Xuan Wang

Orcid: 0000-0002-3512-0649

Affiliations:
  • Harbin Institute of Technology, Shenzhen Graduate School, China
  • Harbin Institute of Technology, Department of Computer Science, China (PhD 1997)


According to our database1, Xuan Wang authored at least 258 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection.
IEEE Trans. Software Eng., March, 2024

Cascaded Attention: Adaptive and Gated Graph Attention Network for Multiagent Reinforcement Learning.
IEEE Trans. Neural Networks Learn. Syst., March, 2024

RPSC: Regulatable Privacy-Preserving Smart Contracts on Account-Based Blockchain.
IEEE Trans. Netw. Sci. Eng., 2024

CMCL: Cross-Modal Compressive Learning for Resource-Constrained Intelligent IoT Systems.
IEEE Internet Things J., 2024

A fast strategy-solving method for adversarial team games utilizing warm starting.
Neurocomputing, 2024

FSSiBNN: FSS-based Secure Binarized Neural Network Inference with Free Bitwidth Conversion.
IACR Cryptol. ePrint Arch., 2024

Practical Delegatable Attribute-Based Anonymous Credentials with Chainable Revocation.
IACR Cryptol. ePrint Arch., 2024

Reverse double auction mechanism: An efficient algorithm for E-commerce platform operations.
Electron. Commer. Res. Appl., 2024

MIBench: A Comprehensive Benchmark for Model Inversion Attack and Defense.
CoRR, 2024

KnobTree: Intelligent Database Parameter Configuration via Explainable Reinforcement Learning.
CoRR, 2024

Privacy Leakage on DNNs: A Survey of Model Inversion Attacks and Defenses.
CoRR, 2024

Harnessing the Power of Prompt Experts: Efficient Knowledge Distillation for Enhanced Language Understanding.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track and Demo Track, 2024

Scheduling Deep Learning Jobs in Multi-Tenant GPU Clusters via Wise Resource Sharing.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

MUSE-Net: Disentangling Multi-Periodicity for Traffic Flow Forecasting.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

Performance Analysis and Optimizations of Matrix Multiplications on ARMv8 Processors.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024

2023
Listening to Users' Voice: Automatic Summarization of Helpful App Reviews.
IEEE Trans. Reliab., December, 2023

What is the limitation of multimodal LLMs? A deeper look into multimodal LLMs through prompt probing.
Inf. Process. Manag., November, 2023

The Design of Fast and Lightweight Resemblance Detection for Efficient Post-Deduplication Delta Compression.
ACM Trans. Storage, August, 2023

A blockchain-based privacy-preserving advertising attribution architecture: Requirements, design, and a prototype implementation.
Softw. Pract. Exp., August, 2023

Breaking the traditional: a survey of algorithmic mechanism design applied to economic and complex environments.
Neural Comput. Appl., August, 2023

Learning to Generate Tips from Song Reviews.
Neural Networks, April, 2023

ShrewdAttack: Low Cost High Accuracy Model Extraction.
Entropy, February, 2023

SLGNN: synthetic lethality prediction in human cancers based on factor-aware knowledge graph neural network.
Bioinform., February, 2023

A large-scale continuous optimization benchmark suite with versatile coupled heterogeneous modules.
Swarm Evol. Comput., 2023

A Generic Cryptographic Deep-Learning Inference Platform for Remote Sensing Scenes.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2023

Adversarial Examples Generation for Deep Product Quantization Networks on Image Retrieval.
IEEE Trans. Pattern Anal. Mach. Intell., 2023

Kdb-D2CFR: Solving Multiplayer imperfect-information games with knowledge distillation-based DeepCFR.
Knowl. Based Syst., 2023

A Generic Multi-Player Transformation Algorithm for Solving Large-Scale Zero-Sum Extensive-Form Adversarial Team Games.
CoRR, 2023

SVDE: Scalable Value-Decomposition Exploration for Cooperative Multi-Agent Reinforcement Learning.
CoRR, 2023

Reinforced Vision-and-Language Navigation Based on Historical BERT.
Proceedings of the Advances in Swarm Intelligence - 14th International Conference, 2023

Privacy-Preserving Distributed Machine Learning Made Faster.
Proceedings of the 2023 Secure and Trustworthy Deep Learning Systems Workshop, 2023

NIEE: Modeling Edge Embeddings for Drug-Disease Association Prediction via Neighborhood Interactions.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023

GIFD: A Generative Gradient Inversion Method with Feature Domain Optimization.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Efficient Cloud Computing Resource Management Strategy Based on Auction Mechanism.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

2022
NetSync: A Network Adaptive and Deduplication-Inspired Delta Synchronization Approach for Cloud Storage Services.
IEEE Trans. Parallel Distributed Syst., 2022

From Hyper-dimensional Structures to Linear Structures: Maintaining Deduplicated Data's Locality.
ACM Trans. Storage, 2022

An Integrated Multi-Task Model for Fake News Detection.
IEEE Trans. Knowl. Data Eng., 2022

Simulation Method for Blockchain Systems with a Public Chain.
Sensors, 2022

SecMDGM: Federated Learning Security Mechanism Based on Multi-Dimensional Auctions.
Sensors, 2022

Practical protection against video data leakage via universal adversarial head.
Pattern Recognit., 2022

Parallel learner: A practical deep reinforcement learning framework for multi-scenario games.
Knowl. Based Syst., 2022

RLCFR: Minimize counterfactual regret by deep reinforcement learning.
Expert Syst. Appl., 2022

Generic server-aided secure multi-party computation in cloud computing.
Comput. Stand. Interfaces, 2022

Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks.
Comput. Stand. Interfaces, 2022

Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security.
Comput. Stand. Interfaces, 2022

Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection.
CoRR, 2022

An Efficient Split Fine-tuning Framework for Edge and Cloud Collaborative Learning.
CoRR, 2022

Listening to Users' Voice: Automatic Summarization of Helpful App Reviews.
CoRR, 2022

Generating Tips from Song Reviews: A New Dataset and Framework.
CoRR, 2022

Efficient Distributed Framework for Collaborative Multi-Agent Reinforcement Learning.
CoRR, 2022

Building a High-performance Fine-grained Deduplication Framework for Backup Storage with High Deduplication Ratio.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption.
Proceedings of the IEEE INFOCOM 2022, 2022

Dual Feature Fusion Trade Execution Framework with DDQN.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Information Entropy of Uncertainty Control: An Uncertainty Management Method in Imperfect Information Games.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

LwDeepStack: A lightweight DeepStack based on knowledge distillation.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Efficient Private Set Intersection Based on Functional Encryption.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Underwater Object Detection with Swin Transformer.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

EFDO: Solving Extensive-Form Games Based On Double Oracle.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

NFSP-PER: An efficient sampling NFSP-based method with prioritized experience replay.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Efficient Mixed-Protocol Secure Four-Party Computation with Private Robustness.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

PyHENet: A Generic Framework for Privacy-Preserving DL Inference Based on Fully Homomorphic Encryption.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Underwater Small Target Detection Based on Deformable Convolutional Pyramid.
Proceedings of the IEEE International Conference on Acoustics, 2022

2021
Constraint-Objective Cooperative Coevolution for Large-scale Constrained Optimization.
ACM Trans. Evol. Learn. Optim., 2021

Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2021

Self-supervised learning-based weight adaptive hashing for fast cross-modal retrieval.
Signal Image Video Process., 2021

Autoencoder-based self-supervised hashing for cross-modal retrieval.
Multim. Tools Appl., 2021

ADET: anomaly detection in time series with linear time.
Int. J. Mach. Learn. Cybern., 2021

Scalable sub-game solving for imperfect-information games.
Knowl. Based Syst., 2021

ARank: Toward specific model pruning via advantage rank for multiple salient objects detection.
Image Vis. Comput., 2021

WRGPruner: A new model pruning solution for tiny salient object detection.
Image Vis. Comput., 2021

Fittest survival: an enhancement mechanism for Monte Carlo tree search.
Int. J. Bio Inspired Comput., 2021

Providing Cache Consistency Guarantee for ICN-Based IoT Based on Push Mechanism.
IEEE Commun. Lett., 2021

Combining Counterfactual Regret Minimization with Information Gain to Solve Extensive Games with Imperfect Information.
CoRR, 2021

NNCFR: Minimize Counterfactual Regret with Neural Networks.
CoRR, 2021

AIBPO: Combine the Intrinsic Reward and Auxiliary Task for 3D Strategy Game.
Complex., 2021

An efficient general black-box adversarial attack approach based on multi-objective optimization for high dimensional images.
Comput. Electr. Eng., 2021

Reconstruct Anomaly to Normal: Adversarially Learned and Latent Vector-Constrained Autoencoder for Time-Series Anomaly Detection.
Proceedings of the PRICAI 2021: Trends in Artificial Intelligence, 2021

Hierarchical Semantic Enhanced Directional Graph Network for Visual Commonsense Reasoning.
Proceedings of the Trustworthy AI'21: Proceedings of the 1st International Workshop on Trustworthy AI for Multimedia Computing, 2021

Watch and Buy: A Practical Solution for Real-time Fashion Product Identification in Live Stream.
Proceedings of the WAB'21: Proceedings of the 1st Workshop on Multimodal Product Identification in Livestreaming and WAB Challenge, 2021

Fine-Grained Unbalanced Interaction Network for Visual Question Answering.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Odess: Speeding up Resemblance Detection for Redundancy Elimination by Fast Content-Defined Sampling.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

FedSP: Federated Speaker Verification with Personal Privacy Preservation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

The Dilemma between Deduplication and Locality: Can Both be Achieved?
Proceedings of the 19th USENIX Conference on File and Storage Technologies, 2021

Secure Neural Network in Federated Learning with Model Aggregation under Multiple Keys.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021

Student Can Also be a Good Teacher: Extracting Knowledge from Vision-and-Language Model for Cross-Modal Retrieval.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
DP-FL: a novel differentially private federated learning framework for the unbalanced data.
World Wide Web, 2020

Performance Optimization for Relative-Error-Bounded Lossy Compression on Scientific Data.
IEEE Trans. Parallel Distributed Syst., 2020

Utility-Driven Mining of Trend Information for Intelligent System.
ACM Trans. Manag. Inf. Syst., 2020

Efficient two-party privacy-preserving collaborative <i>k</i>-means clustering protocol supporting both storage and computation outsourcing.
Inf. Sci., 2020

Explore instance similarity: An instance correlation based hashing method for multi-label cross-model retrieval.
Inf. Process. Manag., 2020

Bi-Connect Net for salient object detection.
Neurocomputing, 2020

Commonsense Knowledge Enhanced Memory Network for Stance Classification.
IEEE Intell. Syst., 2020

Reconstruct Anomaly to Normal: Adversarial Learned and Latent Vector-constrained Autoencoder for Time-series Anomaly Detection.
CoRR, 2020

RLCFR: Minimize Counterfactual Regret by Deep Reinforcement Learning.
CoRR, 2020

Solving imperfect-information games via exponential counterfactual regret minimization.
CoRR, 2020

A mix-supervised unified framework for salient object detection.
Appl. Intell., 2020

Enhanced Gaze Following via Object Detection and Human Pose Estimation.
Proceedings of the MultiMedia Modeling - 26th International Conference, 2020

GPU-BTM: A Topic Model for Short Text using Auxiliary Information.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

2019
Efficient quantum key distribution protocol based on classical-quantum polarized channels.
Quantum Inf. Process., 2019

Large scale product search with spatial quantization and deep ranking.
Multim. Tools Appl., 2019

Research on classification method of high-dimensional class-imbalanced datasets based on SVM.
Int. J. Mach. Learn. Cybern., 2019

HashEclat: an efficient frequent itemset algorithm.
Int. J. Mach. Learn. Cybern., 2019

Graph-based supervised discrete image hashing.
J. Vis. Commun. Image Represent., 2019

Fast Eclat Algorithms Based on Minwise Hashing for Large Scale Transactions.
IEEE Internet Things J., 2019

Multi-task deep convolutional neural network for cancer diagnosis.
Neurocomputing, 2019

Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties.
Clust. Comput., 2019

Convolution-Based Neural Attention With Applications to Sentiment Classification.
IEEE Access, 2019

A Secure Decentralized Trustless E-Voting System Based on Smart Contract.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Robust and Reversible Watermarking Technique for Relational Dataset Based on Clustering.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Lattice-Based Anonymous Distributed E-Cash from Bitcoin.
Proceedings of the Provable Security, 2019

Bi-directional Features Reuse Network for Salient Object Detection.
Proceedings of the PRICAI 2019: Trends in Artificial Intelligence, 2019

SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique.
Proceedings of the Network and System Security - 13th International Conference, 2019

Multi-depth Graph Convolutional Networks for Fake News Detection.
Proceedings of the Natural Language Processing and Chinese Computing, 2019

Accelerating Relative-error Bounded Lossy Compression for HPC datasets with Precomputation-Based Mechanisms.
Proceedings of the 35th Symposium on Mass Storage Systems and Technologies, 2019

Solving Six-Player Games via Online Situation Estimation.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

An Adversarial Attack Based on Multi-objective Optimization in the Black-Box Scenario: MOEA-APGA II.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Learning Contextual Features with Multi-head Self-attention for Fake News Detection.
Proceedings of the Cognitive Computing - ICCC 2019, 2019

A New Robust and Reversible Watermarking Technique Based on Erasure Code.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Accelerating Lossy Compression on HPC Datasets via Partitioning Computation for Parallel Processing.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Differentially Private Convolutional Neural Networks with Adaptive Gradient Descent.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

A Multi-objective Examples Generation Approach to Fool the Deep Neural Networks in the Black-Box Scenario.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

RGB-D tracker under Hierarchical structure.
Proceedings of the IEEE Conference on Computational Intelligence for Financial Engineering & Economics, 2019

2018
Securely Outsourcing ID3 Decision Tree in Cloud Computing.
Wirel. Commun. Mob. Comput., 2018

Polynomial dictionary learning algorithms in sparse representations.
Signal Process., 2018

Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating.
J. Netw. Comput. Appl., 2018

Scalable graph based non-negative multi-view embedding for image ranking.
Neurocomputing, 2018

Outsourcing privacy-preserving ID3 decision tree over horizontally partitioned data for multiple parties.
Int. J. High Perform. Comput. Netw., 2018

Decision Tree Based Approaches for Detecting Protein Complex in Protein Protein Interaction Network (PPI) via Link and Sequence Analysis.
IEEE Access, 2018

Fast Time Series Discords Detection with Privacy Preserving.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage.
Proceedings of the 17th IEEE International Conference On Trust, 2018

File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT.
Proceedings of the Network and System Security - 12th International Conference, 2018

Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Balance the Loss: Improving Deep Hash via Loss Weighting and Semantic Preserving.
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018

Pixel Meets Region: A Pratical Framework for Salient Object Detection.
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018

PPLDEM: A Fast Anomaly Detection Algorithm with Privacy Preserving.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Outsourced Privacy Preserving SVM with Multiple Keys.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Variational Autoregressive Decoder for Neural Response Generation.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018

An Improved Measurement of the Imbalanced Dataset.
Proceedings of the Cloud Computing - CLOUD 2018, 2018

Over-Sampling Algorithm Based on VAE in Imbalanced Classification.
Proceedings of the Cloud Computing - CLOUD 2018, 2018

A Novel Anomaly Detection Algorithm Based on Trident Tree.
Proceedings of the Cloud Computing - CLOUD 2018, 2018

2017
Matryoshka Peek: Toward Learning Fine-Grained, Robust, Discriminative Features for Product Search.
IEEE Trans. Multim., 2017

A Two-Phase Improved Correlation Method for Automatic Particle Selection in Cryo-EM.
IEEE ACM Trans. Comput. Biol. Bioinform., 2017

Robust visual tracking via discriminative appearance model based on sparse coding.
Multim. Syst., 2017

Multiple level visual semantic fusion method for image re-ranking.
Multim. Syst., 2017

Adaptive semi-supervised dimensionality reduction based on pairwise constraints weighting and graph optimizing.
Int. J. Mach. Learn. Cybern., 2017

An efficient secure Internet of things data storage auditing protocol with adjustable parameter in cloud computing.
Int. J. Distributed Sens. Networks, 2017

Clustering based virtual machines placement in distributed cloud computing.
Future Gener. Comput. Syst., 2017

Improving sentiment analysis via sentence type classification using BiLSTM-CRF and CNN.
Expert Syst. Appl., 2017

Sparse Blind Speech Deconvolution with Dynamic Range Regularization and Indicator Function.
Circuits Syst. Signal Process., 2017

Offline/online attribute-based encryption with verifiable outsourced decryption.
Concurr. Comput. Pract. Exp., 2017

Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Mining inter-transaction association rules from multiple time-series data.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Feature selection for high dimensional imbalanced class data based on F-measure optimization.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

A novel privacy-preserving distributed anomaly detection method.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

EHSBoost: Enhancing ensembles for imbalanced data-sets by evolutionary hybrid-sampling.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

White-box traceable dynamic attribute based encryption.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Cancer classification with multi-task deep learning.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Lattice-based proxy signature scheme with reject sampling method.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Attribute-based queries over outsourced encrypted database.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Joint L1-L2 Regularisation for Blind Speech Deconvolution.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Blind Speech Deconvolution via Pretrained Polynomial Dictionary and Sparse Representation.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration.
Proceedings of the Information Security Practice and Experience, 2017

Matrix of Polynomials Model Based Polynomial Dictionary Learning Method for Acoustic Impulse Response Modeling.
Proceedings of the 18th Annual Conference of the International Speech Communication Association, 2017

Semantic Video Carving Using Perceptual Hashing and Optical Flow.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

Outsourced Privacy-Preserving C4.5 Algorithm over Arbitrarily Partitioned Databases.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Privacy-Preserving ID3 Data Mining over Encrypted Data in Outsourced Environments with Multiple Keys.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Leveraging Target-Oriented Information for Stance Classification.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2017

2016
Quality biased multimedia data retrieval in microblogs.
J. Vis. Commun. Image Represent., 2016

Resource provision algorithms in cloud computing: A survey.
J. Netw. Comput. Appl., 2016

A joint appearance model of SRC and MFH for multi-objects tracking.
Neurocomputing, 2016

Adaptive semi-supervised dimensionality reduction with sparse representation using pairwise constraints.
Neurocomputing, 2016

Key based data analytics across data centers considering bi-level resource provision in cloud computing.
Future Gener. Comput. Syst., 2016

Learning User and Product Distributed Representations Using a Sequence Model for Sentiment Analysis.
IEEE Comput. Intell. Mag., 2016

Dynamic Attribute-Based Access Control in Cloud Storage Systems.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Key based Reducer Placement for Data Analytics across Data Centers Considering Bi-level Resource Provision in Cloud Computing.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

Saliency meets spatial quantization: A practical framework for large scale product search.
Proceedings of the 2016 IEEE International Conference on Multimedia & Expo Workshops, 2016

A Revocable Outsourcing Attribute-Based Encryption Scheme.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

Generic Construction of Publicly Verifiable Predicate Encryption.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
A Novel Arc Segmentation Approach for Document Image Processing.
Int. J. Pattern Recognit. Artif. Intell., 2015

Live multimedia brand-related data identification in microblog.
Neurocomputing, 2015

A Gloss Composition and Context Clustering Based Distributed Word Sense Representation Model.
Entropy, 2015

Word Embedding Composition for Data Imbalances in Sentiment and Emotion Classification.
Cogn. Comput., 2015

Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

Learning Task Specific Distributed Paragraph Representations Using a 2-Tier Convolutional Neural Network.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

Dynamic Resource Provision for Cloud Broker with Multiple Reserved Instance Terms.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Polynomial Dictionary Learning Method for Acoustic Impulse Response Modeling.
Proceedings of the Latent Variable Analysis and Signal Separation, 2015

Improving Distributed Representation of Word Sense via WordNet Gloss Composition and Context Clustering.
Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing, 2015

2014
Integrating local and global topological structures for semi-supervised dimensionality reduction.
Soft Comput., 2014

Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design.
Quantum Inf. Process., 2014

Using Risk Dominance Strategy in Poker.
J. Inf. Hiding Multim. Signal Process., 2014

A Parallel Scheme for Three-Dimensional Reconstruction in Large-Field Electron Tomography.
Proceedings of the Bioinformatics Research and Applications - 10th International Symposium, 2014

An Improved Correlation Method Based on Rotation Invariant Feature for Automatic Particle Selection.
Proceedings of the Bioinformatics Research and Applications - 10th International Symposium, 2014

SLA aware cost efficient virtual machines placement in cloud computing.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Robust Object Tracking Using Adaptive Multi-Features Fusion Based on Local Kernel Learning.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Shallow parsing with Hidden Markov Support Vector Machines.
Proceedings of the 2014 International Conference on Machine Learning and Cybernetics, 2014

Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Adaptive Semi-Supervised Dimensionality Reduction.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

2013
A supervised approach to detect protein complex by combining biological and topological properties.
Int. J. Data Min. Bioinform., 2013

A novel remote eye gaze tracking approach with dynamic calibration.
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013

2012
An efficient visual tracking method based on single CCD camera.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2012

Two Problems of Circle in Image.
Proceedings of the 10th International Conference on Frontiers of Information Technology, 2012

Error-Correction in Electronic Architectural Drawings.
Proceedings of the 10th International Conference on Frontiers of Information Technology, 2012

Analysis of UCT algorithm policies in imperfect information game.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Biomedical named entity recognition using generalized expectation criteria.
Int. J. Mach. Learn. Cybern., 2011

Protein Remote Homology Detection and Fold Recognition based on Features Extracted from Frequency Profiles.
J. Comput., 2011

ICRC_HITSZ at RITE: Leveraging Multiple Classifiers Voting for Textual Entailment Recognition.
Proceedings of the 9th NTCIR Workshop Meeting on Evaluation of Information Access Technologies: Information Retrieval, 2011

Iterative multiple sequence labeling with classifier combination.
Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering, 2011

Diversifying Information Needs in Results of Question Retrieval.
Proceedings of the Fifth International Joint Conference on Natural Language Processing, 2011

Diversifying Question Recommendations in Community-Based Question Answering.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Complex Detection Based on Integrated Properties.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Using Hybrid Kernel Method for Question Classification in CQA.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Improve Coreference Resolution with Parameter Tunable Anaphoricity Identification and Global Optimization.
Proceedings of the Bio-Inspired Computing and Applications, 2011

Joint Decoding for Chinese Word Segmentation and POS Tagging Using Character-Based and Word-Based Discriminative Models.
Proceedings of the International Conference on Asian Language Processing, 2011

Mixed Precision Method for GPU-based FFT.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011

Coreference Resolution with Loose Transitivity Constraints.
Proceedings of the Fifteenth Conference on Computational Natural Language Learning: Shared Task, 2011

2010
Combining Self Learning and Active Learning for Chinese Named Entity Recognition.
J. Softw., 2010

A Novel Probabilistic Model for Dependency Parsing.
J. Softw., 2010

Conversion between dependency structures and phrase structures using a head finder algorithm.
Proceedings of the 6th International Conference on Natural Language Processing and Knowledge Engineering, 2010

Exploiting rich features for Chinese named entity recognition.
Proceedings of the 2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2010

Example-Based Facial Portraiture Style Learning.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Vision-Based Hand Gesture Recognition Using Combinational Features.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Multi-class Relationship Extraction from Biomedical Literature Using Maximum Entropy.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Reranking for Stacking Ensemble Learning.
Proceedings of the Neural Information Processing. Theory and Algorithms, 2010

CogQTaxo: Modeling human cognitive process with a three-dimensional question taxonomy.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Relationship extraction from biomedical literature using Maximum Entropy based on rich features.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

A Cascade Method for Detecting Hedges and their Scope in Natural Language Text.
Proceedings of the Fourteenth Conference on Computational Natural Language Learning: Shared Task, 2010

Exploiting Rich Features for Detecting Hedges and their Scope.
Proceedings of the Fourteenth Conference on Computational Natural Language Learning: Shared Task, 2010

Protein Sequence Alignment Algorithm Based on Hybrid Profile Information.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2010

Chinese Word Segmentation based on Mixing Multiple Preprocessor and CRF.
Proceedings of the CIPS-SIGHAN Joint Conference on Chinese Language Processing, 2010

2009
Chinese Word Segmentation Based on Large Margin Methods.
Int. J. Asian Lang. Process., 2009

A new question analysis approach for community question answering system.
Int. J. Asian Lang. Process., 2009

Exploiting three kinds of interface propensities to identify protein binding sites.
Comput. Biol. Chem., 2009

Prediction of protein binding sites in protein structures using hidden Markov support vector machine.
BMC Bioinform., 2009

Using Question Classification to Model User Intentions of Different Levels.
Proceedings of the IEEE International Conference on Systems, 2009

CRF-based Active Learning for Chinese Named Entity Recognition.
Proceedings of the IEEE International Conference on Systems, 2009

The Improvement of Q-learning Applied to Imperfect Information Game.
Proceedings of the IEEE International Conference on Systems, 2009

Improved Classification Based on Predictive Association Rules.
Proceedings of the IEEE International Conference on Systems, 2009

Protein Remote Homology Detection Using Order Profiles.
Proceedings of the International Joint Conferences on Bioinformatics, 2009

A Joint Syntactic and Semantic Dependency Parsing System based on Maximum Entropy Models.
Proceedings of the Thirteenth Conference on Computational Natural Language Learning: Shared Task, 2009

Protein Long Disordered Region Prediction Based on Profile-Level Disorder Propensities and Position-Specific Scoring Matrixes.
Proceedings of the 2009 IEEE International Conference on Bioinformatics and Biomedicine, 2009

Protein Secondary Structure Prediction Using Large Margin Methods.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
A discriminative method for protein remote homology detection and fold recognition combining Top-<i>n</i>-grams and latent semantic analysis.
BMC Bioinform., 2008

Avatars based Chinese Sign Language Synthesis System.
Proceedings of the IEEE International Conference on Systems, 2008

Semantic Chunk Annotation for questions using Maximum Entropy.
Proceedings of the IEEE International Conference on Systems, 2008

Chunking with Max-Margin Markov Networks.
Proceedings of the 22nd Pacific Asia Conference on Language, Information and Computation, 2008

Chinese Unknown Word Recognition Using Improved Conditional Random Fields.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Risk Dominance Strategy in Imperfect Information Multi-player Game.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Discriminative Learning of Syntactic and Semantic Dependencies.
Proceedings of the Twelfth Conference on Computational Natural Language Learning, 2008

A Discriminative Method for Protein Remote Homology Detection Based on N-nary Profiles.
Proceedings of the Bioinformatics Research and Development, 2008

2007
Intelligent chinese text input technology for mobile computing.
Proceedings of the IEEE International Conference on Systems, 2007

Model fusion of conditional random fields.
Proceedings of the IEEE International Conference on Systems, 2007

2006
A Maximum Entropy Approach to Chinese Pin Yin-To-Character Conversion.
Proceedings of the IEEE International Conference on Systems, 2006

2005
A Hybrid Language Model Based On Statistics And Linguistic Rules.
Int. J. Pattern Recognit. Artif. Intell., 2005


  Loading...