Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
PlacidDreamer: Advancing Harmony in Text-to-3D Generation
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 6880–6889https://doi.org/10.1145/3664647.3681276Recently, text-to-3D generation has attracted significant attention, resulting in notable performance enhancements. Previous methods utilize end-to-end 3D generation models to initialize 3D Gaussians, multi-view diffusion models to enforce multi-view ...
- research-articleOctober 2024
Focus, Distinguish, and Prompt: Unleashing CLIP for Efficient and Flexible Scene Text Retrieval
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 2525–2534https://doi.org/10.1145/3664647.3680877Scene text retrieval aims to find all images containing the query text from an image gallery. Current efforts tend to adopt an Optical Character Recognition (OCR) pipeline, which requires complicated text detection and/or recognition processes, resulting ...
- research-articleOctober 2024
Style-conditional Prompt Token Learning for Generalizable Face Anti-spoofing
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 994–1003https://doi.org/10.1145/3664647.3680857Face anti-spoofing (FAS) based on domain generalization (DG) has attracted increasing attention from researchers. The reason for the poor generalization is that the model is overfitted to salient liveness-irrelevant signals. However, the previous methods ...
- research-articleOctober 2024
Fine-Grained Prompt Learning for Face Anti-Spoofing
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 7619–7628https://doi.org/10.1145/3664647.3680855There has been an increasing focus on domain-generalized (DG) face anti-spoofing (FAS). However, existing methods aim to project a shared visual space through adversarial training, making exploring the space without losing semantic information ...
- research-articleOctober 2024
Applying Fuzz Driver Generation to Native C/C++ Libraries of OEM Android Framework: Obstacles and Solutions
- Shiyan Peng,
- Yuan Zhang,
- Jiarun Dai,
- Yue Gu,
- Zhuoxiang Shen,
- Jingcheng Liu,
- Lin Wang,
- Yong Chen,
- Yu Qin,
- Lei Ai,
- Xianfeng Lu,
- Min Yang
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 2035–2040https://doi.org/10.1145/3691620.3695266Fuzz driver generation (FDG) is a fundamental technique for fuzzing library software. Existing FDG approaches have been highly successful with open-source libraries. However, in practice, due to the complex nature of OEM Android frameworks (e.g., ...
-
- ArticleOctober 2024
DSCENet: Dynamic Screening and Clinical-Enhanced Multimodal Fusion for MPNs Subtype Classification
Medical Image Computing and Computer Assisted Intervention – MICCAI 2024Pages 69–79https://doi.org/10.1007/978-3-031-72083-3_7AbstractThe precise subtype classification of myeloproliferative neoplasms (MPNs) based on multimodal information, which assists clinicians in diagnosis and long-term treatment plans, is of great clinical significance. However, it remains a great ...
- ArticleSeptember 2024
VioHawk: Detecting Traffic Violations of Autonomous Driving Systems through Criticality-Guided Simulation Testing
ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 844–855https://doi.org/10.1145/3650212.3680325As highlighted in authoritative standards (e.g., ISO21448), traffic law compliance is a fundamental prerequisite for the commercialization of autonomous driving systems (ADS). Hence, manufacturers are in severe need of techniques to detect harsh driving ...
- research-articleSeptember 2024
On the reachability and controllability of temporal continuous-time linear networks: A generic analysis
Automatica (Journal of IFAC) (AJIF), Volume 167, Issue Chttps://doi.org/10.1016/j.automatica.2024.111741AbstractTemporal networks are a class of time-varying networks whose topology evolves through a time-ordered sequence of static networks (known as subsystems), which find wide-ranging applications in modeling complex systems such as social networks, ...
- research-articleJuly 2024Distinguished Paper
Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile Applications
Proceedings of the ACM on Software Engineering (PACMSE), Volume 1, Issue FSEArticle No.: 4, Pages 70–91https://doi.org/10.1145/3643730Nowadays, mobile apps have greatly facilitated our daily work and lives. They are often designed to work closely and interact with each other through app components for data and functionality sharing. The security of app components has been extensively ...
- research-articleJuly 2024
How Well Industry-Level Cause Bisection Works in Real-World: A Study on Linux Kernel
FSE 2024: Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software EngineeringPages 62–73https://doi.org/10.1145/3663529.3663828Bug fixing is a laborious task. In bug-fixing, debugging needs much manual effort. Various automatic analyses have been proposed to address the challenges of debugging like locating bug-inducing changes. One of the representative approaches to ...
- ArticleJune 2024
Voice Revolution on Wheels: Porsche’s Pioneering Journey into Next-Gen In-Car Interactions
- Haoran Wen,
- Zixuan Qiao,
- Bin Zhang,
- Ruilu Yu,
- Xiaoxuan Ge,
- Yuan Zhang,
- Yu Zhao,
- Xianbo Wang,
- Yujie Ma,
- Mengmeng Xu,
- Yang Guo,
- Jingpeng Jia
AbstractIn the context of the smart era, in-car human-machine interaction (HMI) faces new opportunities and challenges. Voice interaction, as a crucial mode of HMI, presents fresh possibilities for a superior user experience (UX) in in-car interactions. ...
- ArticleJune 2024
Competency Evaluation of Chinese Pilots Based on Human Factors Analysis Model
Engineering Psychology and Cognitive ErgonomicsPages 79–88https://doi.org/10.1007/978-3-031-60728-8_7AbstractPilot competencies are used to effectively predict and evaluate the level of pilot performance, which can be manifested and observed through the use of relevant knowledge, skills and attitudes to perform activities or tasks under specific ...
- research-articleNovember 2024
DH-TRNG: A Dynamic Hybrid TRNG with Ultra-High Throughput and Area-Energy Efficiency
DAC '24: Proceedings of the 61st ACM/IEEE Design Automation ConferenceArticle No.: 95, Pages 1–6https://doi.org/10.1145/3649329.3656236As a vital security primitive, the true random number generator (TRNG) is a mandatory component to build roots of trust for any encryption system. However, existing TRNGs suffer from bottlenecks of low throughput and high area-energy consumption. In this ...
- research-articleJuly 2024
A semantic SLAM-based method for navigation and landing of UAVs in indoor environments
AbstractAutonomous navigation and landing of Unmanned aerial vehicles (UAVs) are critical functions towards full intelligence in unknown environments. However, current methods heavily rely on positioning devices or geometric maps, leading to two ...
Highlights- A novel framework is proposed to realize the landing of UAVs in unknown indoor environments.
- A data association rule is designed to fuse semantic features into the topology structure.
- A terrain estimation strategy is performed only ...
- research-articleAugust 2024
Distance-based feature repack algorithm for video coding for machines
Journal of Visual Communication and Image Representation (JVCIR), Volume 102, Issue Chttps://doi.org/10.1016/j.jvcir.2024.104150AbstractNowadays, the use of video data for machine (VCM) tasks has become increasingly prevalent, with deep learning and computer vision requiring large volumes of video data for object detection, object tracking, and other tasks. However, the features ...
Graphical abstractDisplay Omitted
Highlights- Video data accounts for most internet traffic, video consumed by machines outnumbers video consumed by human.
- Feature compression is an effective solution for coding for Machines with advantages of high compression ratio, computational ...
- research-articleMay 2024
Set-based visualization and enhancement of embedding results for heterogeneous multi-label networks
Journal of Visualization (JVIS), Volume 27, Issue 5Pages 841–866https://doi.org/10.1007/s12650-024-00996-wAbstractHeterogeneous networks are ubiquitous in the real-world, such as social networks and brain cell networks. Network embedding techniques have emerged as powerful tools for generating low-dimensional representations of nodes in information networks, ...
- research-articleMay 2024
RecurScan: Detecting Recurring Vulnerabilities in PHP Web Applications
WWW '24: Proceedings of the ACM Web Conference 2024Pages 1746–1755https://doi.org/10.1145/3589334.3645530Detecting recurring vulnerabilities has become a popular means of static vulnerability detection in recent years because they do not require labor-intensive vulnerability modeling. Recently, a body of work, with HiddenCPG as a representative, has ...
- research-articleMay 2024
Intersectional Two-sided Fairness in Recommendation
WWW '24: Proceedings of the ACM Web Conference 2024Pages 3609–3620https://doi.org/10.1145/3589334.3645518Fairness of recommender systems (RS) has attracted increasing attention recently. Based on the involved stakeholders, the fairness of RS can be divided into user fairness, item fairness, and two-sided fairness which considers both user and item fairness ...
- research-articleMay 2024
Interface Illusions: Uncovering the Rise of Visual Scams in Cryptocurrency Wallets
WWW '24: Proceedings of the ACM Web Conference 2024Pages 1585–1595https://doi.org/10.1145/3589334.3645348Cryptocurrencies, while revolutionary, have become a magnet for malicious actors. With numerous reports underscoring cyberattacks and scams in this domain, our paper takes the lead in characterizing visual scams associated with cryptocurrency wallets---a ...