Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleDecember 2024
PSG-Adapter: Controllable Planning Scene Graph for Improving Text-to-Image Diffusion
AbstractSignificant progress in text-to-image generation has been driven by the application of diffusion models, highlighting their crucial role and exceptional impact on this field. However, diffusion models often fall short of comprehending spatial ...
- research-articleNovember 2024
ChatCam: Embracing LLMs for Contextual Chatting-to-Camera with Interest-Oriented Video Summarization
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 4Article No.: 168, Pages 1–34https://doi.org/10.1145/3699731Cameras are ubiquitous in society, with users increasingly looking to extract insights about the physical world. Current human-to-camera interaction methods, while advanced, still need to support an intuitive, conversational interaction as one would ...
- research-articleNovember 2024
Deadline and Period Assignment for Guaranteeing Timely Response of the Cyber-Physical System
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 30, Issue 1Article No.: 1, Pages 1–26https://doi.org/10.1145/3689048Cyber-physical systems (CPSs) need to respond to each change of each monitored object in time. The entire response process can be divided into two stages: the update stage and the control stage. Tasks in CPSs can thus be divided into two kinds: update ...
- posterNovember 2024
Poster: Enabling IoT Application Programming in Natural Language with IoTPilot
SenSys '24: Proceedings of the 22nd ACM Conference on Embedded Networked Sensor SystemsPages 903–904https://doi.org/10.1145/3666025.3699429In recent years, the swift expansion of Internet of Things (IoT) applications has been notable. However, developing a comprehensive IoT application is highly challenging for non-expert developers due to the highly diverse characteristics of embedded ...
Combating BLE Weak Links with Adaptive Symbol Extension and DNN-based Demodulation
SenSys '24: Proceedings of the 22nd ACM Conference on Embedded Networked Sensor SystemsPages 619–632https://doi.org/10.1145/3666025.3699362Bluetooth Low Energy (BLE) is one of the most popular wireless protocols for building IoT applications because of its low energy, low cost, and wide compatibility nature. However, BLE communication performance can be easily affected by interference and ...
-
- research-articleSeptember 2024
ChatIoT: Zero-code Generation of Trigger-action Based IoT Programs
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 3Article No.: 103, Pages 1–29https://doi.org/10.1145/3678585Trigger-Action Program (TAP) is a simple but powerful format to realize intelligent IoT applications, especially in home automation scenarios. Existing trace-driven approaches and in-situ programming approaches depend on either customized interaction ...
- research-articleAugust 2024
Elastic DNN Inference With Unpredictable Exit in Edge Computing
IEEE Transactions on Mobile Computing (ITMV), Volume 23, Issue 12Pages 14005–14016https://doi.org/10.1109/TMC.2024.3441946Multi-exit neural networks have gained popularity in edge computing to leverage the computing power of diverse devices. However, real-time tasks in edge applications often face frequent unpredictable exits caused by power outages or high-priority ...
- research-articleAugust 2024
Modeling and Controller Design of a Cloud-Based Control Switching System in an Uncertain Network Environment
Journal of Network and Systems Management (JNSM), Volume 32, Issue 4https://doi.org/10.1007/s10922-024-09850-8AbstractCloud control system (CCS) is an important embodiments of the convergence of information technology (IT) and operational technology (OT) in the industrial internet of things (IIoT). Meeting the time-sensitive requirements of control systems in an ...
- research-articleAugust 2024
Reducing End-to-End Latency of Trigger-Action IoT Programs on Containerized Edge Platforms
IEEE Transactions on Mobile Computing (ITMV), Volume 23, Issue 12Pages 13979–13990https://doi.org/10.1109/TMC.2024.3439533IoT rule engines are important middlewares that allow users to easily create custom trigger-action programs (TAPs) and interact with the physical world. Users expect their TAPs to give a timely response within a certain deadline. Existing works provide ...
- research-articleJanuary 2025
Unlearning from weakly supervised learning
IJCAI '24: Proceedings of the Thirty-Third International Joint Conference on Artificial IntelligenceArticle No.: 553, Pages 5000–5008https://doi.org/10.24963/ijcai.2024/553Machine unlearning provides users with the right to remove their privacy data from a well-trained model. Existing approaches of machine unlearning mainly focus on exploring data removing within supervised learning (SL) tasks. However, weakly supervised ...
- research-articleJanuary 2025
SimEnc: a high-performance similarity-preserving encryption approach for deduplication of encrypted docker images
USENIX ATC'24: Proceedings of the 2024 USENIX Conference on Usenix Annual Technical ConferenceArticle No.: 38, Pages 615–630Encrypted Docker images are becoming increasingly popular in Docker registries for privacy. As the Docker registry is tasked with managing an increasing number of images, it becomes essential to implement deduplication to conserve storage space. However, ...
- ArticleJuly 2024
Semi-supervised Malicious Domain Detection Based on Meta Pseudo Labeling
AbstractThe Domain Name System (DNS) is a crucial infrastructure of the Internet, yet it is also a primary medium for disseminating illicit content. Researchers have proposed numerous methods to detect malicious domains, with association-based approaches ...
- research-articleJune 2024
Complementary to Multiple Labels: A Correlation-Aware Correction Approach
IEEE Transactions on Pattern Analysis and Machine Intelligence (ITPM), Volume 46, Issue 12Pages 9179–9191https://doi.org/10.1109/TPAMI.2024.3416384<italic>Complementary label learning</italic> (CLL) requires annotators to give <italic>irrelevant</italic> labels instead of relevant labels for instances. Currently, CLL has shown its promising performance on multi-class data by estimating a transition ...
- research-articleJuly 2024
Improving generalized zero-shot learning via cluster-based semantic disentangling representation
AbstractGeneralized Zero-Shot Learning (GZSL) aims to recognize both seen and unseen classes by training only the seen classes, in which the instances of unseen classes tend to be biased towards the seen class. In this paper, we propose a Cluster-based ...
Highlights- The proposed CSDR method improves GZSL by alleviating domain shift and semantic gap.
- Semantic disentangling module learns fine-grained semantic feature of visual vectors.
- Semantic representation module rises intra-class similarity &...
- research-articleMay 2024
Understanding Differencing Algorithms for Mobile Application Updates
IEEE Transactions on Mobile Computing (ITMV), Volume 23, Issue 12Pages 12146–12160https://doi.org/10.1109/TMC.2024.3407867Mobile application updates occur frequently, and they continue to add considerable traffic over the Internet. Differencing algorithms, which compute a small delta between the new version and the old version, are often employed to reduce the update ...
- research-articleJuly 2024
dTEE: A Declarative Approach to Secure IoT Applications Using TrustZone
2024 23rd ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)Pages 200–212https://doi.org/10.1109/IPSN61024.2024.00021Internet of Things (IoT) applications have recently been widely used in safety-critical scenarios. To prevent sensitive information leaks, IoT device vendors provide hardware-assisted protections, called Trusted Execution Environments (TEEs), like ARM ...
- research-articleMay 2024
Unlocking the Non-deterministic Computing Power with Memory-Elastic Multi-Exit Neural Networks
WWW '24: Proceedings of the ACM Web Conference 2024Pages 2777–2785https://doi.org/10.1145/3589334.3645340With the increasing demand for Web of Things (WoT) and edge computing, the efficient utilization of limited computing power on edge devices is becoming a crucial challenge. Traditional neural networks (NNs) as web services rely on deterministic ...
- research-articleMay 2024
Structured Measurement Matrices Based on Deterministic Fourier Matrices and Gram Matrices
Circuits, Systems, and Signal Processing (CSSP), Volume 43, Issue 8Pages 5121–5138https://doi.org/10.1007/s00034-024-02692-4AbstractThe measurement matrices play a crucial role in compressed sensing, directly impacting the performance of signal sampling and reconstruction. As one of the primary construction methods for measurement matrices, designing structured measurement ...
- research-articleApril 2024
Aggregation formulation for on‐site multidepot vehicle scheduling scenario
Computer-Aided Civil and Infrastructure Engineering (MICE), Volume 39, Issue 20Pages 3030–3062https://doi.org/10.1111/mice.13217AbstractThe multidepot vehicle scheduling problem (MDVSP) is a fundamental public transport challenge. To address the large‐scale model and inherent solution symmetry associated with the traditional trip‐to‐trip connection‐based approach for MDVSP, a ...
- research-articleApril 2024
Exploiting Library Vulnerability via Migration Based Automating Test Generation
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 228, Pages 1–12https://doi.org/10.1145/3597503.3639583In software development, developers extensively utilize third-party libraries to avoid implementing existing functionalities. When a new third-party library vulnerability is disclosed, project maintainers need to determine whether their projects are ...