Shutao Xia

Orcid: 0000-0002-8639-982X

According to our database1, Shutao Xia authored at least 445 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
On the Effectiveness of Adversarial Training Against Backdoor Attacks.
IEEE Trans. Neural Networks Learn. Syst., October, 2024

Bounds and Constructions of Singleton-Optimal Locally Repairable Codes With Small Localities.
IEEE Trans. Inf. Theory, October, 2024

Optimal ternary locally repairable codes.
Des. Codes Cryptogr., September, 2024

Hugs Bring Double Benefits: Unsupervised Cross-Modal Hashing with Multi-granularity Aligned Transformers.
Int. J. Comput. Vis., August, 2024

Node-Level Graph Regression With Deep Gaussian Process Models.
IEEE Trans. Artif. Intell., June, 2024

Delving into Identify-Emphasize Paradigm for Combating Unknown Bias.
Int. J. Comput. Vis., June, 2024

CFGN: A Lightweight Context Feature Guided Network for Image Super-Resolution.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2024

Portfolio Selection via Graph-Aware Gaussian Processes With Generalized Gaussian Likelihood.
IEEE Trans. Artif. Intell., February, 2024

Backdoor Learning: A Survey.
IEEE Trans. Neural Networks Learn. Syst., January, 2024

New Constructions of MDS Array Codes and Optimal Locally Repairable Array Codes.
IEEE Trans. Inf. Theory, 2024

Backdoor Attack With Sparse and Invisible Trigger.
IEEE Trans. Inf. Forensics Secur., 2024

Imperceptible and Robust Backdoor Attack in 3D Point Cloud.
IEEE Trans. Inf. Forensics Secur., 2024

Pyramid hybrid pooling quantization for efficient fine-grained image retrieval.
Pattern Recognit. Lett., 2024

IntLoRA: Integral Low-rank Adaptation of Quantized Diffusion Models.
CoRR, 2024

BoostAdapter: Improving Vision-Language Test-Time Adaptation via Regional Bootstrapping.
CoRR, 2024

Denial-of-Service Poisoning Attacks against Large Language Models.
CoRR, 2024

Block-to-Scene Pre-training for Point Cloud Hybrid-Domain Masked Autoencoders.
CoRR, 2024

Towards Scalable Semantic Representation for Recommendation.
CoRR, 2024

CALoR: Towards Comprehensive Model Inversion Defense.
CoRR, 2024

ReFIR: Grounding Large Restoration Models with Retrieval Augmentation.
CoRR, 2024

MIBench: A Comprehensive Benchmark for Model Inversion Attack and Defense.
CoRR, 2024

TimeBridge: Non-Stationarity Matters for Long-term Time Series Forecasting.
CoRR, 2024

3D-GP-LMVIC: Learning-based Multi-View Image Coding with 3D Gaussian Geometric Priors.
CoRR, 2024

Anno-incomplete Multi-dataset Detection.
CoRR, 2024

CLIP-Guided Networks for Transferable Targeted Attacks.
CoRR, 2024

Pre-training Point Cloud Compact Model with Partial-aware Reconstruction.
CoRR, 2024

Video Watermarking: Safeguarding Your Video from (Unauthorized) Annotations by Video-based LLMs.
CoRR, 2024

Pre-Trained Vision-Language Models as Partial Annotators.
CoRR, 2024

DreamBench++: A Human-Aligned Benchmark for Personalized Image Generation.
CoRR, 2024

Hierarchical Features Matter: A Deep Exploration of GAN Priors for Improved Dataset Distillation.
CoRR, 2024

One Perturbation is Enough: On Generating Universal Adversarial Perturbations against Vision-Language Pre-training Models.
CoRR, 2024

Generative Pre-Trained Diffusion Paradigm for Zero-Shot Time Series Forecasting.
CoRR, 2024

GI-NAS: Boosting Gradient Inversion Attacks through Adaptive Neural Architecture Search.
CoRR, 2024

LCM: Locally Constrained Compact Point Cloud Model for Masked Point Modeling.
CoRR, 2024

MambaVC: Learned Visual Compression with Selective State Spaces.
CoRR, 2024

GMMFormer v2: An Uncertainty-aware Framework for Partially Relevant Video Retrieval.
CoRR, 2024

Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transformers.
CoRR, 2024

Adversarial Robustness for Visual Grounding of Multimodal Large Language Models.
CoRR, 2024

Energy-Latency Manipulation of Multi-modal Large Language Models via Verbose Samples.
CoRR, 2024

Some bounds on the cardinality of the <i>b</i>-symbol weight spectrum of codes.
CoRR, 2024

FMM-Attack: A Flow-based Multi-modal Adversarial Attack on Video-based LLMs.
CoRR, 2024

Taming Pre-trained LLMs for Generalised Time Series Forecasting via Cross-modal Knowledge Distillation.
CoRR, 2024

MB-RACS: Measurement-Bounds-based Rate-Adaptive Image Compressed Sensing Network.
CoRR, 2024

Privacy Leakage on DNNs: A Survey of Model Inversion Attacks and Defenses.
CoRR, 2024

Fast Implicit Neural Representation Image Codec in Resource-limited Devices.
CoRR, 2024

RAT: Retrieval-Augmented Transformer for Click-Through Rate Prediction.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

Editable-DeepSC: Cross-Modal Editable Semantic Communication Systems.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024

ReFer: Retrieval-Enhanced Vertical Federated Recommendation for Full Set User Benefit.
Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2024

Large Point-to-Gaussian Model for Image-to-3D Generation.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

IGSPAD: Inverting 3D Gaussian Splatting for Pose-agnostic Anomaly Detection.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Section-Wise Revolving NBP-Like Decoders for QC-LDPC Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2024

A Perfect Ideal Hierarchical Secret Sharing Scheme Based on the CRT for Polynomial Rings.
Proceedings of the IEEE International Symposium on Information Theory, 2024

A New Multi-Receiver Authentication Scheme for General Access Structure.
Proceedings of the IEEE International Symposium on Information Theory, 2024

An Explicit Construction of $q\text{-ary}$ MDS Array Codes and Their Efficient Decoding.
Proceedings of the IEEE International Symposium on Information Theory, 2024

GladCoder: Stylized QR Code Generation with Grayscale-Aware Denoising Process.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Boundary-aware Decoupled Flow Networks for Realistic Extreme Rescaling.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Invertible Residual Rescaling Models.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Towards Faithful XAI Evaluation via Generalization-Limited Backdoor Watermark.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Periodicity Decoupling Framework for Long-term Series Forecasting.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

WaterDiff: Perceptual Image Watermarks Via Diffusion Model.
Proceedings of the IEEE International Conference on Acoustics, 2024

WFTNet: Exploiting Global and Local Periodicity in Long-Term Time Series Forecasting.
Proceedings of the IEEE International Conference on Acoustics, 2024

CAGEN: Controllable Anomaly Generator using Diffusion Model.
Proceedings of the IEEE International Conference on Acoustics, 2024

Parameter-Efficient and Memory-Efficient Tuning for Vision Transformer: A Disentangled Approach.
Proceedings of the Computer Vision - ECCV 2024, 2024

A Closer Look at GAN Priors: Exploiting Intermediate Features for Enhanced Model Inversion Attacks.
Proceedings of the Computer Vision - ECCV 2024, 2024

MambaIR: A Simple Baseline for Image Restoration with State-Space Model.
Proceedings of the Computer Vision - ECCV 2024, 2024

CLIP-Guided Generative Networks for Transferable Targeted Adversarial Attacks.
Proceedings of the Computer Vision - ECCV 2024, 2024

Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transfomers.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

BadCLIP: Trigger-Aware Prompt Learning for Backdoor Attacks on CLIP.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Vision-Language Pre-training with Object Contrastive Learning for 3D Scene Understanding.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Towards Compact 3D Representations via Point Feature Enhancement Masked Autoencoders.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Controller-Guided Partial Label Consistency Regularization with Unlabeled Data.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

GMMFormer: Gaussian-Mixture-Model Based Transformer for Efficient Partially Relevant Video Retrieval.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
New Constructions of q-Ary MDS Array Codes With Multiple Parities and Their Effective Decoding.
IEEE Trans. Inf. Theory, November, 2023

Versatile Weight Attack via Flipping Limited Bits.
IEEE Trans. Pattern Anal. Mach. Intell., November, 2023

Singleton-optimal LRCs and perfect LRCs via cyclic and constacyclic codes.
Finite Fields Their Appl., October, 2023

Toward Effective Image Manipulation Detection With Proposal Contrastive Learning.
IEEE Trans. Circuits Syst. Video Technol., September, 2023

Not All Samples Are Born Equal: Towards Effective Clean-Label Backdoor Attacks.
Pattern Recognit., July, 2023

Detecting and grouping keypoints for multi-person pose estimation using instance-aware attention.
Pattern Recognit., April, 2023

Perfect LRCs and k-optimal LRCs.
Des. Codes Cryptogr., April, 2023

Black-Box Dataset Ownership Verification via Backdoor Watermarking.
IEEE Trans. Inf. Forensics Secur., 2023

Query efficient black-box adversarial attack on deep neural networks.
Pattern Recognit., 2023

Adversarial Examples Generation for Deep Product Quantization Networks on Image Retrieval.
IEEE Trans. Pattern Anal. Mach. Intell., 2023

AdaptIR: Parameter Efficient Multi-task Adaptation for Pre-trained Image Restoration Models.
CoRR, 2023

Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger.
CoRR, 2023

Perceptual Image Compression with Cooperative Cross-Modal Side Information.
CoRR, 2023

Progressive Learning with Visual Prompt Tuning for Variable-Rate Image Compression.
CoRR, 2023

Backdoor Attack with Sparse and Invisible Trigger.
CoRR, 2023

Theoretically Principled Federated Learning for Balancing Privacy and Utility.
CoRR, 2023

TVTSv2: Learning Out-of-the-box Spatiotemporal Visual Representations at Scale.
CoRR, 2023

BackdoorBox: A Python Toolbox for Backdoor Learning.
CoRR, 2023

HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches.
Proceedings of the 32nd USENIX Security Symposium, 2023

Domain Watermark: Effective and Harmless Dataset Copyright Protection is Closed at Hand.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

MISSRec: Pre-training and Transferring Multi-modal Interest-aware Sequence Representation for Recommendation.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

One-stage Low-resolution Text Recognition with High-resolution Knowledge Transfer.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Binary MDS Array Codes with Flexible Array Dimensions and Their Fast Encoding.
Proceedings of the IEEE International Symposium on Information Theory, 2023

Anomaly Detection in Heterogeneous Time Series Data for Server-Monitoring Tasks.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

DDA: A Dynamic Difficulty-aware Data Augmenter for Image Super-resolution.
Proceedings of the International Joint Conference on Neural Networks, 2023

Towards Robust Scene Text Image Super-resolution via Explicit Location Enhancement.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Delta: Degradation-Free Fully Test-Time Adaptation.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Learnable Behavior Control: Breaking Atari Human World Records via Sample-Efficient Behavior Selection.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Unsupervised Anomaly Detection with Local-Sensitive VQVAE and Global-Sensitive Transformers.
Proceedings of the IEEE International Conference on Image Processing, 2023

LKBQ: Pushing the Limit of Post-Training Quantization to Extreme 1 bit.
Proceedings of the IEEE International Conference on Image Processing, 2023

Unsupervised Surface Anomaly Detection with Diffusion Probabilistic Model.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Instance-aware Dynamic Prompt Tuning for Pre-trained Point Cloud Models.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Towards Robust Model Watermark via Reducing Parametric Vulnerability.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

GIFD: A Generative Gradient Inversion Method with Feature Domain Optimization.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Adaptive ProductAE: SNR-Aware Adaptive Decoding of Neural Product Codes.
Proceedings of the IEEE International Conference on Communications, 2023

SFR: Semantic-Aware Feature Rendering of Point Cloud.
Proceedings of the IEEE International Conference on Acoustics, 2023

Backdoor Defense via Suppressing Model Shortcuts.
Proceedings of the IEEE International Conference on Acoustics, 2023

BATT: Backdoor Attack with Transformation-Based Triggers.
Proceedings of the IEEE International Conference on Acoustics, 2023

Semantic Preserving Learning for Task-Oriented Point Cloud Downsampling.
Proceedings of the IEEE International Conference on Acoustics, 2023

Difficulty-Aware Data Augmentor for Scene Text Recognition.
Proceedings of the IEEE International Conference on Acoustics, 2023

Untargeted Backdoor Attack Against Object Detection.
Proceedings of the IEEE International Conference on Acoustics, 2023

Learning Transferable Spatiotemporal Representations from Natural Script Knowledge.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Backdoor Defense via Adaptively Splitting Poisoned Dataset.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Follow the Will of the Market: A Context-Informed Drift-Aware Method for Stock Prediction.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

Backdoor Attack on Hash-based Image Retrieval via Clean-label Data Poisoning.
Proceedings of the 34th British Machine Vision Conference 2023, 2023

LET: Leveraging Error Type Information for Grammatical Error Correction.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

Combating Unknown Bias with Effective Bias-Conflicting Scoring and Gradient Alignment.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Contrastive Masked Autoencoders for Self-Supervised Video Hashing.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

FSR: A General Frequency-Oriented Framework to Accelerate Image Super-resolution Networks.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Learned Distributed Image Compression with Multi-Scale Patch Matching in Feature Domain.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Open-Vocabulary Multi-Label Classification via Multi-Modal Knowledge Transfer.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification.
IEEE Trans. Dependable Secur. Comput., 2022

Constructions and Weight Distributions of Optimal Locally Repairable Codes.
IEEE Trans. Commun., 2022

Towards a category-extended object detector with limited data.
Pattern Recognit., 2022

Semi-supervised robust training with generalized perturbed neighborhood.
Pattern Recognit., 2022

Deep image prior based defense against adversarial examples.
Pattern Recognit., 2022

Multinomial random forest.
Pattern Recognit., 2022

Practical protection against video data leakage via universal adversarial head.
Pattern Recognit., 2022

A Fine-Grained Differentially Private Federated Learning Against Leakage From Gradients.
IEEE Internet Things J., 2022

Towards Mitigating the Problem of Insufficient and Ambiguous Supervision in Online Crowdsourcing Annotation.
CoRR, 2022

Towards Effective Image Manipulation Detection with Proposal Contrastive Learning.
CoRR, 2022

Vertical Semi-Federated Learning for Efficient Online Advertising.
CoRR, 2022

Black-box Ownership Verification for Dataset Protection via Backdoor Watermarking.
CoRR, 2022

Learned Distributed Image Compression with Multi-Scale Patch Matching in Feature Domai.
CoRR, 2022

MOVE: Effective and Harmless Ownership Verification via Embedded External Features.
CoRR, 2022

Bounds and Constructions of Singleton-Optimal Locally Repairable Codes with Small Localities.
CoRR, 2022

Open-Vocabulary Multi-Label Classification via Multi-modal Knowledge Transfer.
CoRR, 2022

Semi-Supervised Cross-Silo Advertising with Partial Knowledge Transfer.
CoRR, 2022

A Comparative Study of Feature Expansion Unit for 3D Point Cloud Upsampling.
CoRR, 2022

Adaptive Frequency Learning in Two-branch Face Forgery Detection.
CoRR, 2022

Some Results on the Improved Bound and Construction of Optimal (r, δ) LRCs.
CoRR, 2022

New constructions of self-dual generalized Reed-Solomon codes.
Cryptogr. Commun., 2022

Hybrid Contrastive Quantization for Efficient Cross-View Video Retrieval.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Multi-task Ranking with User Behaviors for Text-video Search.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Deep Dirichlet process mixture models.
Proceedings of the Uncertainty in Artificial Intelligence, 2022

Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

FABMon: Enabling Fast and Accurate Network Available Bandwidth Estimation.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

New constructions of binary MDS array codes and locally repairable array codes.
Proceedings of the IEEE International Symposium on Information Theory, 2022

ACEs: Unsupervised Multi-label Aspect Detection with Aspect-category Experts.
Proceedings of the International Joint Conference on Neural Networks, 2022

Deep Portfolio Optimization Modeling based on Conv-Transformers with Graph Attention Mechanism.
Proceedings of the International Joint Conference on Neural Networks, 2022

PTS: A Prompt-based Teacher-Student Network for Weakly Supervised Aspect Detection.
Proceedings of the International Joint Conference on Neural Networks, 2022

Graph Data Augmentation for Node Classification.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Few-Shot Backdoor Attacks on Visual Object Tracking.
Proceedings of the Tenth International Conference on Learning Representations, 2022

Improved DC Estimation for JPEG Compression Via Convex Relaxation.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Adaptive Local Implicit Image Function for Arbitrary-Scale Super-Resolution.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Context Feature Guided Network for Image Super-resolution.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Some Results on the Improved Bound and Construction of Optimal $(r, \ \delta)$ LRCs.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022

Energy Alignment for Bias Rectification in Class Incremental Learning.
Proceedings of the IEEE International Conference on Acoustics, 2022

Learnable Hypergraph Laplacian for Hypergraph Learning.
Proceedings of the IEEE International Conference on Acoustics, 2022

Self-Ensemble Variance Regularization for Domain Adaptation.
Proceedings of the IEEE International Conference on Acoustics, 2022

NeXT: Towards High Quality Neural Radiance Fields via Multi-skip Transformer.
Proceedings of the Computer Vision - ECCV 2022, 2022

SimCC: A Simple Coordinate Classification Perspective for Human Pose Estimation.
Proceedings of the Computer Vision - ECCV 2022, 2022

Improving Vision Transformers by Revisiting High-Frequency Components.
Proceedings of the Computer Vision, 2022

Hardly Perceptible Trojan Attack Against Neural Networks with Bit Flips.
Proceedings of the Computer Vision - ECCV 2022, 2022

Compressive sensing based asymmetric semantic image compression for resource-constrained IoT system.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

PILC: Practical Image Lossless Compression with an End-to-end GPU Oriented Neural Framework.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

LCD: Adaptive Label Correction for Denoising Music Recommendation.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

Motion-Aware Graph Reasoning Hashing for Self-supervised Video Retrieval.
Proceedings of the 33rd British Machine Vision Conference 2022, 2022

Hugs Are Better Than Handshakes: Unsupervised Cross-Modal Transformer Hashing with Multi-granularity Alignment.
Proceedings of the 33rd British Machine Vision Conference 2022, 2022

Contrastive Quantization with Code Memory for Unsupervised Image Retrieval.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

Defending against Model Stealing via Verifying Embedded External Features.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Adaptive Compression for Online Computer Vision: An Edge Reinforcement Learning Approach.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Construction of MDS Euclidean Self-Dual Codes via Two Subsets.
IEEE Trans. Inf. Theory, 2021

Improved Bounds and Singleton-Optimal Constructions of Locally Repairable Codes With Minimum Distance 5 and 6.
IEEE Trans. Inf. Theory, 2021

Smartwatch User Authentication by Sensing Tapping Rhythms and Using One-Class DBSCAN.
Sensors, 2021

Correlation-based structural dropout for convolutional neural networks.
Pattern Recognit., 2021

S2A: Scale-Attention-Aware Networks for Video Super-Resolution.
Entropy, 2021

Learning Debiased Models with Dynamic Gradient Alignment and Bias-conflicting Sample Mining.
CoRR, 2021

Clustering Effect of (Linearized) Adversarial Robust Models.
CoRR, 2021

Attend to Who You Are: Supervising Self-Attention for Keypoint Detection and Instance-Aware Association.
CoRR, 2021

Clean-label Backdoor Attack against Deep Hashing based Retrieval.
CoRR, 2021

Pyramid Hybrid Pooling Quantization for Efficient Fine-Grained Image Retrieval.
CoRR, 2021

Is 2D Heatmap Representation Even Necessary for Human Pose Estimation?
CoRR, 2021

Energy Aligning for Biased Models.
CoRR, 2021

Backdoor Attack in the Physical World.
CoRR, 2021

Hidden Backdoor Attack against Semantic Segmentation Models.
CoRR, 2021

Phishing websites detection via CNN and multi-head self-attention on imbalanced datasets.
Comput. Secur., 2021

Fuzzing With Optimized Grammar-Aware Mutation Strategies.
IEEE Access, 2021

Joint Model and Data Adaptation for Cloud Inference Serving.
Proceedings of the 42nd IEEE Real-Time Systems Symposium, 2021

Clustering Effect of Adversarial Robust Models.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

WeClick: Weakly-Supervised Video Semantic Segmentation with Click Annotations.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Mix-order Attention Networks for Image Restoration.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Knowledge Distillation via Channel Correlation Structure.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Byte-Label Joint Attention Learning for Packet-grained Network Traffic Classification.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

On Optimal Quaternary Locally Repairable Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Singleton-Optimal LRCs and Perfect LRCs via Cyclic Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2021

EDKE: Encoder-Decoder based Kernel Estimation for Blind Image Super-resolution.
Proceedings of the International Joint Conference on Neural Networks, 2021

D2Defend: Dual-Domain based Defense against Adversarial Examples.
Proceedings of the International Joint Conference on Neural Networks, 2021

Batch Normalization Assisted Adversarial Pruning: Towards Lightweight, Sparse and Robust Models.
Proceedings of the International Joint Conference on Neural Networks, 2021

A Novel and High-Accuracy Rumor Detection Approach using Kernel Subtree and Deep Learning Networks.
Proceedings of the International Joint Conference on Neural Networks, 2021

Attribute Structured Knowledge Distillation.
Proceedings of the International Joint Conference on Neural Networks, 2021

CUBIST: High-Quality 360-Degree Video Streaming Services via Tile-based Edge Caching and FoV-Adaptive Prefetching.
Proceedings of the 2021 IEEE International Conference on Web Services, 2021

ISP Self-Operated BGP Anomaly Detection Based on Weakly Supervised Learning.
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021

Improving Adversarial Robustness via Channel-wise Activation Suppressing.
Proceedings of the 9th International Conference on Learning Representations, 2021

Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits.
Proceedings of the 9th International Conference on Learning Representations, 2021

TokenPose: Learning Keypoint Tokens for Human Pose Estimation.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Attention on Attention Sparse Dense Convolutional Network for Financial Signal Processing.
Proceedings of the IEEE International Conference on Acoustics, 2021

Bishift-Net for Image Inpainting.
Proceedings of the IEEE International Conference on Acoustics, 2021

Backdoor Attack Against Speaker Verification.
Proceedings of the IEEE International Conference on Acoustics, 2021

Class Aware Robust Training.
Proceedings of the IEEE International Conference on Acoustics, 2021

Webly Supervised Deep Attentive Quantization.
Proceedings of the IEEE International Conference on Acoustics, 2021

HOCA: Higher-Order Channel Attention for Single Image Super-Resolution.
Proceedings of the IEEE International Conference on Acoustics, 2021

GDTW: A Novel Differentiable DTW Loss for Time Series Tasks.
Proceedings of the IEEE International Conference on Acoustics, 2021

t-k-means: A ROBUST AND STABLE k-means VARIANT.
Proceedings of the IEEE International Conference on Acoustics, 2021

Visual Privacy Protection via Mapping Distortion.
Proceedings of the IEEE International Conference on Acoustics, 2021

H-GPR: A Hybrid Strategy for Large-Scale Gaussian Process Regression.
Proceedings of the IEEE International Conference on Acoustics, 2021

DAG-GAN: Causal Structure Learning with Generative Adversarial Nets.
Proceedings of the IEEE International Conference on Acoustics, 2021

Efficient Face Manipulation Via Deep Feature Disentanglement And Reintegration Net.
Proceedings of the IEEE International Conference on Acoustics, 2021

GDST: Global Distillation Self-Training for Semi-Supervised Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2021

SwinFGHash: Fine-grained Image Retrieval via Transformer-based Hashing Network.
Proceedings of the 32nd British Machine Vision Conference 2021, 2021

Weakly Supervised Deep Hyperspherical Quantization for Image Retrieval.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Knowledge Refinery: Learning from Decoupled Label.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
A Scalable, High-Performance, and Fault-Tolerant Network Architecture for Distributed Machine Learning.
IEEE/ACM Trans. Netw., 2020

Bounds and Constructions of Locally Repairable Codes: Parity-Check Matrix Approach.
IEEE Trans. Inf. Theory, 2020

CNN-MHSA: A Convolutional Neural Network and multi-head self-attention combined approach for detecting phishing websites.
Neural Networks, 2020

ABFL: An autoencoder based practical approach for software fault localization.
Inf. Sci., 2020

Mean-removed product quantization for large-scale image retrieval.
Neurocomputing, 2020

TNT: An Interpretable Tree-Network-Tree Learning Framework using Knowledge Distillation.
Entropy, 2020

Video scene parsing: An overview of deep learning methods and datasets.
Comput. Vis. Image Underst., 2020

Towards A Category-extended Object Detector without Relabeling or Conflicts.
CoRR, 2020

DPAttack: Diffused Patch Attacks against Universal Object Detection.
CoRR, 2020

JSRT: James-Stein Regression Tree.
CoRR, 2020

Open-sourced Dataset Protection via Backdoor Watermarking.
CoRR, 2020

Rectified Decision Trees: Exploring the Landscape of Interpretable and Effective Machine Learning.
CoRR, 2020

Neural Network-based Automatic Factor Construction.
CoRR, 2020

Backdoor Learning: A Survey.
CoRR, 2020

Efficient Black-Box Adversarial Attack Guided by the Distribution of Adversarial Perturbations.
CoRR, 2020

A Note on Self-Dual Generalized Reed-Solomon Codes.
CoRR, 2020

Revisiting Loss Landscape for Adversarial Robustness.
CoRR, 2020

Rethinking the Trigger of Backdoor Attack.
CoRR, 2020

Toward Adversarial Robustness via Semi-supervised Robust Training.
CoRR, 2020

Practical and Bilateral Privacy-preserving Federated Learning.
CoRR, 2020

Optimal Locally Repairable Codes for Parallel Reading.
IEEE Access, 2020

SAM: Self-Attention based Deep Learning Method for Online Traffic Classification.
Proceedings of the 2020 Workshop on Network Meets AI & ML, 2020

Adversarial Weight Perturbation Helps Robust Generalization.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Stochastic Deep Gaussian Processes over Graphs.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

DIPDefend: Deep Image Prior Driven Defense against Adversarial Examples.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Multi-level Recognition on Falls from Activities of Daily Living.
Proceedings of the 2020 on International Conference on Multimedia Retrieval, 2020

Weight Distributions of q-ary Optimal Locally Repairable Codes with Locality 2, Distance 5 and Even Dimension.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Perfect LRCs and k-Optimal LRCs.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Complete Characterization of Optimal LRCs with Minimum Distance 6 and Locality 2: Improved Bounds and Constructions.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Label Aggregation of Gradient Boosting Decision Trees.
Proceedings of the IPMV 2020: 2nd International Conference on Image Processing and Machine Vision, 2020

Multitask Deep Learning for Edge Intelligence Video Surveillance System.
Proceedings of the 18th IEEE International Conference on Industrial Informatics, 2020

Temporal Calibrated Regularization for Robust Noisy Label Learning.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

SDCN: Sparsity and Diversity Driven Correlation Networks for Traffic Demand Forecasting.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Generalized Local Aggregation for Large Scale Gaussian Process Regression.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Transferable Adversarial Attacks for Deep Scene Text Detection.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Sample-aware Data Augmentor for Scene Text Recognition.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Progressive Splitting and Upscaling Structure for Super-Resolution.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Matrix Smoothing: A Regularization For Dnn With Transition Matrix Under Noisy Labels.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020

Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets.
Proceedings of the 8th International Conference on Learning Representations, 2020

Adversarial Defense Via Local Flatness Regularization.
Proceedings of the IEEE International Conference on Image Processing, 2020

Fakd: Feature-Affinity Based Knowledge Distillation for Efficient Image Super-Resolution.
Proceedings of the IEEE International Conference on Image Processing, 2020

Hrnet: Hamiltonian Rescaling Network for Image Downscaling.
Proceedings of the IEEE International Conference on Image Processing, 2020

Enhanced Image Restoration Via Supervised Target Feature Transfer.
Proceedings of the IEEE International Conference on Image Processing, 2020

Improved Real-Time Visual Tracking via Adversarial Learning.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Self-Paced Probabilistic Principal Component Analysis For Data With Outliers.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Corrdrop: Correlation Based Dropout for Convolutional Neural Networks.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Hijacking Tracker: A Powerful Adversarial Attack on Visual Tracking.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Deep Flow Collaborative Network for Online Visual Tracking.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Self-Adaptive Feature Fool.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Training Interpretable Convolutional Neural Networks by Differentiating Class-Specific Filters.
Proceedings of the Computer Vision - ECCV 2020, 2020

Improving Query Efficiency of Black-Box Adversarial Attack.
Proceedings of the Computer Vision - ECCV 2020, 2020

Targeted Attack for Deep Hashing Based Retrieval.
Proceedings of the Computer Vision - ECCV 2020, 2020

Maintaining Discrimination and Fairness in Class Incremental Learning.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

One-Shot Adversarial Attacks on Visual Tracking With Dual Attention.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Adversarial Attack on Deep Product Quantization Network for Image Retrieval.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Expander Recovery Performance of Bipartite Graphs With Girth Greater Than 4.
IEEE Trans. Signal Inf. Process. over Networks, 2019

Constructions of Optimal $(r, \delta)$ Locally Repairable Codes via Constacyclic Codes.
IEEE Trans. Commun., 2019

A probabilistic model for semantic advertising.
Knowl. Inf. Syst., 2019

Novel dynamic multiple classification system for network traffic.
Inf. Sci., 2019

Alpha Discovery Neural Network based on Prior Knowledge.
CoRR, 2019

Prior Knowledge Neural Network for Automatic Feature Construction in Financial Time Series.
CoRR, 2019

Adversarial Defense Via Local Flatness Regularization.
CoRR, 2019

Adaptive Regularization of Labels.
CoRR, 2019

t-k-means: A k-means Variant with Robustness and Stability.
CoRR, 2019

Self-Paced Probabilistic Principal Component Analysis for Data with Outliers.
CoRR, 2019

Rectified Decision Trees: Towards Interpretability, Compression and Empirical Soundness.
CoRR, 2019

Multinomial Random Forests: Fill the Gap between Theoretical Consistency and Empirical Soundness.
CoRR, 2019

UA-DRN: Unbiased Aggregation of Deep Neural Networks for Regression Ensemble.
Aust. J. Intell. Inf. Process. Syst., 2019

Protective Performance of Different Passivators on Oil-Paper Insulation Containing Multiple Corrosive Sulphides.
IEEE Access, 2019

Making Large Ensemble of Convolutional Neural Networks via Bootstrap Re-sampling.
Proceedings of the 2019 IEEE Visual Communications and Image Processing, 2019

Steward: smart edge based joint QoE optimization for adaptive video streaming.
Proceedings of the 29th ACM Workshop on Network and Operating Systems Support for Digital Audio and Video, 2019

AdaCompress: Adaptive Compression for Online Computer Vision Services.
Proceedings of the 27th ACM International Conference on Multimedia, 2019

Classification of Optimal Ternary (r, δ)-Locally Repairable Codes Attaining the Singleton-like Bound.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Improved bounds and Optimal Constructions of Locally Repairable Codes with distance 5 and 6.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Automatic Grassland Degradation Estimation Using Deep Learning.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Self-attentive Pyramid Network for Single Image De-raining.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Residual Frame for Noisy Video Classification According to Perceptual Quality in Convolutional Neural Networks.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Neural Style Transfer with Content Discrimination.
Proceedings of the IEEE International Conference on Multimedia & Expo Workshops, 2019

Attentiondrop for Convolutional Neural Networks.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

RT-ADI: Fast Real-Time Video Representation for Multi-view Human Fall Detection.
Proceedings of the IEEE International Conference on Multimedia & Expo Workshops, 2019

Mean-Removed Product Quantization for Approximate Nearest Neighbor Search.
Proceedings of the 2019 International Conference on Data Mining Workshops, 2019

AIM 2019 Challenge on Video Extreme Super-Resolution: Methods and Results.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019

Image Super-Resolution via Residual Block Attention Networks.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019

Hilbert-Based Generative Defense for Adversarial Examples.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

Non-local Self-attention Structure for Function Approximation in Deep Reinforcement Learning.
Proceedings of the IEEE International Conference on Acoustics, 2019

Second-Order Attention Network for Single Image Super-Resolution.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2018
Binary Matrices for Compressed Sensing.
IEEE Trans. Signal Process., 2018

A Novel Consistent Random Forest Framework: Bernoulli Random Forests.
IEEE Trans. Neural Networks Learn. Syst., 2018

Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes.
IEEE Trans. Inf. Theory, 2018

On the Single-Parity Locally Repairable Codes with Multiple Repairable Groups.
Inf., 2018

Referenceless quality metric of multiply-distorted images based on structural degradation.
Neurocomputing, 2018

Special focus on distributed storage coding.
Sci. China Inf. Sci., 2018

Exploiting Common Characters in Chinese and Japanese to Learn Cross-Lingual Word Embeddings via Matrix Factorization.
Proceedings of The Third Workshop on Representation Learning for NLP, 2018

BML: A High-performance, Low-cost Gradient Synchronization Algorithm for DML Training.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Byte Segment Neural Network for Network Traffic Classification.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

On Optimal (r, δ)-LRCs with Length n | (q+1).
Proceedings of the IEEE Information Theory Workshop, 2018

Bandwidth Efficiency of Distance-optimal Scalar Locally Repairable Codes.
Proceedings of the IEEE Information Theory Workshop, 2018

On the Maximal Code Length of Optimal Linear Locally Repairable Codes.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

On Optimal Pseudo-cyclic ($r, \delta$) Locally Repairable Codes.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Classifying Quality Centrality for Source Localization in Social Networks.
Proceedings of the Web Services - ICWS 2018, 2018

Dimensionality-Driven Learning with Noisy Labels.
Proceedings of the 35th International Conference on Machine Learning, 2018

Portrait-Aware Artistic Style Transfer.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Cyclic Annealing Training Convolutional Neural Networks for Image Classification with Noisy Labels.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

CAFFE: Congestion-Aware Fast Failure Recovery in Software Defined Networks.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Self -Paced Mixture of T Distribution Model.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Sure-Based Dual Domain Image Denoising.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Iterative Learning With Open-Set Noisy Labels.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

Content-Aware Bilateral Filtering.
Proceedings of the Fourth IEEE International Conference on Multimedia Big Data, 2018

2017
Reconstruction Guarantee Analysis of Basis Pursuit for Binary Measurement Matrices in Compressed Sensing.
IEEE Trans. Inf. Theory, 2017

Entropy-based bilateral filtering with a new range kernel.
Signal Process., 2017

A less-greedy two-term Tsallis Entropy Information Metric approach for decision tree classification.
Knowl. Based Syst., 2017

A generic denoising framework via guided principal component analysis.
J. Vis. Commun. Image Represent., 2017

Link sign prediction by Variational Bayesian Probabilistic Matrix Factorization with Student-t Prior.
Inf. Sci., 2017

Scale the Internet routing table by generalized next hops of strict partial order.
Inf. Sci., 2017

Back-propagation neural network on Markov chains from system call sequences: a new approach for detecting Android malware with system call sequences.
IET Inf. Secur., 2017

On the Single-Parity Locally Repairable Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

A survey of network update in SDN.
Frontiers Comput. Sci., 2017

Locally Repairable Codes with Multiple (r<sub>i</sub>, δ<sub>i</sub>)-Localities.
CoRR, 2017

Design and analysis of <i>SEIQR</i> worm propagation model in mobile internet.
Commun. Nonlinear Sci. Numer. Simul., 2017

Accelerated Stochastic Greedy Coordinate Descent by Soft Thresholding Projection onto Simplex.
Proceedings of the Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 2017

On the weight hierarchy of locally repairable codes.
Proceedings of the 2017 IEEE Information Theory Workshop, 2017

On optimal ternary locally repairable codes.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Locally repairable codes with multiple (ri, δi)-localities.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Student-t Process Regression with Student-t Likelihood.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Robust Survey Aggregation with Student-t Distribution and Sparse Representation.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

A customized and cost-efficient backup scheme in software-defined networks.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

Blind quality assessment of multiply-distorted images based on structural degradation.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Foveated nonlocal dual denoising.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

On the linear codes with (r, δ)-locality for distributed storage.
Proceedings of the IEEE International Conference on Communications, 2017

Unifying attribute splitting criteria of decision trees by Tsallis entropy.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Compressed Sensing Performance of Binary Matrices with Binary Column Correlations.
Proceedings of the 2017 Data Compression Conference, 2017

Boost Clickbait Detection Based on User Behavior Analysis.
Proceedings of the Web and Big Data - First International Joint Conference, 2017

Unbiased Multivariate Correlation Analysis.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
End-to-end coding for TCP.
IEEE Netw., 2016

Constructions of Optimal Binary Locally Repairable Codes With Multiple Repair Groups.
IEEE Commun. Lett., 2016

An evidence clustering DSmT approximate reasoning method for more than two sources.
Digit. Signal Process., 2016

Nonextensive information theoretical machine.
CoRR, 2016

Bayesian linear regression with Student-t assumptions.
CoRR, 2016

Alternating direction algorithms for ℓ<sub>0</sub> regularization in compressed sensing.
CoRR, 2016

Bounds and Constructions of Locally Repairable Codes: Parity-check Matrix Approach.
CoRR, 2016

Query-Focused Multi-document Summarization Based on Concept Importance.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2016

Learning Chinese-Japanese Bilingual Word Embedding by Using Common Characters.
Proceedings of the Knowledge Science, Engineering and Management, 2016

Recursive bounds for locally repairable codes with multiple repair groups.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Some results on optimal locally repairable codes.
Proceedings of the IEEE International Symposium on Information Theory, 2016

A novel feature subspace selection method in random forests for high dimensional data.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

Improving decision trees by Tsallis Entropy Information Metric method.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

Bernoulli Random Forests: Closing the Gap between Theoretical Consistency and Empirical Soundness.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

On the single-parity locally repairable codes with availability.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Student-t Process Regression with Dependent Student-t Noise.
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016

2015
Deterministic Constructions of Binary Measurement Matrices From Finite Geometry.
IEEE Trans. Signal Process., 2015

Improving Decision Trees Using Tsallis Entropy.
CoRR, 2015

SARD: A Smart Approach of Rule Division for fast flow-level consistent update in SDN.
Comput. Networks, 2015

Detection and segmentation of latent fingerprints.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Link Prediction in Aligned Heterogeneous Networks.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

Network coding for data-retrieving in cloud storage systems.
Proceedings of the 2015 International Symposium on Network Coding, 2015

Subspace thresholding pursuit: A reconstruction algorithm for compressed sensing.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Construction of structured low density lattice codes based on finite fields.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

RAPIT: RTT-Aware Pending Interest Table for Content Centric Networking.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

The problems and solutions of network update in SDN: A survey.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Single-Frame Super-Resolution via Compressive Sampling on Hybrid Reconstructions.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

A Novel \ell ^1 ℓ 1 -graph Based Image Classification Algorithm.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

Matrix-Completion-Based Method for Cold-Start of Distributed Recommender Systems.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

PMPA: A patch-based multiscale products algorithm for image denoising.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Toward Latency-Aware Dynamic Middlebox Scheduling.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

Deterministic constructions of binary measurement matrices with various sizes.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Analysis of Repair Cost in Distributed Storage Systems with Fault-Tolerant Coding Strategies.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Nonlocal Pixel Selection for Multisurface Fitting-Based Super-Resolution.
IEEE Trans. Circuits Syst. Video Technol., 2014

Improved Analysis for Subspace Pursuit Algorithm in Terms of Restricted Isometry Constant.
IEEE Signal Process. Lett., 2014

Deterministic Construction of Binary Measurement Matrices with Flexible Sizes.
CoRR, 2014

Capacity Region of Wireless Network Coding.
Proceedings of the Network and Parallel Computing, 2014

An analysis of scheduling mechanism in wireless network coding.
Proceedings of the 20th IEEE International Workshop on Local & Metropolitan Area Networks, 2014

An Ontology-Based Approach to Query Suggestion Diversification.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Exploiting Level-Wise Category Links for Semantic Relatedness Computing.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Multi-document Summarization Based on Sentence Clustering.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Deterministic complex-valued measurement matrices based on Berlekamp-Justesen codes.
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014

2013
Corrigendum to "A variable-length model for masquerade detection" [J. Syst. Softw. 85(2012) 2470-2478].
J. Syst. Softw., 2013

Maximum Multiflow in Wireless Network Coding.
IEICE Trans. Commun., 2013

Sparks and Deterministic Constructions of Binary Measurement Matrices from Finite Geometry
CoRR, 2013

Improved Analyses for SP and CoSaMP Algorithms in Terms of Restricted Isometry Constants.
CoRR, 2013

Subspace Thresholding Pursuit: A Reconstruction Algorithm for Compressed Sensing.
CoRR, 2013

New bounds Under Restricted Isometry for the exact k-sparse recovery via ℓ<sub>q</sub> minimization.
CoRR, 2013

A constant approximation for multicast scheduling under physical interference model.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Constructions of quasi-cyclic measurement matrices based on array codes.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Reconstruction guarantee analysis of binary measurement matrices based on girth.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Incorrigible set distributions and unsuccessful decoding probability of linear codes.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

An optimal segment replication strategy in P2P-VoD systems.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

A traffic localization strategy for peer-to-peer live streaming.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Exploiting Multiple Features for Learning to Rank in Expert Finding.
Proceedings of the Advanced Data Mining and Applications - 9th International Conference, 2013

2012
A variable-length model for masquerade detection.
J. Syst. Softw., 2012

An Optimal Pull-Push Scheduling Algorithm Based on Network Coding for Mesh Peer-to-Peer Live Streaming.
IEICE Trans. Commun., 2012

Maximum Multiflow in Wireless Network Coding
CoRR, 2012

Keyword Proximity Search over Large and Complex RDF Database.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Exploiting Ontologies to Rank Relationships Between Patents.
Proceedings of the Semantic Web and Web Science, 2012

A Two-Step Non-redundant Subspace Clustering Approach.
Proceedings of the Semantic Web and Web Science, 2012

Search Results Diversification Based on Swap Minimal Marginal Contribution.
Proceedings of the Semantic Web and Web Science, 2012

2011
Stopping Set Distributions of Some Reed-Muller Codes.
IEEE Trans. Inf. Theory, 2011

A Lightweight Ontology Learning Method for Chinese Government Documents.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

PatentRank: An Ontology-based Approach to Patent Search.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

An Adaptive Approach to Chinese Semantic Advertising.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

2010
Stopping Set Distributions of Some Linear Codes
CoRR, 2010

An effective puncturing scheme for rate-compatible LDPC codes.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2010

A quantization schema with negligible degradation for LDPC decoder.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
Johnson type bounds on constant dimension codes.
Des. Codes Cryptogr., 2009

2008
Minimum Pseudoweight and Minimum Pseudocodewords of LDPC Codes.
IEEE Trans. Inf. Theory, 2008

On the minimum average distance of binary constant weight codes.
Discret. Math., 2008

Undetected error probability of <i>q</i> -ary constant weight codes.
Des. Codes Cryptogr., 2008

2007
The characterization of binary constant weight codes meeting the bound of Fu and Shen.
Des. Codes Cryptogr., 2007

2006
A Lower Bound on the Probability of Undetected Error for Binary Constant Weight Codes.
IEEE Trans. Inf. Theory, 2006

A Note on the Stopping Redundancy of Linear Codes.
J. Comput. Sci. Technol., 2006

On the stopping distance of finite geometry LDPC codes.
IEEE Commun. Lett., 2006

On the minimum pseudo-codewords of LDPC codes.
IEEE Commun. Lett., 2006

Minimum Pseudo-Weight and Minimum Pseudo-Codewords of LDPC Codes
CoRR, 2006

2005
The Probability of Undetected Error for Binary Constant-Weight Codes.
IEEE Trans. Inf. Theory, 2005

2000
The undetected error probability threshold of m-out-of-n codes.
IEEE Trans. Inf. Theory, 2000

1998
Binary Constant-Weight Codes for Error Detection.
IEEE Trans. Inf. Theory, 1998

On the Average Hamming Distance for Binary Codes.
Discret. Appl. Math., 1998

1997
Nonperiodic Cyclic Equivalence Classes of Cyclic Codes and Algebraic Constructions of Cyclically Permutable Codes.
Proceedings of the Applied Algebra, 1997


  Loading...