Tianyu Du

Orcid: 0000-0003-0896-0690

According to our database1, Tianyu Du authored at least 54 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CAREER: A Foundation Model for Labor Sequence Data.
Trans. Mach. Learn. Res., 2024

A truthful near-optimal mechanism for online linear packing-covering problem in the random order model.
Inf. Comput., 2024

Bridging Context Gaps: Leveraging Coreference Resolution for Long Contextual Understanding.
CoRR, 2024

CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models.
CoRR, 2024

Unveiling the Vulnerability of Private Fine-Tuning in Split-Based Frameworks for Large Language Models: A Bidirectionally Enhanced Attack.
CoRR, 2024

LABOR-LLM: Language-Based Occupational Representations with Large Language Models.
CoRR, 2024

MemDPT: Differential Privacy for Memory Efficient Language Models.
CoRR, 2024

Tool-Planner: Dynamic Solution Tree Planning for Large Language Model with Tool Clustering.
CoRR, 2024

Could It Be Generated? Towards Practical Analysis of Memorization in Text-To-Image Diffusion Models.
CoRR, 2024

TransLinkGuard: Safeguarding Transformer Models Against Model Stealing in Edge Deployment.
CoRR, 2024

TransLinkGuard: Safeguarding Transformer Models Against Model Stealing in Edge Deployment.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Cons2Plan: Vector Floorplan Generation from Various Conditions via a Learning Framework based on Conditional Diffusion Models.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

ReMasker: Imputing Tabular Data with Masked Autoencoding.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

SecCoder: Towards Generalizable and Robust Secure Code Generation.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

ERA-CoT: Improving Chain-of-Thought through Entity Relationship Analysis.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024

RA-ISF: Learning to Answer and Understand from Retrieval Augmentation via Iterative Self-Feedback.
Proceedings of the Findings of the Association for Computational Linguistics, 2024

2023
Research on the lateralization of brain functional complexity in mild cognitive impairment-Alzheimer's disease progression based on multiscale lateralized brain entropy.
Biomed. Signal Process. Control., September, 2023

Multi-level caching and data verification based on ethereum blockchain.
Wirel. Networks, February, 2023

Image Registration Algorithm for Remote Sensing Images Based on Pixel Location Information.
Remote. Sens., January, 2023

Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks.
CoRR, 2023

Torch-Choice: A PyTorch Package for Large-Scale Choice Modelling with Python.
CoRR, 2023

On the Security Risks of Knowledge Graph Reasoning.
Proceedings of the 32nd USENIX Security Symposium, 2023

UniT: A Unified Look at Certified Robust Training against Text Adversarial Perturbation.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

VLATTACK: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

A Deep Learning based Multi-edge-type decoding algorithm for 5G NR LDPC codes.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

An Embarrassingly Simple Backdoor Attack on Self-supervised Learning.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
DetectS ec: Evaluating the robustness of object detection models to adversarial attacks.
Int. J. Intell. Syst., 2022

Demystifying Self-supervised Trojan Attacks.
CoRR, 2022

Reasoning over Multi-view Knowledge Graphs.
CoRR, 2022

Learning Transferrable Representations of Career Trajectories for Economic Prediction.
CoRR, 2022

Latency-aware computation offloading and DQN-based resource allocation approaches in SDN-enabled MEC.
Ad Hoc Networks, 2022

ROLAND: Graph Learning Framework for Dynamic Graphs.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique.
Comput. Secur., 2021

Enhancing Model Robustness by Incorporating Adversarial Knowledge into Semantic Representation.
Proceedings of the IEEE International Conference on Acoustics, 2021

Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation.
Proceedings of the 29th USENIX Security Symposium, 2020

SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Spreading social influence with both positive and negative opinions in online networks.
Big Data Min. Anal., 2019

TextBugger: Generating Adversarial Text Against Real-world Applications.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Neural Network Model for Classifying the Economic Recession and Construction of Financial Stress Index.
Proceedings of the Data Science, 2019

Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Symmetric Frame Cracking: A Powerful Dynamic Textual CAPTCHAs Cracking Policy.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Quantifying Graph Anonymity, Utility, and De-anonymity.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Online E-Commerce Fraud: A Large-Scale Detection and Analysis.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

2017
Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Influence Spread in Social Networks with both Positive and Negative Influences.
Proceedings of the Computing and Combinatorics - 23rd International Conference, 2017

2015
Protective Dummy-byte Preamble Padding for improving ZigBee packet transmission under Wi-Fi interference.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Adaptive Preamble Padding with Retransmission Control for ZigBee network under Wi-Fi interference.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

2014
Adaptive Transmit Power Adjustment Technique for ZigBee Network under Wi-Fi Interference.
Proceedings of the Ad Hoc Networks - 6th International ICST Conference, 2014

2013
Study of clear channel assessment mechanism for ZigBee packet transmission under Wi-Fi interference.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

ACK with Interference Detection Technique for ZigBee Network under Wi-Fi Interference.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013


  Loading...