Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Image-Enhanced Multi-Modal Representation for Local Topic Detection from Social Media

    Detecting local topics from social media is an important task for many applications, ranging from event tracking to emergency warning. Recent years have witnessed growing interest in leveraging multi-modal soc...

    Junsha Chen, Neng Gao, Yifei Zhang in Database Systems for Advanced Applications (2021)

  2. No Access

    Chapter and Conference Paper

    PLVCG: A Pretraining Based Model for Live Video Comment Generation

    Live video comment generating task aims to automatically generate real-time viewer comments on videos like real viewers do. Like providing search suggestions by search engines, this task can help viewers find ...

    Zehua Zeng, Neng Gao, Cong Xue, Chenyang Tu in Advances in Knowledge Discovery and Data M… (2021)

  3. No Access

    Chapter and Conference Paper

    Leveraging Knowledge Context Information to Enhance Personalized Recommendation

    Knowledge graphs (KGs) have proven to be effective to improve the performance of recommendation. However, with the tremendous increase of users and items, existing methods still face several challenging proble...

    Jiong Wang, Yingshuai Kou, Yifei Zhang, Neng Gao in Neural Information Processing (2020)

  4. No Access

    Chapter and Conference Paper

    SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks

    In recent years, cache attacks against micro architectures have posed a daunting threat to modern processors such as x86 and ARM. Of the attacks, flush-based cache attacks have attracted increasing attention f...

    Churan Tang, Zongbin Liu, Cunqing Ma in Information and Communications Security (2020)

  5. Chapter and Conference Paper

    Multiple Demographic Attributes Prediction in Mobile and Sensor Devices

    Users’ real demographic attributes is impressively useful for intelligent marketing, automatic advertising and human-computer interaction. Traditional method on attribute prediction make great effort on the st...

    Yiwen Jiang, Wei Tang, Neng Gao, Ji **ang in Advances in Knowledge Discovery and Data M… (2020)

  6. No Access

    Chapter and Conference Paper

    PrivRec: User-Centric Differentially Private Collaborative Filtering Using LSH and KD

    The collaborative filtering (CF)-based recommender systems provide recommendations by collecting users’ historical ratings and predicting their preferences on new items. However, this inevitably brings privacy...

    Yifei Zhang, Neng Gao, Junsha Chen, Chenyang Tu in Neural Information Processing (2020)

  7. No Access

    Chapter and Conference Paper

    Local Topic Detection Using Word Embedding from Spatio-Temporal Social Media

    Local topic detection from spatio-temporal social media (e.g. Twitter) plays an important role in many applications, therefore, it has attracted a surge of research attention in recent years. However, most exi...

    Junsha Chen, Neng Gao, Yifei Zhang, Chenyang Tu in Neural Information Processing (2019)

  8. No Access

    Chapter and Conference Paper

    Knowledge Graph Embedding with Order Information of Triplets

    Knowledge graphs (KGs) are large scale multi-relational directed graph, which comprise a large amount of triplets. Embedding knowledge graphs into continuous vector space is an essential problem in knowledge e...

    Jun Yuan, Neng Gao, Ji **ang, Chenyang Tu in Advances in Knowledge Discovery and Data M… (2019)

  9. No Access

    Chapter and Conference Paper

    Perceiving Topic Bubbles: Local Topic Detection in Spatio-Temporal Tweet Stream

    Local topic detection is an important task for many applications such as local event discovery, activity recommendation and emergency warning. Recent years have witnessed growing interest in leveraging spatio-...

    Junsha Chen, Neng Gao, Cong Xue, Chenyang Tu in Database Systems for Advanced Applications (2019)

  10. No Access

    Chapter and Conference Paper

    Study on the Influence of Impermeable Membrane’s Blanket Length on the Seepage of a Dam

    Geotechnical membrane is often used in dam engineering to prevent the seepage. But the research of the influence of impervious membrane on the seepage of a dam is not enough. Combining the indoor model experim...

    Lu Yu, Zhenying Zhang, Chenyang Tu in Proceedings of GeoShanghai 2018 Internatio… (2018)

  11. Chapter and Conference Paper

    Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC

    With the rapid development of IoT devices in the direction of multifunction and personalization, All Programmable SoC has been used more and more frequently because of its unrivaled levels of system performanc...

    **gquan Ge, Neng Gao, Chenyang Tu, Ji **ang, Zeyi Liu, Jun Yuan in Computer Security (2018)

  12. Chapter and Conference Paper

    A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers

    The key whitening is a technique intended to enhance the strength of a block cipher. Although some research work involves DPA attacks against the key whitening layer in the compact architecture, there are no l...

    Chenyang Tu, Lingchen Zhang, Zeyi Liu in Applied Cryptography and Network Security (2017)

  13. Chapter and Conference Paper

    Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme—Presenting Four Non-profiled Attacks

    Improved Rotating S-box Masking (RSM2.0 for short) is a well-known countermeasure designed and implemented by DPA Contest V4.2 committee to provide security protection for AES-128. By combining both 1st-order ...

    Zeyi Liu, Neng Gao, Chenyang Tu, Yuan Ma in Selected Areas in Cryptography – SAC 2016 (2017)

  14. Chapter and Conference Paper

    Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields

    In resource-constrained applications, elliptic curve cryptography (ECC) is preferable for the property of shorter key size with comparable security. Binary extension fields are usually used for area-optimized ...

    Yuan Ma, Qinglong Zhang, Zongbin Liu in Information and Communications Security (2016)

  15. Chapter and Conference Paper

    QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations

    Dual-Rail Precharge Logic (DPL) has proven to be an effective countermeasure logic style against Differential Power Analysis (DPA). All previous DPL architectures employ the precharge mechanism to achieve DPA ...

    Chenyang Tu, Jian Zhou, Neng Gao, Zeyi Liu in Information and Communications Security (2016)

  16. No Access

    Chapter and Conference Paper

    A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm

    Side Channel Analysis (SCA), which has gained wide attentions during the past decade, has arisen as one of the most critical metrics for the cryptographic algorithm security evaluation. Typical SCA analyzes th...

    Chenyang Tu, Wei He, Neng Gao in Information Security Practice and Experien… (2014)