Shiwei Chen

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
SQL-Net: Semantic Query Learning for Point-Supervised Temporal Action Localization.
IEEE Trans. Multim., 2025

2024
A Vision-Based Force/Position Fusion Actuation-Sensing Scheme for Tendon-Driven Mechanism.
IEEE Robotics Autom. Lett., September, 2024

Differential-Invariant Subspace Cryptanalysis - A Real-Time Attack Against IoT-Friendly Word-Based Block Ciphers.
IEEE Internet Things J., May, 2024

Action-Semantic Consistent Knowledge for Weakly-Supervised Action Localization.
IEEE Trans. Multim., 2024

Robust adaptive prescribed performance control for nonlinear systems with arbitrary initial states.
J. Frankl. Inst., 2024

A Second Preimage Attack on the XOR Hash Combiner.
IET Inf. Secur., 2024

Distilling Fine-grained Sentiment Understanding from Large Language Models.
CoRR, 2024

SafePaint: Anti-forensic Image Inpainting with Domain Adaptation.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Multiple Knowledge-Enhanced Interactive Graph Network for Multimodal Conversational Emotion Recognition.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024

Self-Training with Pseudo-Label Scorer for Aspect Sentiment Quad Prediction.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024

Enhancing Multi-Label Classification via Dynamic Label-Order Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Piecewise Trajectory and Angle Constraint-Based Fractional-Order Sliding Mode Control.
IEEE Trans. Aerosp. Electron. Syst., October, 2023

Multi-Agent Trajectory Prediction With Spatio-Temporal Sequence Fusion.
IEEE Trans. Multim., 2023

Research on Influencing Factors and Control Measures of Construction Cost Overrun in China's Expressway Projects.
Int. J. Fuzzy Syst. Appl., 2023

An Optimization Model for the Demand-Responsive Transit With Non-Fixed Stops and Multi-Vehicle Type.
IEEE Access, 2023

Target-to-Source Augmentation for Aspect Sentiment Triplet Extraction.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

An Empirical Study of Sentiment-Enhanced Pre-Training for Aspect-Based Sentiment Analysis.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

2022
Acquisition and cognition information of human body swing.
J. Ind. Inf. Integr., 2022

Boundary-Driven Table-Filling for Aspect Sentiment Triplet Extraction.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

2021
Construction of higher-level MDS matrices in nested SPNs.
Inf. Sci., 2021

Security Analysis of Even-Mansour Structure Hash Functions.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
Sentiment Analysis About Investors and Consumers in Energy Market Based on BERT-BiLSTM.
IEEE Access, 2020

Zero-Shot Image Classification via Consistent Subspace Learning.
Proceedings of the CNIOT 2020: 2020 International Conference on Computing, 2020

2019
Classification of EEG-based single-trial motor imagery tasks using a B-CSP method for BCI.
Frontiers Inf. Technol. Electron. Eng., 2019

A Structural Attack on Type-I Generalized Feistel Networks.
IEEE Access, 2019

2018
Preimage Attacks on Some Hashing Modes Instantiating Reduced-Round LBlock.
IEEE Access, 2018

Machine Learning based Construction simulation and Optimization.
Proceedings of the 2018 Winter Simulation Conference, 2018

2015
A second preimage attack on zipper hash.
Secur. Commun. Networks, 2015

An Improved Way to Construct the Parity-check Equations in Fast Correlation Attacks.
J. Networks, 2015

Optimally maintaining a multi-state system with limited imperfect preventive repairs.
Int. J. Syst. Sci., 2015

2009
A Second Preimage Attack on the Merkle-Damgard Scheme with a Permutation for Hash Functions.
Proceedings of the SECRYPT 2009, 2009

2007
An Improved Collision Attack on MD5 Algorithm.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007


  Loading...