Yuxin Ding

Orcid: 0009-0003-6325-7014

According to our database1, Yuxin Ding authored at least 74 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Abnormal Pavement Condition Detection with Vehicle Posture Data Considering Speed Variations.
Sensors, July, 2024

Federated Learning of Large ASR Models in the Real World.
CoRR, 2024

FVD-DPM: Fine-grained Vulnerability Detection via Conditional Diffusion Probabilistic Models.
Proceedings of the 33rd USENIX Security Symposium, 2024

Multi-task Contrastive Learning for Anomaly Detection on Attributed Networks.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2024

MultiRider: Enabling Multi-Tag Concurrent OFDM Backscatter by Taming In-band Interference.
Proceedings of the 22nd Annual International Conference on Mobile Systems, 2024

SlickScatter: Retrieve WiFi Backscatter Signal from Unknown Interference.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

WiB-MAC: Collision-Avoidance Multiple Access for Wi-Fi Backscatter Networks.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

The Heuristic Design Innovation Approach for Data-Integrated Large Language Model.
Proceedings of the Artificial Intelligence in HCI, 2024

A Multimodal In-Context Tuning Approach for E-Commerce Product Description Generation.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024

2023
An integrated decision model with reliability to support transport safety system analysis.
Reliab. Eng. Syst. Saf., November, 2023

Fast and Robust Online Handwritten Chinese Character Recognition With Deep Spatial and Contextual Information Fusion Network.
IEEE Trans. Multim., 2023

Android malware detection method based on bytecode image.
J. Ambient Intell. Humaniz. Comput., 2023

From Pattern to Imagery Correlation: An Evaluation Method for the Redesign of Liangzhu Patterns Based on GRA-TOPSIS.
Proceedings of the Cross-Cultural Design, 2023

The Gift of Feedback: Improving ASR Model Quality by Learning from User Corrections Through Federated Learning.
Proceedings of the IEEE Automatic Speech Recognition and Understanding Workshop, 2023

A Neural Divide-and-Conquer Reasoning Framework for Image Retrieval from Linguistically Complex Text.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

A Multi-Modal Context Reasoning Approach for Conditional Inference on Joint Textual and Visual Clues.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
Multidomain image-to-image translation model based on hidden space sharing.
Neural Comput. Appl., 2022

Chunk-aware Alignment and Lexical Constraint for Visual Entailment with Natural Language Explanations.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Medical Dialogue Response Generation with Pivotal Information Recalling.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

RotatGAT: Learning Knowledge Graph Embedding with Translation Assumptions and Graph Attention Networks.
Proceedings of the International Joint Conference on Neural Networks, 2022

Improving Knowledge Graph Embedding Using Dynamic Aggregation of Neighbor Information.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

Graph Convolutional Neural Network Based on Channel Graph Fusion for EEG Emotion Recognition.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

A Dynamic Immune Strategy for Blocking the Spreading of Worms in Vanets.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2022

RotatSAGE: A Scalable Knowledge Graph Embedding Model Based on Translation Assumptions and Graph Neural Networks.
Proceedings of the Data Mining and Big Data - 7th International Conference, 2022

A Model for Detecting Malware Adversarial Samples Based on Anomaly Detection Technology.
Proceedings of the 2022 2nd International Conference on Algorithms, 2022

2021
Sentence-level Online Handwritten Chinese Character Recognition.
CoRR, 2021

GlyphCRM: Bidirectional Encoder Representation for Chinese Character with its Glyph.
CoRR, 2021

A Malware Family Classification Method Based on the Point Cloud Model DGCNN.
Proceedings of the Network and System Security - 15th International Conference, 2021

Data Augmentation in Training Deep Learning Models for Malware Family Classification.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2021

2020
Crowd counting by using multi-level density-based spatial information: A Multi-scale CNN framework.
Inf. Sci., 2020

iPiDA-sHN: Identification of Piwi-interacting RNA-disease associations by selecting high quality negative samples.
Comput. Biol. Chem., 2020

Fine-Grained Scene-Graph-to-Image Model Based on SAGAN.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

2019
Malware detection based on deep learning algorithm.
Neural Comput. Appl., 2019

Ontology-based knowledge representation for malware individuals and families.
Comput. Secur., 2019

An Airborne Software FMEA Application Method Based on ARP4761.
Proceedings of the 2019 3rd International Conference on Management Engineering, 2019

An Airborne Software CMA Application Method Based on ARP4761.
Proceedings of the 2019 3rd International Conference on Management Engineering, 2019

A Deep Feature Fusion Method for Android Malware Detection.
Proceedings of the 2019 International Conference on Machine Learning and Cybernetics, 2019

A Denoising Framework for Image Caption.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

2018
A malware detection method based on family behavior graph.
Comput. Secur., 2018

Automaticlly Learning Featurs Of Android Apps Using CNN.
Proceedings of the 2018 International Conference on Machine Learning and Cybernetics, 2018

Detecting Android Malware Using Bytecode Image.
Proceedings of the Cognitive Computing - ICCC 2018, 2018

Source Detection Method Based on Propagation Probability.
Proceedings of the Cognitive Computing - ICCC 2018, 2018

2017
Rank learning algorithm for user reputation.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Malware detection based on ontology.
Proceedings of the 2017 International Conference on Machine Learning and Cybernetics, 2017

2016
Predicting the attributes of social network users using a graph-based machine learning method.
Comput. Commun., 2016

Application of Deep Belief Networks for opcode based malware detection.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

Android Malware Detection Method Based on Function Call Graphs.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016

Link prediction based on dynamic weighted social attribute network.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2016

2015
Ranking algorithm based on relational topic model.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

Topic Optimization Method Based on Pointwise Mutual Information.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

Topic optimization method based on Laplace score.
Proceedings of the 2015 International Conference on Machine Learning and Cybernetics, 2015

2014
Control flow-based opcode behavior analysis for Malware detection.
Comput. Secur., 2014

Abnormal user detection based on instant messages.
Proceedings of the 2014 International Conference on Machine Learning and Cybernetics, 2014

Malicious Code Detection Using Opcode Running Tree Representation.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
A fast malware detection algorithm based on objective-oriented association mining.
Comput. Secur., 2013

Malware detection based on objective-oriented association mining.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2013

2012
Object retrival based on visual word pairs.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

2011
Feature representation and selection in malicious code detection methods based on static system calls.
Comput. Secur., 2011

Learning to rank relational objects based on the listwise approach.
Proceedings of the 2011 International Joint Conference on Neural Networks, 2011

Learning to Rank Documents Using Similarity Information between Objects.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

User Identification for Instant Messages.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

High Order Hopfield Network with Self-feedback to Solve Crossbar Switch Problem.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Malicious web page detection based on on-line learning algorithm.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

2010
On-line Hot Topic Recommendation Using Tolerance Rough Set Based Topic Clustering.
J. Comput., 2010

Cross Lingual Opinion Analysis via Transfer Learning.
Aust. J. Intell. Inf. Process. Syst., 2010

Topic Detection by Topic Model Induced Distance Using Biased Initiation.
Proceedings of the Advances in Computer Science and Information Technology, 2010

A high order neural network to solve N-queens problem.
Proceedings of the International Joint Conference on Neural Networks, 2010

A High Order Neural Network to Solve Crossbar Switch Problem.
Proceedings of the Neural Information Processing. Models and Applications, 2010

Topic based automatic news recommendation using topic model and affinity propagation.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

2009
The Performance Optimization of CLIPS.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

2008
Genre identification of Chinese finance text using machine learning method.
Proceedings of the IEEE International Conference on Systems, 2008

2003
Host-based intrusion detection using dynamic and static behavioral models.
Pattern Recognit., 2003

2002
User Profiling for Intrusion Detection Using Dynamic and Static Behavioral Models.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2002

2000
Design and Implementation of Java Just-in-Time Compiler.
J. Comput. Sci. Technol., 2000


  Loading...