Skip to main content

previous disabled Page of 4
and
  1. No Access

    Article

    Multi-period early-warning precipitation identification method for the easily waterlogged districts in Jiangxi province, China

    Urban easily waterlogged districts need more systematic monitoring as the key disaster-forming and managing spatial scale, hard to identify the early-warning precipitation (EP). We proposed new algorithms to extr...

    Hua Bai, Bingxiang Wang, Bin Li, Zhangjun Liu in Theoretical and Applied Climatology (2024)

  2. No Access

    Chapter and Conference Paper

    A Three-Stage Framework for Event-Event Relation Extraction with Large Language Model

    Expanding the parameter count of a large language model (LLM) alone is insufficient to achieve satisfactory outcomes in natural language processing tasks, specifically event extraction (EE), event temporal rel...

    Feng Huang, Qiang Huang, YueTong Zhao, Zhi**ao Qi in Neural Information Processing (2024)

  3. No Access

    Chapter and Conference Paper

    PNPT: Prototypical Network with Prompt Template for Few-Shot Relation Extraction

    Few-shot relation extraction involves predicting the relations between entity pairs in a sentence with a limited number of labeled instances for each specific relation. Prototypical network, which is based on ...

    Li** Li, Yexuan Zhang, Jiajun Zou, Yongfeng Huang in Social Media Processing (2024)

  4. No Access

    Chapter and Conference Paper

    Minimizing Distortion in Steganography via Adaptive Language Model Tuning

    Linguistic steganography, a technique that hides secret information within normal text, possesses tremendous potential in various applications such as protecting user privacy. However, previous research in lin...

    Cheng Chen, **shuai Yang, Yue Gao, Huili Wang in Neural Information Processing (2024)

  5. No Access

    Chapter and Conference Paper

    CATS: Connection-Aware and Interaction-Based Text Steganalysis in Social Networks

    The generative linguistic steganography in social networks have potential huge abuse and regulatory risks, with serious implications for information security, especially in the era of large language models. Ma...

    Kaiyi Pang, **shuai Yang, Yue Gao, Minhao Bai in Neural Information Processing (2024)

  6. No Access

    Chapter and Conference Paper

    Hi-Stega: A Hierarchical Linguistic Steganography Framework Combining Retrieval and Generation

    Due to the widespread use of social media, linguistic steganography which embeds secret message into normal text to protect the security and privacy of secret message, has been widely studied and applied. Howe...

    Huili Wang, Zhongliang Yang, **shuai Yang, Yue Gao in Neural Information Processing (2024)

  7. No Access

    Article

    Frame-level steganalysis of QIM steganography in compressed speech based on multi-dimensional perspective of codeword correlations

    In this paper, a frame-level steganalysis of Quantization Index Modulation (QIM) steganography in compressed speech streams is proposed for the first time. The proposed method builds a neural network classific...

    Miao Wei, Songbin Li, Peng Liu in Journal of Ambient Intelligence and Humani… (2023)

  8. Article

    Open Access

    Differentially private knowledge transfer for federated learning

    Extracting useful knowledge from big data is important for machine learning. When data is privacy-sensitive and cannot be directly collected, federated learning is a promising option that extracts knowledge fr...

    Tao Qi, Fangzhao Wu, Chuhan Wu, Liang He, Yongfeng Huang, **ng **e in Nature Communications (2023)

  9. Article

    Open Access

    Removing AI’s sentiment manipulation of personalized news delivery

    Artificial intelligence (AI) is empowering personalized online news delivery to accommodate people’s information needs and combat information overload. However, AI models learned from user data are inheriting ...

    Chuhan Wu, Fangzhao Wu, Tao Qi in Humanities and Social Sciences Communicati… (2022)

  10. Article

    Research on covert communication channel based on modulation of common compressed speech codec

    As is well known, multimedia has been widely used in VoIP and mobile communications. Research on how to establish covert communication channel over the above popular public applications has been flourishing in...

    Fufang Li, Binbin Li, Yongfeng Huang, Yuanyong Feng in Neural Computing and Applications (2022)

  11. Article

    Open Access

    A federated graph neural network framework for privacy-preserving personalization

    Graph neural network (GNN) is effective in modeling high-order interactions and has been widely used in various personalized applications such as recommendation. However, mainstream personalization methods rel...

    Chuhan Wu, Fangzhao Wu, Lingjuan Lyu, Tao Qi, Yongfeng Huang in Nature Communications (2022)

  12. Article

    Open Access

    Communication-efficient federated learning via knowledge distillation

    Federated learning is a privacy-preserving machine learning technique to train intelligent models from decentralized data, which enables exploiting private data by communicating local model updates in each ite...

    Chuhan Wu, Fangzhao Wu, Lingjuan Lyu, Yongfeng Huang, **ng **e in Nature Communications (2022)

  13. No Access

    Chapter and Conference Paper

    Association Extraction and Recognition of Multiple Emotion Expressed in Social Texts

    Detecting the sentiment people present in social media such as tweets is important for politics, commerce, education and so on. The task of multiple emotion recognition in texts is to predict a set of emotion ...

    Jiajun Zou, Sixing Wu, Zhongliang Yang, Chong Chen in Artificial Intelligence and Security (2022)

  14. No Access

    Chapter and Conference Paper

    Aspect-Level Sentiment Classification Based on Graph Attention Network with BERT

    With accelerated evolution of the internet, people can express their sentiments towards organizations, politics, products, events, etc. Analyzing these sentiments becomes very beneficial for businesses, govern...

    Jiajun Zou, Sixing Wu, Zhongliang Yang in Advances in Artificial Intelligence and Se… (2022)

  15. Article

    Open Access

    A Multi-grained Log Auditing Scheme for Cloud Data Confidentiality

    With increasing number of cloud data leakage accidents exposed, outsourced data control becomes a more and more serious concern of their owner. To relieve the concern of these cloud users, reliable logging sch...

    Zhen Yang, Wenyu Wang, Yongfeng Huang, **ng Li in Mobile Networks and Applications (2021)

  16. No Access

    Chapter and Conference Paper

    Improving Text-Image Matching with Adversarial Learning and Circle Loss for Multi-modal Steganography

    This paper proposes a multi-modal steganography method based on an improved text-image matching algorithm. At present, most of the steganography methods are based on single modality of carriers and embed confi...

    Yuting Hu, Han Cao, Zhongliang Yang, Yongfeng Huang in Digital Forensics and Watermarking (2021)

  17. No Access

    Chapter and Conference Paper

    Research on Information Hiding Based on Intelligent Creation of Tang Poem

    Text is the most important and frequent way for people to exchange information and daily communication in today’s society; thus, text information hiding has great research value and practical significance. Thi...

    Fufang Li, Binbin Li, Yongfeng Huang in Proceedings of the 9th International Confe… (2021)

  18. No Access

    Chapter and Conference Paper

    A Vehicle Intrusion Detection System Based on Time Interval and Data Fields

    With the development of the Internet of Things and automobile technology, intelligent networked vehicles are becoming more and more mature. Automobile manufacturers have installed various entertainment and saf...

    Xun He, Zhen Yang, Yongfeng Huang in Artificial Intelligence and Security (2021)

  19. No Access

    Chapter and Conference Paper

    TStego-THU: Large-Scale Text Steganalysis Dataset

    In recent years, with the development of natural language processing (NLP) technology, linguistic steganography has developed rapidly. However, to the best of our knowledge, currently there is no public datase...

    Zhongliang Yang, ** He, Siyu Zhang in Advances in Artificial Intelligence and Se… (2021)

  20. No Access

    Chapter and Conference Paper

    Multi-modal Steganography Based on Semantic Relevancy

    Traditional steganography embeds confidential information by modifying the carrier at the symbol level, e.g., the pixels of an image or the words of a text. Since modification traces will inevitably be left on th...

    Yuting Hu, Zhongliang Yang, Han Cao, Yongfeng Huang in Digital Forensics and Watermarking (2021)

previous disabled Page of 4