysis.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

EM-Whisperer: A Voice Injection Attack via Powerline for Virtual Meeting Scenarios.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

Data Poisoning Attack Against Anomaly Detectors in Digital Twin-Based Networks.
Proceedings of the IEEE International Conference on Communications, 2023

2022
A Federated Learning Based Privacy-Preserving Smart Healthcare System.
IEEE Trans. Ind. Informatics, 2022

Assortment Optimization Under the Multivariate MNL Model.
CoRR, 2022

Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers.
Proceedings of the 31st USENIX Security Symposium, 2022

Deep Scale-Aware Image Smoothing.
Proceedings of the IEEE International Conference on Acoustics, 2022

CN-AutoMIC: Distilling Chinese Commonsense Knowledge from Pretrained Language Models.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

2021
Detecting the Capacitance-Based Gamepad for Protecting Mobile Game Fairness.
IEEE Trans. Computers, 2021

We Can Always Catch You: Detecting Adversarial Patched Objects WITH or WITHOUT Signature.
CoRR, 2021

A personalized trajectory privacy protection method.
Comput. Secur., 2021

BatFL: Backdoor Detection on Federated Learning in e-Health.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

2019
Inferring Student's Attention in a Machine Learning Approach: A Feasibility Study.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019

2018
Perturbation Sensitivity Analysis and Dynamic Topology Optimization for Heat Conduction Structure.
Wirel. Pers. Commun., 2018

Research on Co-Location Privacy-Preserving System.
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

2016
Promoting Students' Engagement? Flipped Classroom Matters a Lot - An Empirical Research in College.
Proceedings of the Blended Learning: Aligning Theory with Practices, 2016

2010
A Handheld Testing System for Irrigation System Management.
Proceedings of the Information and Automation - International Symposium, 2010

2009
Topology Optimization of Thermal Structure Based Bi-directional Interpolation Model.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

2006
State Machine Based CDMA Stress Testing Service System.
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006


  Loading...