Tao Wei

Orcid: 0009-0004-9999-5526

According to our database1, Tao Wei authored at least 161 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Calculation of the Worst-Case Voltage Noise for a Power Distribution Network Based on Ramp Current.
IEEE Trans. Circuits Syst. I Regul. Pap., June, 2024

Boundary-Sensitive Segmentation of Small Liver Lesions.
IEEE J. Biomed. Health Informatics, May, 2024

Adaptive Multifrequency Attribute Analysis and Its Application on Reservoir Characterization.
IEEE Trans. Geosci. Remote. Sens., 2024

Cycle-Consistent Generalized S-Transform Network for Seismic Time-Frequency Analysis.
IEEE Trans. Geosci. Remote. Sens., 2024

PANTHER: Private Approximate Nearest Neighbor Search in the Single Server Setting.
IACR Cryptol. ePrint Arch., 2024

Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits.
IACR Cryptol. ePrint Arch., 2024

Towards better video services: An EEG-based interpretable model for functional quality of experience evaluation.
Displays, 2024

RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer.
CoRR, 2024

A Single-Step Non-Autoregressive Automatic Speech Recognition Architecture with High Accuracy and Inference Speed.
CoRR, 2024

Unstructured Big Data Threat Intelligence Parallel Mining Algorithm.
Big Data Min. Anal., 2024

SoK: A Comparison Study of Arm TrustZone and CCA.
Proceedings of the International Symposium on Secure and Private Execution Environment Design, 2024

Machine Learning in Sensors for Collision Avoidance.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

Improving Attention-Based End-to-End Speech Recognition by Monotonic Alignment Attention Matrix Reconstruction.
Proceedings of the IEEE International Conference on Acoustics, 2024

An FPGA-Enabled Framework for Rapid Automated Design of Photonic Integrated Circuits.
Proceedings of the 2024 ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2024

UnsafeCop: Towards Memory Safety for Real-World Unsafe Rust Code with Practical Bounded Model Checking.
Proceedings of the Formal Methods - 26th International Symposium, 2024

ProFake: Detecting Deepfakes in the Wild against Quality Degradation with Progressive Quality-adaptive Learning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

<i>Coral: </i> Maliciously Secure Computation Framework for Packed and Mixed Circuits.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

TwinStep Network (TwNet): a Neuron-Centric Architecture Achieving Rapid Training.
Proceedings of the 35th IEEE International Conference on Application-specific Systems, 2024

Dual-Prior Augmented Decoding Network for Long Tail Distribution in HOI Detection.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Adaptive Multi-Dimensional Shrinkage Block for Automatic Modulation Recognition.
IEEE Commun. Lett., November, 2023

PXLink: A simulation program of polymer crosslinking to study of polyamide membrane.
Comput. Phys. Commun., October, 2023

Continuous motion finger joint angle estimation utilizing hybrid sEMG-FMG modality driven transformer-based deep learning model.
Biomed. Signal Process. Control., August, 2023

Black-Box Dataset Ownership Verification via Backdoor Watermarking.
IEEE Trans. Inf. Forensics Secur., 2023

Inversion of Perfectly Electric Conductors by an Iteration Method Based on Linear Approximation.
IEEE Trans. Geosci. Remote. Sens., 2023

ASHFormer: Axial and Sliding Window-Based Attention With High-Resolution Transformer for Automatic Stratigraphic Correlation.
IEEE Trans. Geosci. Remote. Sens., 2023

Sparse Time-Frequency Analysis of Seismic Data: Sparse Representation to Unrolled Optimization.
IEEE Trans. Geosci. Remote. Sens., 2023

CVTEE: A Compatible Verified TEE Architecture With Enhanced Security.
IEEE Trans. Dependable Secur. Comput., 2023

Study on personalised search of English teaching resources database based on semantic association mining.
Int. J. Comput. Appl. Technol., 2023

Falcon Takes Off - A Hardware Implementation of the Falcon Signature Scheme.
IACR Cryptol. ePrint Arch., 2023

BumbleBee: Secure Two-party Inference Framework for Large Transformers.
IACR Cryptol. ePrint Arch., 2023

The First High-quality Reference Genome of Sika Deer Provides Insights into High-tannin Adaptation.
Genom. Proteom. Bioinform., 2023

Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger.
CoRR, 2023

PUMA: Secure Inference of LLaMA-7B in Five Minutes.
CoRR, 2023

Human labeling errors and their impact on ConvNets for satellite image scene classification.
CoRR, 2023

Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks.
Proceedings of the 32nd USENIX Security Symposium, 2023

ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Image Generation Based Intra-class Variance Smoothing for Fine-Grained Visual Classification.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Improving End-to-End Modeling For Mandarin-English Code-Switching Using Lightweight Switch-Routing Mixture-of-Experts.
Proceedings of the 24th Annual Conference of the International Speech Communication Association, 2023

Customer Segment Classification Prediction in the Australian Retail Based on Machine Learning Algorithms.
Proceedings of the 4th International Conference on Machine Learning and Computer Application, 2023

Attribute Learning with Knowledge Enhanced Partial Annotations.
Proceedings of the IEEE International Conference on Image Processing, 2023

Counterfactual-based Saliency Map: Towards Visual Contrastive Explanations for Neural Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

DASA: Difficulty-Aware Semantic Augmentation for Speaker Verification.
Proceedings of the IEEE International Conference on Acoustics, 2023

A Novel FPGA Simulator Accelerating Reinforcement Learning-Based Design of Power Converters.
Proceedings of the 2023 ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2023

A Finite-Difference Time-Domain (FDTD) solver with linearly scalable performance in an FPGA cluster.
Proceedings of the IEEE International Conference on Cluster Computing, 2023

A Heterogeneous Computer Architecture Accelerating Reinforcement Learning-based Design for Silicon Photonic Devices.
Proceedings of the 34th IEEE International Conference on Application-specific Systems, 2023

A Novel FPGA-Based Circuit Simulator for Accelerating Reinforcement Learning-Based Design of Power Converters.
Proceedings of the 34th IEEE International Conference on Application-specific Systems, 2023

2022
Optimized separable convolution: Yet another efficient convolution operator.
AI Open, January, 2022

Alzheimer's disease classification from hippocampal atrophy based on PCANet-BLS.
Multim. Tools Appl., 2022

Beyond fine-tuning: Classifying high resolution mammograms using function-preserving transformations.
Medical Image Anal., 2022

MGBM-YOLO: a Faster Light-Weight Object Detection Model for Robotic Grasping of Bolster Spring Based on Image-Based Visual Servoing.
J. Intell. Robotic Syst., 2022

DetectS ec: Evaluating the robustness of object detection models to adversarial attacks.
Int. J. Intell. Syst., 2022

Wideband Beamspace Robust Capon Beamformer.
Proceedings of the 2022 5th International Conference on Signal Processing and Machine Learning, 2022

A Novel Interconnection Architecture for Secured Die-to-Die Communication in System-in-Package.
Proceedings of the IEEE International Conference on Networking, Architecture and Storage, 2022

In-Sensor Neural Network Preprocessing for ADAS Computer Systems.
Proceedings of the IEEE International Conference on Networking, Architecture and Storage, 2022

FFM: A Frame Filtering Mechanism To Accelerate Inference Speed For Conformer In Speech Recognition.
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022

Towards Efficiently Learning Monotonic Alignments for Attention-based End-to-End Speech Recognition.
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022

Highly Scalable Runtime Countermeasure Against Microprobing Attacks on Die-to-Die Interconnections in System-in-Package.
Proceedings of the FPGA '22: The 2022 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, Virtual Event, USA, 27 February 2022, 2022

Software defined optical time-domain reflectometer.
Proceedings of the 30th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2022

Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
Joint Hybrid and Passive Beamforming for Millimeter Wave Symbiotic Radio Systems.
IEEE Wirel. Commun. Lett., 2021

An Integrated OFDR System Using Combined Swept-Laser Linearization and Phase Error Compensation.
IEEE Trans. Instrum. Meas., 2021

A High-Performance, Reconfigurable, Fully Integrated Time-Domain Reflectometry Architecture Using Digital I/Os.
IEEE Trans. Instrum. Meas., 2021

Modularized Morphing of Deep Convolutional Neural Networks: A Graph Approach.
IEEE Trans. Computers, 2021

A Parcel-Based Deep-Learning Classification to Map Local Climate Zones From Sentinel-2 Images.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2021

Fast coding scheme for low complexity 3D-HEVC based on video content property.
Multim. Tools Appl., 2021

Improving Adversarial Robustness via Attention and Adversarial Logit Pairing.
Frontiers Artif. Intell., 2021

Development of a new inversion method for detecting spatiotemporal characteristics of coal mines based on earth observation technology.
Int. J. Appl. Earth Obs. Geoinformation, 2021

SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

SEQ-CPC : Sequential Contrastive Predictive Coding for Automatic Speech Recognition.
Proceedings of the IEEE International Conference on Acoustics, 2021

Minimal Overhead Optical Time-Domain Reflectometer Via I/O Integrated Data Converter Enabled by Field Programmable Voltage Offset.
Proceedings of the 31st International Conference on Field-Programmable Logic and Applications, 2021

An FPGA-based 7-ENOB 600 MSample/s ADC without any External Components.
Proceedings of the FPGA '21: The 2021 ACM/SIGDA International Symposium on Field Programmable Gate Arrays, Virtual Event, USA, February 28, 2021

Runtime Detection of Probing/Tampering on Interconnecting Buses.
Proceedings of the 29th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2021

The Causes of College Students' Religious Identity and Countermeasures - - Based on Psychology.
Proceedings of the CIPAE 2021: 2nd International Conference on Computers, 2021

Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Mapping Urban Slum Settlements Using Very High-Resolution Imagery and Land Boundary Data.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2020

Privacy Leakage of Real-World Vertical Federated Learning.
CoRR, 2020

Fast CU Partition Decision Method Based on Texture Characteristics for H.266/VVC.
IEEE Access, 2020

A Fast and Efficient 3D-HEVC Method for Complexity Reduction Based on the Correlations of Inter-View, Spatio-Temporal, and Texture-Depth.
IEEE Access, 2020

A Time Convolutional Network Based Outlier Detection for Multidimensional Time Series in Cyber-Physical-Social Systems.
IEEE Access, 2020

SAVIOR: Towards Bug-Driven Hybrid Testing.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

HeroGRAPH: A Heterogeneous Graph Framework for Multi-Target Cross-Domain Recommendation.
Proceedings of the 3rd Workshop on Online Recommender Systems and User Modeling co-located with the 14th ACM Conference on Recommender Systems (RecSys 2020), 2020

A Bus Authentication and Anti-Probing Architecture Extending Hardware Trusted Computing Base Off CPU Chips and Beyond.
Proceedings of the 47th ACM/IEEE Annual International Symposium on Computer Architecture, 2020

ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Fooling Detection Alone is Not Enough: Adversarial Attack against Multiple Object Tracking.
Proceedings of the 8th International Conference on Learning Representations, 2020

COIN Attacks: On Insecurity of Enclave Untrusted Interfaces in SGX.
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020

Fast Recognition of Multi-combination Target Features in Motion Image Based on Large Data Analysis.
Proceedings of the Advanced Hybrid Information Processing, 2020

2019
Field experience with obfuscating million-user iOS apps in large enterprise mobile development.
Softw. Pract. Exp., 2019

A Complexity Reduction Scheme for Depth Coding in 3D-HEVC.
Inf., 2019

Logistic regression for imbalanced learning based on clustering.
Int. J. Comput. Sci. Eng., 2019

Phishing page detection via learning classifiers from page layout feature.
EURASIP J. Wirel. Commun. Netw., 2019

Cloud-based Image Classification Service Is Not Robust To Simple Transformations: A Forgotten Battlefield.
CoRR, 2019

Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking.
CoRR, 2019

Enhancing Cross-task Transferability of Adversarial Examples with Dispersion Reduction.
CoRR, 2019

Stable Network Morphism.
Proceedings of the International Joint Conference on Neural Networks, 2019

Towards Memory Safe Enclave Programming with Rust-SGX.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

ABSTRACT: Cloud-based Image Classification Service is Not Robust to Affine Transformation: A Forgotten Battlefield.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

2018
Modeling Relationship between Truck Fuel Consumption and Driving Behavior Using Data from Internet of Vehicles.
Comput. Aided Civ. Infrastructure Eng., 2018

Protecting million-user iOS apps with obfuscation: motivations, pitfalls, and experience.
Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice, 2018

Software protection on the go: a large-scale empirical study on mobile app obfuscation.
Proceedings of the 40th International Conference on Software Engineering, 2018

FeatNet: Large-scale Fraud Device Detection by Network Representation Learning with Rich Features.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

2017
Incorporating Intelligence in Fog Computing for Big Data Analysis in Smart Cities.
IEEE Trans. Ind. Informatics, 2017

A Cost-Effective Geodetic Strainmeter Based on Dual Coaxial Cable Bragg Gratings.
Sensors, 2017

Fast depth map mode decision based on depth-texture correlation and edge classification for 3D-HEVC.
J. Vis. Commun. Image Represent., 2017

Modularized Morphing of Neural Networks.
CoRR, 2017

Downgrade Attack on TrustZone.
CoRR, 2017

Accurate and efficient exploit capture and classification.
Sci. China Inf. Sci., 2017

Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity.
IEEE Access, 2017

Phishing Website Detection Based on Effective CSS Features of Web Pages.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Adaptive Android Kernel Live Patching.
Proceedings of the 26th USENIX Security Symposium, 2017

Detecting Phishing Websites via Aggregation Analysis of Page Layouts.
Proceedings of the 2017 International Conference on Identification, 2017

POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
An integral equation approach to the unsteady convection-diffusion equations.
Appl. Math. Comput., 2016

Network Morphism.
Proceedings of the 33nd International Conference on Machine Learning, 2016

Barycentric coordinates based soft assignment for object classification.
Proceedings of the 2016 IEEE International Conference on Multimedia & Expo Workshops, 2016

TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Improving lookup reliability in Kad.
Peer-to-Peer Netw. Appl., 2015

A framework for stochastic simulations and visualization of biological electron-transfer dynamics.
Comput. Phys. Commun., 2015

SF-DRDoS: The store-and-flood distributed reflective denial of service attack.
Comput. Commun., 2015

Towards Discovering and Understanding Task Hijacking in Android.
Proceedings of the 24th USENIX Security Symposium, 2015

Reflex-Tree: A Biologically Inspired Parallel Architecture for Future Smart Cities.
Proceedings of the 44th International Conference on Parallel Processing, 2015

Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates.
Proceedings of the 10th ACM Symposium on Information, 2015

A Hierarchical Distributed Fog Computing Architecture for Big Data Analysis in Smart Cities.
Proceedings of the ASE BigData & SocialInformatics 2015, 2015

Experimental study of skeleton tracking abilities from microsoft kinect non-frontal views.
Proceedings of the 2015 3DTV-Conference: The True Vision, 2015

2014
Eternal War in Memory.
IEEE Secur. Priv., 2014

Drawbridge: software-defined DDoS-resistant traffic engineering.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

A Website Credibility Assessment Scheme Based on Page Association.
Proceedings of the Information Security Practice and Experience, 2014

The store-and-flood distributed reflective denial of service attack.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Splider: A split-based crawler of the BT-DHT network and its applications.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
Practical Control Flow Integrity and Randomization for Binary Executables.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

SoK: Eternal War in Memory.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Rating Web Pages Using Page-Transition Evidence.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Protecting function pointers in binary.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Network Expansion and Pathway Enrichment Analysis towards Biologically Significant Findings from Microarrays.
J. Integr. Bioinform., 2012

How many eyes are spying on your shared folders?
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

A Framework to Eliminate Backdoors from Response-Computable Authentication.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Revisiting why Kad lookup fails.
Proceedings of the 12th IEEE International Conference on Peer-to-Peer Computing, 2012

ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution.
ACM Trans. Inf. Syst. Secur., 2011

Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat.
J. Comput. Secur., 2011

Computational study of energetic nitrogen-rich derivatives of 1, 1′- and 5, 5′-bridged ditetrazoles.
J. Comput. Chem., 2011

2010
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time.
Proceedings of the Computer Security, 2010

Extensity of C3S EBSD Database and Its Structure Calculation.
Proceedings of the Second International Workshop on Database Technology and Applications, 2010

Secure dynamic code generation against spraying.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Adaptive Sensor Fault Detection and Identification Using Particle Filter Algorithms.
IEEE Trans. Syst. Man Cybern. Part C, 2009

A hybrid multi-loop genetic-algorithm/simplex/spatial-grid method for locating the optimum orientation of an adsorbed protein on a solid surface.
Comput. Phys. Commun., 2009

IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
Proceedings of the Network and Distributed System Security Symposium, 2009

2008
Forecast the Biological Activity of Nitrobenzene Compound Based on BP Neural Network.
Proceedings of the PACIIA 2008, 2008

Moving Targets Detection and Analysis on Multi-Look Polarimetric SAR Images using PWF Method.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

2007
A New Algorithm for Identifying Loops in Decompilation.
Proceedings of the Static Analysis, 14th International Symposium, 2007

Structuring 2-way Branches in Binary Executables.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
Particle Filtering for Adaptive Sensor Fault Detection and Identification.
Proceedings of the 2006 IEEE International Conference on Robotics and Automation, 2006

Linkability of a Blind Signature Scheme and Its Improved Scheme.
Proceedings of the Computational Science and Its Applications, 2006

2005
Symbol detection with time-varying unknown phase by expectation propagation.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

Sensor validation for flight control by particle filtering.
Proceedings of the 13th European Signal Processing Conference, 2005

Audio Navigation Patterns.
Proceedings of the EuroPLoP' 2005, 2005

2002
Development of an airborne multi-angle TIR/VNIR imaging system.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2002

2001
Development of a Sheet-Based Material Handling System for Layered Manufacturing.
Proceedings of the 2001 IEEE International Conference on Robotics and Automation, 2001

1996
Efficient Multifrequency Analysis of Fault Diagnosis in Analog Circuits Based on Large Change Sensitivity Computation.
Proceedings of the 5th Asian Test Symposium (ATS '96), 1996


  Loading...