Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Dismantling complex networks with graph contrastive learning and multi-hop aggregation
Information Sciences: an International Journal (ISCI), Volume 676, Issue Chttps://doi.org/10.1016/j.ins.2024.120780AbstractNetwork dismantling is a process of identifying influential nodes that can decompose a network into disconnected sub-networks. This provides a novel approach to understanding and analyzing complex networks abstracted from the real world. State-of-...
- review-articleJuly 2024
Deep semi-supervised learning for medical image segmentation: A review
Expert Systems with Applications: An International Journal (EXWA), Volume 245, Issue Chttps://doi.org/10.1016/j.eswa.2023.123052AbstractDeep learning has recently demonstrated considerable promise for a variety of computer vision tasks. However, in many practical applications, large-scale labeled datasets are not available, which limits the deployment of deep learning. To address ...
- research-articleJune 2024
- research-articleFebruary 2024
Pancreas segmentation in CT based on RC-3DUNet with SOM
AbstractDeep learning-based automatic and accurate 3D pancreas segmentation plays a significant role in medical diagnosis and disease treatment, which has received a lot of attention from the medical image processing community. 3D pancreas segmentation ...
- research-articleApril 2024
Data-driven optimization for energy-constrained dietary supplement scheduling: A bounded cut MP-DQN approach
Computers and Industrial Engineering (CINE), Volume 188, Issue Chttps://doi.org/10.1016/j.cie.2024.109894AbstractEnergy rationing exerts a substantial influence on the landscape of manufacturing operations. When mandatory energy rationing occurs, manufacturers find themselves compelled to adapt their production strategies to align with the prescribed ...
Highlights- A multi-period production process is studied under energy uncertainty.
- Propose an operational decision model with a known rationing schedule.
- Propose a data-driven reinforcement learning algorithm for uncertain rationing schedules.
-
- research-articleJanuary 2024
Range Specification Bug Detection in Flight Control System Through Fuzzing
IEEE Transactions on Software Engineering (ISOF), Volume 50, Issue 3Pages 461–473https://doi.org/10.1109/TSE.2024.3354739Developers and manufacturers provide configurable control parameters for flight control programs to support various environments and missions, along with suggested ranges for these parameters to ensure flight safety. However, this flexible mechanism can ...
- research-articleJuly 2024
FDFL: Fair and Discrepancy-Aware Incentive Mechanism for Federated Learning
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 8140–8154https://doi.org/10.1109/TIFS.2024.3433537Federated Learning (FL) is an emerging distributed machine learning paradigm crucial for ensuring privacy-preserving learning. In FL, a fair incentive mechanism is indispensable for inspiring more clients to participate in FL training. Nevertheless, ...
- research-articleDecember 2023
Anti-Compression Contrastive Facial Forgery Detection
IEEE Transactions on Multimedia (TOM), Volume 26Pages 6166–6177https://doi.org/10.1109/TMM.2023.3347103Forgery of facial images and videos has increased the concern about digital security. It has led to the significant development of detecting forgery data recently. However, the data, especially the videos published on the Internet, are usually compressed ...
- research-articleDecember 2023
Homomorphic Compression: Making Text Processing on Compression Unlimited
Proceedings of the ACM on Management of Data (PACMMOD), Volume 1, Issue 4Article No.: 271, Pages 1–28https://doi.org/10.1145/3626765Lossless data compression is an effective way to handle the huge transmission and storage overhead of massive text data. Its utility is even more significant today when data volumes are skyrocketing. The concept of operating on compressed data infuses ...
- ArticleNovember 2023
A Domain Knowledge-Based Semi-supervised Pancreas Segmentation Approach
AbstractThe five-year survival rate of pancreatic cancer is extremely low, and the survival time of patients can be extended by timely detection and treatment. Deep learning-based methods have been used to assist radiologists in diagnosis, with remarkable ...
- research-articleNovember 2023
Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization
IEEE Transactions on Multimedia (TOM), Volume 26Pages 5014–5025https://doi.org/10.1109/TMM.2023.3330089Deep neural networks (DNNs) have achieved state-of-the-art performance on face recognition (FR) tasks in the last decade. In real scenarios, the deployment of DNNs requires taking various face accessories into consideration, like glasses, hats, and masks. ...
- research-articleOctober 2023
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 722–734https://doi.org/10.1109/TIFS.2023.3326985Authentication and cryptography are critical security functions and, thus, are very often included as part of code. These functions require using credentials, such as passwords, security tokens, and cryptographic keys. However, developers often ...
- research-articleOctober 2023
Enabling Efficient Random Access to Hierarchically Compressed Text Data on Diverse GPU Platforms
- Yihua Hu,
- Feng Zhang,
- Yifei Xia,
- Zhiming Yao,
- Letian Zeng,
- Haipeng Ding,
- Zhewei Wei,
- Xiao Zhang,
- Jidong Zhai,
- Xiaoyong Du,
- Siqi Ma
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 34, Issue 10Pages 2699–2717https://doi.org/10.1109/TPDS.2023.3294341The tremendous computing capacity of GPU offers significant potential in processing hierarchically compressed text data without decompression. However, current GPU techniques offer only traversal-based text data analytics; random access is exceedingly ...
- research-articleSeptember 2023
A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 59–73https://doi.org/10.1109/TIFS.2023.3318936The graph neural networks (GNNs) are susceptible to adversarial perturbations and distribution biases, which pose potential security concerns for real-world applications. Current endeavors mainly focus on graph matching, while the subtle relationships ...
- research-articleSeptember 2023
A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services
IEEE Transactions on Computers (ITCO), Volume 73, Issue 1Pages 58–72https://doi.org/10.1109/TC.2023.3318403The rapid development of device-edge-cloud collaborative computing techniques has actively contributed to the popularization and application of intelligent service models. The intensity of knowledge transfer plays a vital role in enhancing the performance ...
- research-articleAugust 2023
Medusa attack: exploring security hazards of in-app QR code scanning
- Xing Han,
- Yuheng Zhang,
- Xue Zhang,
- Zeyuan Chen,
- Mingzhe Wang,
- Yiwei Zhang,
- Siqi Ma,
- Yu Yu,
- Elisa Bertino,
- Juanru Li
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumArticle No.: 258, Pages 4607–4624Smartphone users are eliminating traditional QR codes as many apps have integrated QR code scanning as a built-in functionality. With the support of embedded QR code scanning components, apps can read QR codes and immediately execute relevant activities, ...
- research-articleAugust 2023
LibScan: towards more precise third-party library identification for android applications
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumArticle No.: 190, Pages 3385–3402Android apps pervasively use third-party libraries (TPL) to reuse functionalities and improve development efficiency. The insufficient knowledge of the TPL internal exposes the developers and users to severe threats of security vulnerabilities. To ...
- research-articleAugust 2023
PASS2EDIT: a multi-step generative model for guessing edited passwords
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumArticle No.: 56, Pages 983–1000While password stuffing attacks (that exploit the direct password reuse behavior) have gained considerable attention, only a few studies have examined password tweaking attacks, where an attacker exploits users' indirect reuse behaviors (with edit ...
- research-articleJuly 2023
PEAK: Privacy-Enhanced Incentive Mechanism for Distributed -Anonymity in LBS<italic/>
IEEE Transactions on Knowledge and Data Engineering (IEEECS_TKDE), Volume 36, Issue 2Pages 781–794https://doi.org/10.1109/TKDE.2023.3295451To motivate users’ assistance for protecting others’ location privacy by distributed <italic>K</italic>-anonymity in Location-Based Service (LBS), many incentive mechanisms have been proposed, where users obtain monetary compensation for ...
- research-articleJuly 2023
<inline-formula><tex-math notation="LaTeX">$D^{2}MTS$</tex-math></inline-formula>: Enabling Dependable Data Collection With Multiple Crowdsourcers Trust Sharing in Mobile Crowdsensing
IEEE Transactions on Knowledge and Data Engineering (IEEECS_TKDE), Volume 36, Issue 3Pages 927–942https://doi.org/10.1109/TKDE.2023.3294503When enjoying mobile crowdsensing (MCS), it is vital to evaluate the trustworthiness of mobile users (MUs) without disclosing their sensitive information. However, the existing schemes ignore this requirement in the multiple crowdsourcers (CSs) scenario. ...