Xinyu Tang

Orcid: 0000-0003-1761-6664

According to our database1, Xinyu Tang authored at least 69 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Incentivizing Efficient Label Denoising in Federated Learning.
IEEE Internet Things J., December, 2024

Correction: Star Generative Adversarial VGG Network-Based Sample Augmentation for Insulator Defect Detection.
Int. J. Comput. Intell. Syst., December, 2024

Star Generative Adversarial VGG Network-Based Sample Augmentation for Insulator Defect Detection.
Int. J. Comput. Intell. Syst., December, 2024

An Efficient and Dynamic Privacy-Preserving Federated Learning System for Edge Computing.
IEEE Trans. Inf. Forensics Secur., 2024

Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query.
IEEE Trans. Dependable Secur. Comput., 2024

DAWN-ICL: Strategic Planning of Problem-solving Trajectories for Zero-Shot In-Context Learning.
CoRR, 2024

FedBChain: A Blockchain-enabled Federated Learning Framework for Improving DeepConvLSTM with Comparative Strategy Insights.
CoRR, 2024

YuLan: An Open-source Large Language Model.
CoRR, 2024

Investigating the Pre-Training Dynamics of In-Context Learning: Task Recognition vs. Task Learning.
CoRR, 2024

Unleashing the Potential of Large Language Models as Prompt Optimizers: An Analogical Analysis with Gradient-based Model Optimizers.
CoRR, 2024

Private Fine-tuning of Large Language Models with Zeroth-order Optimization.
CoRR, 2024

A secure and lightweight cloud data deduplication scheme with efficient access control and key management.
Comput. Commun., 2024

A New Linear Scaling Rule for Private Adaptive Hyperparameter Optimization.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Privacy-Preserving In-Context Learning with Differentially Private Few-Shot Generation.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Towards Efficient Auction Design with ROI Constraints.
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024

2023
A Privacy-Preserving Hybrid Range Search Scheme Over Encrypted Electronic Medical Data in IoT Systems.
IEEE Internet Things J., September, 2023

Two-party interactive secure deduplication with efficient data ownership management in cloud storage.
J. Inf. Secur. Appl., March, 2023

Robust Anomaly Clue Localization of Multi-Dimensional Derived Measure for Online Video Services.
IEEE Trans. Serv. Comput., 2023

Which is a better programming assistant? A comparative study between chatgpt and stack overflow.
CoRR, 2023

A Survey of Large Language Models.
CoRR, 2023

A detection approach for late-autumn shoots of litchi based on unmanned aerial vehicle (UAV) remote sensing.
Comput. Electron. Agric., 2023

ChatGPT vs. Stack Overflow: An Exploratory Comparison of Programming Assistance Tools.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Differentially Private Image Classification by Learning Priors from Random Processes.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Improving Conversational Recommendation Systems via Counterfactual Data Simulation.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Effectively Using Public Data in Privacy Preserving Machine Learning.
Proceedings of the International Conference on Machine Learning, 2023

Stockyard Storage Space Allocation in Dry Bulk Terminals Considering Mist Cannons and Energy Expenditure.
Proceedings of the Computational Logistics - 14th International Conference, 2023

Price of Stability in Quality-Aware Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2023

Rethinking the Evaluation for Conversational Recommendation in the Era of Large Language Models.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

2022
A Global Secure Ranked Multikeyword Search Based on the Multiowner Model for Cloud-Based Systems.
IEEE Syst. J., 2022

A Novel Fault Diagnosis Method of Rolling Bearing Based on Integrated Vision Transformer Model.
Sensors, 2022

Machine Learning with Differentially Private Labels: Mechanisms and Frameworks.
Proc. Priv. Enhancing Technol., 2022

Measuring road safety achievement based on EWM-GRA-SVD: A decision-making support system for APEC countries.
Knowl. Based Syst., 2022

A Provably Secure and Efficient Range Query Scheme for Outsourced Encrypted Uncertain Data From Cloud-Based Internet of Things Systems.
IEEE Internet Things J., 2022

DP-RAFT: A Differentially Private Recipe for Accelerated Fine-Tuning.
CoRR, 2022

Stockyard storage space allocation in large iron ore terminals.
Comput. Ind. Eng., 2022

Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture.
Proceedings of the 31st USENIX Security Symposium, 2022

DE-DPCTnet: Deep Encoder Dual-path Convolutional Transformer Network for Multi-channel Speech Separation.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2022

Extracting ISA Relations of Concepts from Books via Weakly Supervised Learning.
Proceedings of the 11th International Joint Conference on Knowledge Graphs, 2022

Hearth: A Game Supporting Non-Intrusive and Concurrent Tracking of Player Emotion and Mouse Usage.
Proceedings of the 43rd International Conference on Information Systems, 2022

A Malicious Node Detection Model for Wireless Sensor Networks Security Based on CHSA-MNDA Algorithm.
Proceedings of the 2022 IEEE International Conference on Communications Workshops, 2022

2021
A Fast Nearest Neighbor Search Scheme Over Outsourced Encrypted Medical Images.
IEEE Trans. Ind. Informatics, 2021

A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain.
Comput. Networks, 2021

ADEIP: an integrated platform of age-dependent expression and immune profiles across human tissues.
Briefings Bioinform., 2021

Research on Inversion Algorithm of the Power Transmission Corridor Information Based on Radar Ranging.
Proceedings of the International Joint Conference on Neural Networks, 2021

Privacy-Preserving Range Query for High-Dimensional Uncertain Data in a Two-Party Scenario.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
Design and model checking of timed automata oriented architecture for Internet of thing.
Int. J. Distributed Sens. Networks, 2020

Lightweight privacy preserving data aggregation with batch verification for smart grid.
Future Gener. Comput. Syst., 2020

Modeling and reasoning of IoT architecture in semantic ontology dimension.
Comput. Commun., 2020

A Time-Varying Forgetting Factor-Based QRRLS Algorithm for Multichannel Speech Dereverberation.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2020

Independent Vector Analysis for Blind Speech Separation Using Complex Generalized Gaussian Mixture Model with Weighted Variance.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

2019
Secure Range Search Over Encrypted Uncertain IoT Outsourced Data.
IEEE Internet Things J., 2019

Understanding Human Gaze Communication by Spatio-Temporal Graph Reasoning.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

2018
Online task scheduling for edge computing based on repeated stackelberg game.
J. Parallel Distributed Comput., 2018

Efficient method to verify the integrity of data with supporting dynamic data in cloud computing.
Sci. China Inf. Sci., 2018

An Efficient Distributed Approach on High Dimensional Data Similarity Searchable Encryption.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Privacy Preserving Similarity Search Scheme over Encrypted High-Dimensional Data for Multiple Data Owners.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
A Code Self-Relocation Method for Embedded System.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2013
Speech Recognition Research on Uyghur Accent Spoken Language.
Proceedings of the 2013 International Conference on Asian Language Processing, 2013

2010
Reachable Distance Space: Efficient Sampling-Based Planning for Spatially Constrained Systems.
Int. J. Robotics Res., 2010

The Generation of Attack Signatures Based on Virtual Honeypots.
Proceedings of the 2010 International Conference on Parallel and Distributed Computing, 2010

2008
Planning with Reachable Distances.
Proceedings of the Algorithmic Foundation of Robotics VIII, 2008

2007
Simulating Protein Motions with Rigidity Analysis.
J. Comput. Biol., 2007

Tools for Simulating and Analyzing RNA Folding Kinetics.
Proceedings of the Research in Computational Molecular Biology, 2007

Kinetics analysis methods for approximate folding landscapes.
Proceedings of the Proceedings 15th International Conference on Intelligent Systems for Molecular Biology (ISMB) & 6th European Conference on Computational Biology (ECCB), 2007

Biasing Samplers to Improve Motion Planning Performance.
Proceedings of the 2007 IEEE International Conference on Robotics and Automation, 2007

Planning with Reachable Distances: Fast Enforcement of Closure Constraints.
Proceedings of the 2007 IEEE International Conference on Robotics and Automation, 2007

2006
An Obstacle-based Rapidly-exploring Random Tree.
Proceedings of the 2006 IEEE International Conference on Robotics and Automation, 2006

2005
Using Motion Planning to Study RNA Folding Kinetics.
J. Comput. Biol., 2005

2001
A Visual Part Library - GS-PM.
Proceedings of the Sixth International Conference on Computer Supported Cooperative Work in Design, 2001


  Loading...