Yin Lin

Orcid: 0000-0002-6609-5706

According to our database1, Yin Lin authored at least 27 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Exploring gauge-fixing conditions with gradient-based optimization.
CoRR, 2024

Cross-modulated Attention Transformer for RGBT Tracking.
CoRR, 2024

Mitigating Subgroup Unfairness in Machine Learning Classifiers: A Data-Driven Approach.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

SMARTFEAT: Efficient Feature Construction through Feature-Level Foundation Model Interactions.
Proceedings of the 14th Conference on Innovative Data Systems Research, 2024

2023
Predicate Pushdown for Data Science Pipelines.
Proc. ACM Manag. Data, 2023

Representation Bias in Data: A Survey on Identification and Resolution Techniques.
ACM Comput. Surv., 2023

Exploring Part-Informed Visual-Language Learning for Person Re-Identification.
CoRR, 2023

2022
OREO: Detection of Cherry-picked Generalizations.
Proc. VLDB Endow., 2022

Neural-network preconditioners for solving the Dirac equation in lattice gauge theory.
CoRR, 2022

A Survey on Techniques for Identifying and Resolving Representation Bias in Data.
CoRR, 2022

Applications of Machine Learning to Lattice Quantum Field Theory.
CoRR, 2022

2021
On Detecting Cherry-picked Generalizations.
Proc. VLDB Endow., 2021

LoginSoEasy: a System Enabling both Authentication and Protection of Personal Information based on Trusted User Agent.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Identifying Insufficient Data Coverage in Databases with Multiple Relations.
Proc. VLDB Endow., 2020

MithraDetective: A System for Cherry-picked Trendlines Detection.
CoRR, 2020

2018
R^2 -Tree: An Efficient Indexing Scheme for Server-Centric Data Center Networks.
Proceedings of the Database and Expert Systems Applications, 2018

2017
A two-party privacy preserving set intersection protocol against malicious users in cloud computing.
Comput. Stand. Interfaces, 2017

2016
Evaluating Item-Item Similarity Algorithms for Movies.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Protecting Websites from Attack with Secure Delivery Networks.
Computer, 2015

2013
Simulation Analysis of the Blocking Effect of Transaction Costs in China's Housing Market.
J. Artif. Soc. Soc. Simul., 2013

Pushing CDN-ISP collaboration to the limit.
Comput. Commun. Rev., 2013

Less pain, most of the gain: incrementally deployable ICN.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

DataSpotting: Exploiting naturally clustered mobile devices to offload cellular traffic.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Peer-assisted content distribution in Akamai netsession.
Proceedings of the 2013 Internet Measurement Conference, 2013

2012
Reliable Client Accounting for P2P-Infrastructure Hybrids.
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012

2004
Context Information Extraction of the Query Based on Single Document.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004

2002
Evaluating the best main battle tank using fuzzy decision theory with linguistic criteria evaluation.
Eur. J. Oper. Res., 2002


  Loading...