Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2024
A Software Integrity Authentication Protocol for Zero Trust Architecture
ZTA-NextGen '24: Proceedings of the SIGCOMM Workshop on Zero Trust Architecture for Next Generation CommunicationsAugust 2024, Pages 1–6https://doi.org/10.1145/3672200.3673874With the rapid expansion of network scale and the increasing complexity of network infrastructure, network boundaries have gradually blurred, traditional bound-based security models have gradually become ineffective to new application environment. In the ...
- research-articleJuly 2024
A privacy-preserving location data collection framework for intelligent systems in edge computing
AbstractWith the rise of smart city applications, the accessibility of users’ location data by smart devices has increased significantly. However, this poses a privacy concern as attackers can deduce personal information from the raw location data. In ...
- research-articleJuly 2024
Mutual Balancing in State-Object Components for Compositional Zero-Shot Learning
AbstractCompositional Zero-Shot Learning (CZSL) aims to recognize unseen compositions from seen states and objects. The disparity between the manually labeled semantic information and its actual visual features causes a significant imbalance of visual ...
Highlights- The method considers CZSL as an unbalanced multi-label classification, utilizing visual deviation of components to provide an inductive bias.
- Component imbalance info is used to re-weight CZSL training, enabling the model to ...
- short-paperJuly 2024
Cross-reconstructed Augmentation for Dual-target Cross-domain Recommendation
SIGIR '24: Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information RetrievalJuly 2024, Pages 2352–2356https://doi.org/10.1145/3626772.3657902To alleviate the long-standing data sparsity issue in recommender systems, numerous studies in cross-domain recommendation (CDR) have been conducted to facilitate information transfer processes across domains. In recent years, dual-target CDR has been ...
- research-articleJuly 2024
Segmentation assisted Prostate Cancer Grading with Multitask Collaborative Learning
Pattern Recognition Letters (PTRL), Volume 183, Issue CJul 2024, Pages 42–48https://doi.org/10.1016/j.patrec.2024.04.023AbstractMedical image segmentation can provide doctors with more direct information on the location and size of organs or lesions, which can serve as an valuable auxiliary task for prostate cancer grading. Meanwhile, other types of diagnostic data ...
Highlights- A shared feature hybrid gating experts framework is proposed for segmentation assisted prostate cancer grading.
- A crosstask attention module is designed to provide effective complementary information between tasks.
- A heterogeneous ...
-
- research-articleJuly 2024
Flash controller-based secure execution environment for protecting code confidentiality
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 152, Issue CJul 2024https://doi.org/10.1016/j.sysarc.2024.103172AbstractWith the rapid evolution of Internet-of-Things (IoT), billions of IoT devices have connected to the Internet, collecting information via tags and sensors. For an IoT device, the application code itself and data collected by sensors can be of ...
- research-articleJuly 2024
Dataflow optimization with layer-wise design variables estimation method for enflame CNN accelerators
Journal of Parallel and Distributed Computing (JPDC), Volume 189, Issue CJul 2024https://doi.org/10.1016/j.jpdc.2024.104869AbstractAs convolution layers have been proved to be the most time-consuming operation in convolutional neural network (CNN) algorithms, many efficient CNN accelerators have been designed to boost the performance of convolution operations. Previous works ...
Highlights- A dataflow optimization method for efficient design space explorations is proposed.
- It narrows the design space and enumerates solutions to select the optimal variables.
- The optimization is validated on accelerator for computing ...
- research-articleJune 2024JUST ACCEPTED
Privacy-Enhanced Prototype-based Federated Cross-modal Hashing for Cross-modal Retrieval
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Just Accepted https://doi.org/10.1145/3674507Cross-modal hashing is widely used for efficient similarity searches, improving data processing efficiency, and reducing storage costs. Existing cross-modal hashing methods primarily focus on centralized training scenarios, where fixed-scale and fixed-...
- research-articleJune 2024
MIMOSA: Human-AI Co-Creation of Computational Spatial Audio Effects on Videos
C&C '24: Proceedings of the 16th Conference on Creativity & CognitionJune 2024, Pages 156–169https://doi.org/10.1145/3635636.3656189Spatial audio offers more immersive video consumption experiences to viewers; however, creating and editing spatial audio often expensive and requires specialized hardware equipment and skills, posing a high barrier for amateur video creators. We ...
- research-articleJuly 2024
Unsupervised cross domain semantic segmentation with mutual refinement and information distillation
AbstractUnsupervised cross domain semantic segmentation recently has gained much attention, due to its powerful ability of solving the segmentation problem on unlabeled domains. Traditional methods often employ an adversarial network to confuse the ...
Highlights- A Mutual Refinement module is proposed to interact information for cross domain semantic segmentation.
- An Information Distillation module is employed to simplify the inference network with performance maintenance.
- Curriculum ...
- research-articleJuly 2024
Defending against membership inference attacks: RM Learning is all you need
Information Sciences: an International Journal (ISCI), Volume 670, Issue CJun 2024https://doi.org/10.1016/j.ins.2024.120636AbstractLarge-capacity machine learning models are vulnerable to membership inference attacks that disclose the privacy of the training dataset. The privacy concerns posed by membership inference attacks have inspired many defense strategies. ...
- research-articleJuly 2024
Strategic team design for sustainable effectiveness: A data-driven analytical perspective and its implications
Decision Support Systems (DSSY), Volume 181, Issue CJun 2024https://doi.org/10.1016/j.dss.2024.114227AbstractTeams are building blocks of organizations and essential inputs of organizational success. This article studies a data-driven analytical approach that exploits the rich data accumulated in organizations in the digital era to design teams, ...
- short-paperJuly 2024
OSPC: Detecting Harmful Memes with Large Language Model as a Catalyst
WWW '24: Companion Proceedings of the ACM on Web Conference 2024May 2024, Pages 1892–1895https://doi.org/10.1145/3589335.3665995Memes, typically comprising an image with corresponding text, spread personal opinions and positions rapidly across the internet. However, this same characteristic makes them a powerful tool for disseminating social bias and prejudice. Such harmful memes ...
- research-articleMay 2024
Collaborative Metapath Enhanced Corporate Default Risk Assessment on Heterogeneous Graph
WWW '24: Proceedings of the ACM on Web Conference 2024May 2024, Pages 446–456https://doi.org/10.1145/3589334.3645402Default risk assessment for small companies is a tough problem in financial services. Recent efforts utilize advanced Heterogeneous Graph Neural Networks (HGNNs) with metapaths to exploit interactive features in corporate activities for risk analysis. ...
- research-articleMay 2024
Enhancing Fairness in Meta-learned User Modeling via Adaptive Sampling
WWW '24: Proceedings of the ACM on Web Conference 2024May 2024, Pages 3241–3252https://doi.org/10.1145/3589334.3645369Meta-learning has been widely employed to tackle the cold-start problem in user modeling. Similar to a guidebook for a new traveler, meta-learning significantly affects decision-making for new users in crucial scenarios, such as career recommendations. ...
CollabCoder: A Lower-barrier, Rigorous Workflow for Inductive Collaborative Qualitative Analysis with Large Language Models
CHI '24: Proceedings of the CHI Conference on Human Factors in Computing SystemsMay 2024, Article No.: 11, Pages 1–29https://doi.org/10.1145/3613904.3642002Collaborative Qualitative Analysis (CQA) can enhance qualitative analysis rigor and depth by incorporating varied viewpoints. Nevertheless, ensuring a rigorous CQA procedure itself can be both complex and costly. To lower this bar, we take a theoretical ...
- research-articleJuly 2024
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 245, Issue CMay 2024https://doi.org/10.1016/j.comnet.2024.110376AbstractIn recent years, the growing frequency and intensity of Advanced Persistent Threats (APTs) have significantly undermined the legitimacy and financial stability of government agencies, enterprises, and other entities. Moreover, these attacks have ...
- research-articleJune 2024
Multi-label contrastive hashing
AbstractJoint learning of image representation and hash encoding represents a dominant solution to approximate nearest neighbor search for large-scale image retrieval. Despite significant advances in deep learning to hash in multi-label setting, ...
Highlights- Multi-level similarity is modeled in supervised contrastive learning to hash.
- We design a curriculum strategy to adaptively adjust the weight of quantization loss.
- Our approach outperforms several state-of-the-art solutions on ...
- research-articleApril 2024
Invisible Black-Box Backdoor Attack against Deep Cross-Modal Hashing Retrieval
ACM Transactions on Information Systems (TOIS), Volume 42, Issue 4Article No.: 111, Pages 1–27https://doi.org/10.1145/3650205Deep cross-modal hashing has promoted the field of multi-modal retrieval due to its excellent efficiency and storage, but its vulnerability to backdoor attacks is rarely studied. Notably, current deep cross-modal hashing methods inevitably require large-...
- research-articleJuly 2024
An Investigation of Patch Porting Practices of the Linux Kernel Ecosystem
MSR '24: Proceedings of the 21st International Conference on Mining Software RepositoriesApril 2024, Pages 63–74https://doi.org/10.1145/3643991.3644902Open-source software is increasingly reused, complicating the process of patching to repair bugs. In the case of Linux, a distinct ecosystem has formed, with Linux mainline serving as the upstream, stable or long-term-support (LTS) systems forked from ...