Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2024
New Insights on Relieving Task-Recency Bias for Online Class Incremental Learning
IEEE Transactions on Circuits and Systems for Video Technology (IEEETCSVT), Volume 34, Issue 5Pages 3451–3464https://doi.org/10.1109/TCSVT.2023.3325651To imitate the ability of keeping learning of human, continual learning which can learn from a never-ending data stream has attracted more interests recently. In all settings, the online class incremental learning (OCIL), where incoming samples from data ...
- correctionJanuary 2024
- research-articleNovember 2023
Privacy-aware document retrieval with two-level inverted indexing
AbstractPrevious work on privacy-aware ranking has addressed the minimization of information leakage when scoring top k documents, and has not studied on how to retrieve these top documents and their features for ranking. This paper proposes a privacy-...
- research-articleDecember 2022
A graph neural network-based stock forecasting method utilizing multi-source heterogeneous data fusion
Multimedia Tools and Applications (MTAA), Volume 81, Issue 30Pages 43753–43775https://doi.org/10.1007/s11042-022-13231-1AbstractThe study of the prediction of stock market volatility is of great significance to rationally control financial market risks and increase excessive investment returns and has received extensive attention from academic and commercial circles. ...
- research-articleSeptember 2021
Local-enhanced Interaction for Temporal Moment Localization
ICMR '21: Proceedings of the 2021 International Conference on Multimedia RetrievalPages 201–209https://doi.org/10.1145/3460426.3463616Temporal moment localization via language aims to localize a video span in an untrimmed video which best matches the given natural language query. In most previous works, they try to match the whole query feature with multiple moment proposals, or match ...
- short-paperJuly 2021
Window Navigation with Adaptive Probing for Executing BlockMax WAND
SIGIR '21: Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information RetrievalPages 2323–2327https://doi.org/10.1145/3404835.3463109BlockMax WAND (BMW) and its variants can effectively prune low-scoring documents for fast top-k disjunctive query processing. This paper studies a boosting approach that further accelerates document retrieval by executing BMW, or one of its variants, on ...
- research-articleOctober 2020
Index Obfuscation for Oblivious Document Retrieval in a Trusted Execution Environment
CIKM '20: Proceedings of the 29th ACM International Conference on Information & Knowledge ManagementPages 1345–1354https://doi.org/10.1145/3340531.3412035This paper studies privacy-aware inverted index design and document retrieval for multi-keyword document search in a trusted hardware execution environment such as Intel SGX. The previous work uses time-consuming oblivious computing techniques to avoid ...
- research-articleJuly 2019
Privacy-aware Document Ranking with Neural Signals
SIGIR'19: Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information RetrievalPages 305–314https://doi.org/10.1145/3331184.3331189The recent work on neural ranking has achieved solid relevance improvement, by exploring similarities between documents and queries using word embeddings. It is an open problem how to leverage such an advancement for privacy-aware ranking, which is ...
- research-articleMay 2019
Efficient Interaction-based Neural Ranking with Locality Sensitive Hashing
Interaction-based neural ranking has been shown to be effective for document search using distributed word representations. However the time or space required is very expensive for online query processing with neural ranking. This paper investigates ...
- research-articleJune 2018
Privacy-aware Ranking with Tree Ensembles on the Cloud
SIGIR '18: The 41st International ACM SIGIR Conference on Research & Development in Information RetrievalPages 315–324https://doi.org/10.1145/3209978.3210022Tree-based ensembles are widely used for document ranking but supporting such a method efficiently under a privacy-preserving constraint on the cloud is an open research problem. The main challenge is that letting the cloud server perform ranking ...
- articleJune 2018
Decision Theory Based Localization Algorithm in Smart Park
Wireless Personal Communications: An International Journal (WPCO), Volume 100, Issue 3Pages 1023–1046https://doi.org/10.1007/s11277-018-5498-7The rapid development of the Internet facilitates the transformation to the smart park from the traditional one. The positioning function of the wireless sensor network--one of the solution of the smart park--is facing challenges on the region where a ...
- research-articleApril 2018
Privacy and Efficiency Tradeoffs for Multiword Top K Search with Linear Additive Rank Scoring
WWW '18: Proceedings of the 2018 World Wide Web ConferencePages 1725–1734https://doi.org/10.1145/3178876.3186084This paper proposes a private ranking scheme with linear additive scoring for efficient top K keyword search on modest-sized cloud datasets. This scheme strikes for tradeoffs between privacy and efficiency by proposing single-round client-server ...
- articleFebruary 2017
A Heterogeneous Network Access Selection Algorithm Based on Attribute Dependence
Wireless Personal Communications: An International Journal (WPCO), Volume 92, Issue 3Pages 1163–1176https://doi.org/10.1007/s11277-016-3600-6In order to solve the problem which fails to consider the degree of attribute dependence in current network access selection schemes, a novel heterogeneous network access selection scheme based on attribute dependence is proposed in this paper. The ...
- articleApril 2016
Optimizing routing based on congestion control for wireless sensor networks
Along with the increasing demands for the applications running on the wireless sensor network (WSN), energy consumption and congestion become two main problems to be resolved urgently. However, in most scenes, these two problems aren't considered ...
- research-articleJanuary 2016
Incentive Mechanisms for Discretized Mobile Crowdsensings
IEEE Transactions on Wireless Communications (TWC), Volume 15, Issue 1Pages 146–161https://doi.org/10.1109/TWC.2015.2468724In crowdsensing to mobile phones, each user needs incentives to participate. Mobile devices with sensing capabilities have enabled a new paradigm of mobile crowdsensing with a broad range of applications. A major challenge in achieving stable crowdsensing ...
- research-articleMarch 2015
Wormhole Attack Detection Algorithms in Wireless Network Coding Systems
IEEE Transactions on Mobile Computing (ITMV), Volume 14, Issue 3Pages 660–674https://doi.org/10.1109/TMC.2014.2324572Network coding has been shown to be an effective approach to improve the wireless system performance. However, many security issues impede its wide deployment in practice. Besides the well-studied pollution attacks, there is another severe threat, that of ...