Mohan Li

Orcid: 0000-0002-2290-046X

According to our database1, Mohan Li authored at least 59 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Security analysis of a reversible data hiding scheme in encrypted images by redundant space transfer.
J. King Saud Univ. Comput. Inf. Sci., January, 2024

An Access Control Method Against Unauthorized and Noncompliant Behaviors of Real-Time Data in Industrial IoT.
IEEE Internet Things J., January, 2024

WHISMA: A Speech-LLM to Perform Zero-shot Spoken Language Understanding.
CoRR, 2024

DiaLoc: An Iterative Approach to Embodied Dialog Localization.
CoRR, 2024

Reversible data hiding in encrypted image with secure multi-party for telemedicine applications.
Biomed. Signal Process. Control., 2024

Multi-Frequency Federated Learning for Human Activity Recognition Using Head-Worn Sensors.
Proceedings of the International Conference on Intelligent Environments, 2024

DiaLoc: An Iterative Approach to Embodied Dialog Localization.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Watch Your Words: Successfully Jailbreak LLM by Mitigating the "Prompt Malice".
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024

2023
Digital Twin-Based Cyber Range for Industrial Internet of Things.
IEEE Consumer Electron. Mag., November, 2023

SAT: sampling acceleration tree for adaptive database repartition.
World Wide Web (WWW), September, 2023

Neighborhood Matching Entity Alignment Model for Vulnerability Knowledge Graphs.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Hierarchical Name-based Routing for Content Provider Mobility in ICN.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Domain Adaptive Self-supervised Training of Automatic Speech Recognition.
Proceedings of the 24th Annual Conference of the International Speech Communication Association, 2023

Cumulative Attention Based Streaming Transformer ASR with Internal Language Model Joint Training and Rescoring.
Proceedings of the IEEE International Conference on Acoustics, 2023

Towards a Unified End-to-End Language Understanding System for Speech and Text Inputs.
Proceedings of the IEEE Automatic Speech Recognition and Understanding Workshop, 2023

Entity Alignment Based on Multi-view Interaction Model in Vulnerability Knowledge Graphs.
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023

2022
Robust Truth Discovery Against Multi-round Data Poisoning Attacks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Non-Autoregressive End-to-End Approaches for Joint Automatic Speech Recognition and Spoken Language Understanding.
Proceedings of the IEEE Spoken Language Technology Workshop, 2022

Multi-round Data Poisoning Attack and Defense against Truth Discovery in Crowdsensing Systems.
Proceedings of the 23rd IEEE International Conference on Mobile Data Management, 2022

Self-regularised Minimum Latency Training for Streaming Transformer-based Speech Recognition.
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022

Multiple-hypothesis RNN-T Loss for Unsupervised Fine-tuning and Self-training of Neural Transducer.
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022

Transformer-Based Streaming ASR with Cumulative Attention.
Proceedings of the IEEE International Conference on Acoustics, 2022

A Survey on Knowledge Graph Embedding.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A Survey on Data Poisoning Attacks and Defenses.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
Spatiotemporal Data Cleaning and Knowledge Fusion.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Honeypot Identification in Softwarized Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021

Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets.
Mob. Networks Appl., 2021

An Investigation into the Multi-channel Time Domain Speaker Extraction Network.
Proceedings of the IEEE Spoken Language Technology Workshop, 2021

Transformer-Based Online Speech Recognition with Decoder-end Adaptive Computation Steps.
Proceedings of the IEEE Spoken Language Technology Workshop, 2021

Head-Synchronous Decoding for Transformer-Based Streaming ASR.
Proceedings of the IEEE International Conference on Acoustics, 2021

A Review of Entity Alignment based on Graph Convolutional Neural Network.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

A Survey on Translating Embedding based Entity Alignment in Knowledge Graphs.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Improving HS-DACS Based Streaming Transformer ASR with Deep Reinforcement Learning.
Proceedings of the IEEE Automatic Speech Recognition and Understanding Workshop, 2021

2020
Automated Attack and Defense Framework toward 5G Security.
IEEE Netw., 2020

Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems.
IEEE Internet Things J., 2020

Knowledge Fusion and Spatiotemporal Data Cleaning: A Review.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

2019
Block-DEF: A secure digital evidence framework using blockchain.
Inf. Sci., 2019

Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers.
CoRR, 2019

Lightweight Anonymous Geometric Routing for Internet of Things.
IEEE Access, 2019

A General Framework for Adjustable Neighbor Discovery in Wireless Sensor Networks.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Framewise Supervised Training Towards End-to-End Speech Recognition Models: First Results.
Proceedings of the 20th Annual Conference of the International Speech Communication Association, 2019

Automatic Discovery Mechanism of Blockchain Nodes Based on the Kademlia Algorithm.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Review of the Factorization Problem of Large Integers.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Research on Content Extraction of Rich Text Web Pages.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Distributed Cryptanalysis Framework Based on Mobile Phones.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Bitcoin Network Size Estimation Based on Coupon Collection Model.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Implementation of MD5 Collision Attack in Program.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Network Protocol Analysis Base on WeChat PC Version.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Comparison of Machine Learning Algorithms for Detecting XSS Attacks.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Research on SQL Injection and Defense Technology.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

End-to-end Speech Recognition with Adaptive Computation Steps.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
Answering the Min-Cost Quality-Aware Query on Multi-Sources in Sensor-Cloud Systems.
Sensors, 2018

Currency Preserving Query: Selecting the Newest Values from Multiple Tables.
IEICE Trans. Inf. Syst., 2018

Uncertain Rule Based Method for Determining Data Currency.
IEICE Trans. Inf. Syst., 2018

Greedy Embedding Strategy for Dynamic Graphs Based on Spanning Tree.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Quality-Aware Query Based on Relative Source Quality.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Information Privacy of Cyber Transportation System: Opportunities and Challenges.
Proceedings of the 6th Annual Conference on Research in Information Technology, 2017

2016
A minimized-rule based approach for improving data currency.
J. Comb. Optim., 2016

2010
Efficient Duplicate Record Detection Based on Similarity Estimation.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010


  Loading...