Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
An Example of Parallel Merkle Tree Traversal: Post-Quantum Leighton-Micali Signature on the GPU
ACM Transactions on Architecture and Code Optimization (TACO), Volume 21, Issue 3Article No.: 44, Pages 1–25https://doi.org/10.1145/3659209The hash-based signature (HBS) is the most conservative and time-consuming among many post-quantum cryptography (PQC) algorithms. Two HBSs, LMS and XMSS, are the only PQC algorithms standardised by the National Institute of Standards and Technology (NIST) ...
- research-articleAugust 2024
Personalized Federated Continual Learning via Multi-Granularity Prompt
KDD '24: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 4023–4034https://doi.org/10.1145/3637528.3671948Personalized Federated Continual Learning (PFCL) is a new practical scenario that poses greater challenges in sharing and personalizing knowledge. PFCL not only relies on knowledge fusion for server aggregation at the global spatial-temporal perspective ...
- research-articleAugust 2024
A novel multi-view contrastive learning for herb recommendation
Applied Intelligence (KLU-APIN), Volume 54, Issue 22Pages 11412–11429https://doi.org/10.1007/s10489-024-05546-3AbstractHerb recommendation plays a crucial role in Traditional Chinese Medicine (TCM) by prescribing therapeutic herbs given symptoms. Current herb recommendation methods make promising progress by utilizing graph neural network, but most fail to capture ...
- research-articleJuly 2024
HICL: Hierarchical Intent Contrastive Learning for sequential recommendation
Expert Systems with Applications: An International Journal (EXWA), Volume 251, Issue Chttps://doi.org/10.1016/j.eswa.2024.123886AbstractUsers’ diverse intentions drive the subsequent interaction based on users’ dynamic behavior trajectories. Despite the impressive progress of existing work on capturing the user’s intent, these methods still have the following challenges: (1) How ...
Highlights- We propose a model HICL fuses sequence contrastive learning (CL) and graph CL.
- The HICL can capture the dynamic and sparse intention in sequential recommendation.
- Experimental results demonstrate the effectiveness of mining users’ ...
- research-articleMay 2024
A Meta-Learning Framework for Tuning Parameters of Protection Mechanisms in Trustworthy Federated Learning
ACM Transactions on Intelligent Systems and Technology (TIST), Volume 15, Issue 3Article No.: 55, Pages 1–36https://doi.org/10.1145/3652612Trustworthy federated learning typically leverages protection mechanisms to guarantee privacy. However, protection mechanisms inevitably introduce utility loss or efficiency reduction while protecting data privacy. Therefore, protection mechanisms and ...
-
- ArticleMay 2024
SecureBoost: Large Scale and High-Performance Vertical Federated Gradient Boosting Decision Tree
Advances in Knowledge Discovery and Data MiningPages 237–249https://doi.org/10.1007/978-981-97-2259-4_18AbstractGradient boosting decision tree (GBDT) is an ensemble machine learning algorithm that is widely used in industry. Due to the problem of data isolation and the requirement of privacy, many works try to use vertical federated learning to train ...
- research-articleJanuary 2024
Vertical Federated Learning: Concepts, Advances, and Challenges
IEEE Transactions on Knowledge and Data Engineering (IEEECS_TKDE), Volume 36, Issue 7Pages 3615–3634https://doi.org/10.1109/TKDE.2024.3352628Vertical Federated Learning (VFL) is a federated learning setting where multiple parties with different features about the same set of users jointly train machine learning models without exposing their raw data or model parameters. Motivated by the rapid ...
- research-articleJanuary 2024
Impact of Write-Allocate Elimination on Fujitsu A64FX
HPCAsia '24 Workshops: Proceedings of the International Conference on High Performance Computing in Asia-Pacific Region WorkshopsPages 24–35https://doi.org/10.1145/3636480.3637283ARM-based CPU architectures are currently driving massive disruptions in the High Performance Computing (HPC) community. Deployment of the 48-core Fujitsu A64FX ARM architecture based processor in RIKEN “Fugaku” supercomputer (#2 in the June 2023 Top500 ...
- research-articleMarch 2024
A research on inversion of water quality parameters in the mulan river based on GF-1B\C\D remote sensing images
Journal of Computational Methods in Sciences and Engineering (JOCMSE), Volume 24, Issue 1Pages 567–576https://doi.org/10.3233/JCM226970Remote sensing inversion technology can be used for water quality parameter inversion to realize water quality monitoring in large scale space. The current research on water quality parameter inversion is only for a single satellite. In order to make ...
- research-articleDecember 2023
A hybrid style transfer with whale optimization algorithm model for textual adversarial attack
Neural Computing and Applications (NCAA), Volume 36, Issue 8Pages 4263–4280https://doi.org/10.1007/s00521-023-09278-2AbstractDeep learning has been widely used in various research fields. However, researchers have discovered that deep learning models are vulnerable to adversarial attacks. Existing word-level attacks can be seen as a combinatorial optimization problem to ...
- research-articleFebruary 2024
BBLN: A bilateral-branch learning network for unknown protein–protein interaction prediction
Computers in Biology and Medicine (CBIM), Volume 167, Issue Chttps://doi.org/10.1016/j.compbiomed.2023.107588AbstractUnknown Protein–Protein Interactions (PPIs) prediction has a huge demand in the biological analysis field. Since the effect of the limited availability of protein data is severe, transferable representations are highly demanded to be learned from ...
Highlights- Multi-modal protein information integration for multi-label PPIs prediction.
- A novel multi- and cross-modal mechanism to explore the different modalities.
- The application of multi-modal learning provides new ideas for predicting ...
- research-articleNovember 2023
A Fast Hybrid Feature Selection Method Based on Dynamic Clustering and Improved Particle Swarm Optimization for High-Dimensional Health Care Data
IEEE Transactions on Consumer Electronics (ITOCE), Volume 70, Issue 1Pages 2447–2459https://doi.org/10.1109/TCE.2023.3334373The ubiquity and commoditization of wearable sensors have generated a deluge of user-generated health care data and played a key role in clinical utility, particularly when incorporated into personalized prediction models. The “curse of ...
- research-articleNovember 2023
PANIC: PAN-assisted Intra-process Memory Isolation on ARM
- Jiali Xu,
- Mengyao Xie,
- Chenggang Wu,
- Yinqian Zhang,
- Qijing Li,
- Xuan Huang,
- Yuanming Lai,
- Yan Kang,
- Wei Wang,
- Qiang Wei,
- Zhe Wang
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 919–933https://doi.org/10.1145/3576915.3623206Intra-process memory isolation is a well-known technique to enforce least privilege within a process. In this paper, we propose a generic and efficient intra-process memory isolation technique named PANIC, by leveraging Privileged Access Never (PAN) and ...
- research-articleNovember 2023
Trading Off Privacy, Utility, and Efficiency in Federated Learning
ACM Transactions on Intelligent Systems and Technology (TIST), Volume 14, Issue 6Article No.: 98, Pages 1–32https://doi.org/10.1145/3595185Federated learning (FL) enables participating parties to collaboratively build a global model with boosted utility without disclosing private data information. Appropriate protection mechanisms have to be adopted to fulfill the opposing requirements in ...
- research-articleSeptember 2023
A Deep Graph Network with Multiple Similarity for User Clustering in Human–Computer Interaction
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 20, Issue 2Article No.: 46, Pages 1–20https://doi.org/10.1145/3549954User counterparts, such as user attributes in social networks or user interests, are the keys to more natural Human–Computer Interaction (HCI). In addition, users’ attributes and social structures help us understand the complex interactions in HCI. Most ...
- review-articleSeptember 2023
MOPISDE: A collaborative multi-objective information-sharing DE algorithm for software clustering
Expert Systems with Applications: An International Journal (EXWA), Volume 226, Issue Chttps://doi.org/10.1016/j.eswa.2023.120207AbstractThe software module clustering problem (SMCP) aims to improve the internal quality of software while helping software engineers understand the system architecture and facilitating software system maintenance. However, most current methods ignore ...
Highlights- We propose two key concepts in the software module clustering problem (SMCP).
- We design a collaborative multi-objective information-sharing DE algorithm based on the new concepts for SMCP.
- The experiment results of our method are ...
- research-articleAugust 2023
FedPass: privacy-preserving vertical federated deep learning with adaptive obfuscation
IJCAI '23: Proceedings of the Thirty-Second International Joint Conference on Artificial IntelligenceArticle No.: 418, Pages 3759–3767https://doi.org/10.24963/ijcai.2023/418Vertical federated learning (VFL) allows an active party with labeled feature to leverage auxiliary features from the passive parties to improve model performance. Concerns about the private feature and label leakage in both the training and inference ...
- research-articleJune 2023
EdgePC: Efficient Deep Learning Analytics for Point Clouds on Edge Devices
ISCA '23: Proceedings of the 50th Annual International Symposium on Computer ArchitectureArticle No.: 78, Pages 1–14https://doi.org/10.1145/3579371.3589113Recently, point cloud (PC) has gained popularity in modeling various 3D objects (including both synthetic and real-life) and has been extensively utilized in a wide range of applications such as AR/VR, 3D reconstruction, and autonomous driving. For ...
- research-articleJune 2023
SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks
- Bowen Tang,
- Chenggang Wu,
- Pen-Chung Yew,
- Yinqian Zhang,
- Mengyao Xie,
- Yuanming Lai,
- Yan Kang,
- Wei Wang,
- Qiang Wei,
- Zhe Wang
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 42, Issue 12Pages 4477–4490https://doi.org/10.1109/TCAD.2023.3284290Transient execution attacks (TEAs) have gradually become a major security threat to modern high-performance processors. They exploit the vulnerability of speculative execution to illegally access private data, and transmit them through timing-based covert ...