Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Proactive image manipulation detection via deep semi-fragile watermark
AbstractMalicious image tampering refers to intentionally manipulating images to make them harmful to the owners or users. It has become one of the most severe challenges to image authenticity. Conventional methods for detecting tampering by identifying ...
- research-articleJuly 2024
SDE-based software reliability additive models with masked data using ELS algorithm
Journal of King Saud University - Computer and Information Sciences (JKSUCIS), Volume 36, Issue 3https://doi.org/10.1016/j.jksuci.2024.101978AbstractThe growing complexity of contemporary software systems, with multiple sub-modules, demands innovative modeling approaches, especially in addressing intricate failures and masked data generation. This paper proposed a stochastic differential ...
- research-articleMarch 2024
Learn to Unlearn: Insights Into Machine Unlearning
This article presents a comprehensive review of recent machine unlearning techniques, verification mechanisms, and potential attacks. We highlight emerging challenges and prospective research directions, aiming to provide valuable resources for ...
- research-articleFebruary 2024
Does Negative Sampling Matter? a Review With Insights Into its Theory and Applications
IEEE Transactions on Pattern Analysis and Machine Intelligence (ITPM), Volume 46, Issue 8Pages 5692–5711https://doi.org/10.1109/TPAMI.2024.3371473Negative sampling has swiftly risen to prominence as a focal point of research, with wide-ranging applications spanning machine learning, computer vision, natural language processing, data mining, and recommender systems. This surge in interest prompts us ...
- research-articleJanuary 2024
ClearSpeech: Improving Voice Quality of Earbuds Using Both In-Ear and Out-Ear Microphones
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 7, Issue 4Article No.: 170, Pages 1–25https://doi.org/10.1145/3631409Wireless earbuds have been gaining increasing popularity and using them to make phone calls or issue voice commands requires the earbud microphones to pick up human speech. When the speaker is in a noisy environment, speech quality degrades significantly ...
-
- research-articleJuly 2024
Enhancing Resilience in Website Fingerprinting: Novel Adversary Strategies for Noisy Traffic Environments
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 7216–7231https://doi.org/10.1109/TIFS.2024.3432404The act of website fingerprinting, which involves monitoring traffic features to infer private user information, has attracted much attention in the research community recently. While previous studies primarily focused on classifying fingerprint ...
- research-articleDecember 2023
Analysis and Optimization of Wireless Federated Learning With Data Heterogeneity
IEEE Transactions on Wireless Communications (TWC), Volume 23, Issue 7Pages 7728–7744https://doi.org/10.1109/TWC.2023.3344137With the rapid proliferation of smart mobile devices, federated learning (FL) has been widely considered for application in wireless networks for distributed model training. However, data heterogeneity, e.g., non-independently identically distributions ...
- research-articleMay 2024
ImageReward: learning and evaluating human preferences for text-to-image generation
NIPS '23: Proceedings of the 37th International Conference on Neural Information Processing SystemsArticle No.: 700, Pages 15903–15935We present a comprehensive solution to learn and improve text-to-image models from human preference feedback. To begin with, we build ImageReward—the first general-purpose text-to-image human preference reward model—to effectively encode human ...
- research-articleNovember 2023
Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems
IEEE Transactions on Intelligent Transportation Systems (ITS-TRANSACTIONS), Volume 25, Issue 5Pages 3259–3285https://doi.org/10.1109/TITS.2023.3324962Intelligent transportation systems (ITSs) have been fueled by the rapid development of communication technologies, sensor technologies, and the Internet of Things (IoT). Nonetheless, due to the dynamic characteristics of the vehicle networks, it is rather ...
- research-articleNovember 2023
Stenotic geometry effects on airflow dynamics and respiration for central airway obstruction
Computer Methods and Programs in Biomedicine (CBIO), Volume 241, Issue Chttps://doi.org/10.1016/j.cmpb.2023.107760Highlights- 70% constriction of trachea marks the onset of a precipitous decrease in airflow.
- The Myer-Cotton system can be interpreted in aerodynamics-derived description.
- Bioengineering-informed evaluation for assessment of respiratory ...
The quantitative relationship between tracheal anatomy and ventilation function can be analyzed by using engineering-derived methods, including mathematical modeling and numerical simulations. In order to provide ...
- research-articleOctober 2023
Deep Reinforcement Learning for Online Resource Allocation in Network Slicing
IEEE Transactions on Mobile Computing (ITMV), Volume 23, Issue 6Pages 7099–7116https://doi.org/10.1109/TMC.2023.3328950Network slicing is a key enabler of 5G and beyond networks to satisfy the diverse quality of service (QoS) requirements of different services simultaneously. In network slicing, radio access network (RAN) slicing is essential to establish a functional ...
- ArticleOctober 2023
Semantic Difference Guidance for the Uncertain Boundary Segmentation of CT Left Atrial Appendage
Medical Image Computing and Computer Assisted Intervention – MICCAI 2023Pages 121–131https://doi.org/10.1007/978-3-031-43990-2_12AbstractAtrial fibrillation (AF) is one of the most common types of cardiac arrhythmia, which is closely relevant to anatomical structures including the left atrium (LA) and the left atrial appendage (LAA). Thus, a thorough understanding of the LA and LAA ...
- research-articleAugust 2023
BatchSampler: Sampling Mini-Batches for Contrastive Learning in Vision, Language, and Graphs
KDD '23: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 3057–3069https://doi.org/10.1145/3580305.3599263In-Batch contrastive learning is a state-of-the-art self-supervised method that brings semantically-similar instances close while pushing dissimilar instances apart within a mini-batch. Its key to success is the negative sharing strategy, in which every ...
- research-articleAugust 2023
Robust Information Bottleneck for Task-Oriented Communication With Digital Modulation
IEEE Journal on Selected Areas in Communications (JSAC), Volume 41, Issue 8Pages 2577–2591https://doi.org/10.1109/JSAC.2023.3288252Task-oriented communications, mostly using learning-based joint source-channel coding (JSCC), aim to design a communication-efficient edge inference system by transmitting task-relevant information to the receiver. However, only transmitting task-relevant ...
- research-articleJuly 2023
Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
IEEE Communications Surveys & Tutorials (IEEE_ICST), Volume 25, Issue 3Pages 1748–1774https://doi.org/10.1109/COMST.2023.3273282Today’s cyber attacks have become more severe and frequent, which calls for a new line of security defenses to protect against them. The dynamic nature of new-generation threats, which are evasive, resilient, and complex, makes traditional security ...
- research-articleJune 2023
Region or Global? A Principle for Negative Sampling in Graph-Based Recommendation
IEEE Transactions on Knowledge and Data Engineering (IEEECS_TKDE), Volume 35, Issue 6Pages 6264–6277https://doi.org/10.1109/TKDE.2022.3155155Graph-based recommendation systems are blossoming recently, which models user-item interactions as a user-item graph and utilizes graph neural networks (GNNs) to learn the embeddings for users and items. A fundamental challenge of graph-based ...
- research-articleJune 2023
Deep Reinforcement Learning for Online Resource Allocation in IoT Networks: Technology, Development, and Future Challenges
IEEE Communications Magazine (COMAG), Volume 61, Issue 6Pages 111–117https://doi.org/10.1109/MCOM.001.2200526The growing number of complex and heterogeneous Internet of Things (IoT) applications has imposed a high demand for scarce communications and computing resources. To meet this stringent requirement, it is desirable to develop large-scale highly adaptive ...
- research-articleMay 2023
Covert Model Poisoning Against Federated Learning: Algorithm Design and Optimization
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 3Pages 1196–1209https://doi.org/10.1109/TDSC.2023.3274119Federated learning (FL), as a type of distributed machine learning, is vulnerable to external attacks during parameter transmissions between learning agents and a model aggregator. In particular, malicious participant clients in FL can purposefully craft ...
- research-articleMay 2023
Blockchain Assisted Federated Learning Over Wireless Channels: Dynamic Resource Allocation and Client Scheduling
IEEE Transactions on Wireless Communications (TWC), Volume 22, Issue 5Pages 3537–3553https://doi.org/10.1109/TWC.2022.3219501Blockchain technology has been extensively studied to enable distributed and tamper-proof data processing in federated learning (FL). Most existing blockchain assisted FL (BFL) frameworks have employed a third-party blockchain network to decentralize the ...
- research-articleApril 2023
Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic
WWW '23: Proceedings of the ACM Web Conference 2023Pages 1991–1999https://doi.org/10.1145/3543507.3583200Website fingerprinting attack is an extensively studied technique used in a web browser to analyze traffic patterns and thus infer confidential information about users. Several website fingerprinting attacks based on machine learning and deep learning ...