Yue Qin

Orcid: 0000-0003-1351-5284

According to our database1, Yue Qin authored at least 56 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
HCI Research and Innovation in China: A 10-Year Perspective.
Int. J. Hum. Comput. Interact., April, 2024

FairFix: Enhancing Fairness of Pre-Trained Deep Neural Networks with Scarce Data Resources.
Proceedings of the 10th IEEE International Conference on Intelligent Data and Security, 2024

2023
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels.
Proceedings of the 32nd USENIX Security Symposium, 2023

STINMatch: Semi-Supervised Semantic-Topological Iteration Network for Financial Risk Detection via News Label Diffusion.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

Selecting Real-World Objects via User-Perspective Phone Occlusion.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Enabling Voice-Accompanying Hand-to-Face Gesture Recognition with Cross-Device Sensing.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Vulnerability Intelligence Alignment via Masked Graph Attention Networks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Stolen Risks of Models with Security Properties.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Water Level Retrieval Using a posteriori Residual of GNSS Pseudorange and Carrier-Phase Observations.
IEEE Trans. Geosci. Remote. Sens., 2022

Further Analysis and Improvements of a Lattice-Based Anonymous PAKE Scheme.
IEEE Syst. J., 2022

Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange.
IACR Cryptol. ePrint Arch., 2022

Cybersecurity Entity Alignment via Masked Graph Attention Networks.
CoRR, 2022

Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale.
CoRR, 2022

A management method of chronic diseases in the elderly based on IoT security environment.
Comput. Electr. Eng., 2022

Encrypted Malware Traffic Detection via Graph-based Network Analysis.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

ValCAT: Variable-Length Contextualized Adversarial Transformations Using Encoder-Decoder Language Model.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022

2021
DualRing: Enabling Subtle and Expressive Hand Interaction with Dual IMU Rings.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS.
IACR Cryptol. ePrint Arch., 2021

A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs.
IACR Cryptol. ePrint Arch., 2021

Feature Selection on Elite Hybrid Binary Cuckoo Search in Binary Label Classification.
Comput. Math. Methods Medicine, 2021

Parameter Measurement of Live Animals Based on the Mirror of Multiview Point Cloud.
Comput. Intell. Neurosci., 2021

Optimal Condition-Based Maintenance Strategy via an Availability-Cost Hybrid Factor for a Single-Unit System During a Two-Stage Failure Process.
IEEE Access, 2021

A Line Selection Method Based on Transient Phase Current Variation Comparison.
Proceedings of the ICITEE 2021: The 4th International Conference on Information Technologies and Electrical Engineering, Changde, Hunan, China, October 29, 2021

ProxiMic: Convenient Voice Activation via Close-to-Mic Speech Detected by a Single Microphone.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Learning Security Classifiers with Verified Global Robustness Properties.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Alignment-Supervised Bidimensional Attention-Based Recursive Autoencoders for Bilingual Phrase Representation.
IEEE Trans. Cybern., 2020

Embeddable Structure for Reducing Mutual Coupling in Massive MIMO Antennas.
IEEE Access, 2020

Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Spatial Knowledge Acquisition for Cognitive Maps in Autonomous Vehicles.
Proceedings of the Engineering Psychology and Cognitive Ergonomics. Cognition and Design, 2020

A PTAS for the Bayesian Thresholding Bandit Problem.
Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics, 2020

2019
Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era.
IEEE Trans. Smart Grid, 2019

半监督聚类综述 (Survey of Semi-supervised Clustering).
计算机科学, 2019

An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber.
IACR Cryptol. ePrint Arch., 2019

A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope.
IACR Cryptol. ePrint Arch., 2019

A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs).
IACR Cryptol. ePrint Arch., 2019

Research Progress on Semi-Supervised Clustering.
Cogn. Comput., 2019

Exploiting reverse target-side contexts for neural machine translation via asynchronous bidirectional decoding.
Artif. Intell., 2019

Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

CNN-Based Stereoscopic Image Inpainting.
Proceedings of the Image and Graphics - 10th International Conference, 2019

HandSee: Enabling Full Hand Interaction on Smartphone with Front Camera-based Stereo Vision.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Interactive stereo image segmentation via adaptive prior selection.
Multim. Tools Appl., 2018

A neural generative autoencoder for bilingual word embeddings.
Inf. Sci., 2018

RIMS: A Real-time and Intelligent Monitoring System for live-broadcasting platforms.
Future Gener. Comput. Syst., 2018

Lighting the Way to a Smart World: Lattice-Based Cryptography for Internet of Things.
CoRR, 2018

Otem&Utem: Over- and Under-Translation Evaluation Metric for NMT.
Proceedings of the Natural Language Processing and Chinese Computing, 2018

Research of Land Use Ground Temperature Effect in the Main Districts of Chongqing.
Proceedings of the 2018 7th International Conference on Agro-geoinformatics (Agro-geoinformatics), 2018

Ecological Land Cold Island Effect Evaluation Based on Land Surface Temperature Retrieval.
Proceedings of the 2018 7th International Conference on Agro-geoinformatics (Agro-geoinformatics), 2018

Asynchronous Bidirectional Decoding for Neural Machine Translation.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
基于深度置信网络的维吾尔语人称代词待消解项识别 (Anaphoricity Determination of Uyghur Personal Pronouns Based on Deep Belief Network).
计算机科学, 2017

Finding a Steady State Point for Fixed Priority Independent Periodic Real-Time Tasks with Arbitrary Given Release Offsets.
Proceedings of the 20th IEEE International Symposium on Real-Time Distributed Computing, 2017

V-Tree: Efficient kNN Search on Moving Objects with Road-Network Constraints.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

2016
Interactive Stereo Image Segmentation With RGB-D Hybrid Constraints.
IEEE Signal Process. Lett., 2016

2014
The challenges of linking health insurer claims with electronic medical records.
Health Informatics J., 2014

2013
The Viscous Mechanism of Transformation and Upgrading of China's Manufacturing and ITS Path - from the Perspective of the Causes of "Smiling Curve".
Proceedings of the Sixth International Conference on Business Intelligence and Financial Engineering, 2013

2011
Purge Originator Identification TLV for IS-IS.
RFC, May, 2011


  Loading...