Skip to main content

previous disabled Page of 13
and
  1. No Access

    Chapter and Conference Paper

    A Phrase-Level Attention Enhanced CRF for Keyphrase Extraction

    Since sequence labeling-based methods take into account the dependencies between neighbouring labels, they have been widely used for keyphrase prediction. Existing methods mainly focus on the word-level sequen...

    Shinian Li, Tao Jiang, Yuxiang Zhang in Advances in Information Retrieval (2024)

  2. No Access

    Chapter and Conference Paper

    A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments

    The Robust Reversible Data Hiding (RRDH) algorithm can recover both the secret data and the cover image entirely from an intact stego image, and can still restore the secret message comprehensively even if the...

    Bin Ma, Zhongquan Tao, Jian Xu, Chunpeng Wang, Jian Li in Science of Cyber Security (2023)

  3. No Access

    Chapter and Conference Paper

    NegT5: A Cross-Task Text-to-Text Framework for Negation in Question Answering

    Negation is a fundamental grammatical construct that plays a crucial role in understanding QA tasks. It has been revealed that models trained with SQuAD1 still produce original responses when presented with ne...

    Tao **, Teeradaj Racharak, Minh Le Nguyen in Intelligent Information and Database Systems (2023)

  4. No Access

    Chapter and Conference Paper

    RL-Based CEP Operator Placement Method on Edge Networks Using Response Time Feedback

    The placement of operators in Complex Event Processing (CEP) services, handling real-time data with DAGs, faces challenges due to the NP-hard nature and edge environment complexity. Prior research by Cai et al...

    Yuyou Wang, Hao Hu, Hongyu Kuang, Chenyou Fan in Web Information Systems and Applications (2023)

  5. No Access

    Chapter and Conference Paper

    Optimally Blending Honeypots into Production Networks: Hardness and Algorithms

    Honeypot is an important cyber defense technique that can expose attackers’ new attacks (e.g., zero-day exploits). However, the effectiveness of honeypots has not been systematically investigated, beyond the r...

    Md Mahabub Uz Zaman, Liangde Tao, Mark Maldonado, Chang Liu in Science of Cyber Security (2023)

  6. No Access

    Chapter and Conference Paper

    Redactable Blockchain in the Permissioned Setting

    As a momentous attribute of blockchains, the immutability ensures the integrity and credibility of historical data, but it is inevitably abused to spread illegal content and does not meet certain requirements ...

    Chunying Peng, Haixia Xu, Huimei Liao, **ling Tang, Tao Tang in Science of Cyber Security (2023)

  7. No Access

    Chapter and Conference Paper

    TPFL: Test Input Prioritization for Deep Neural Networks Based on Fault Localization

    DNN testing is a critical way to guarantee the quality of DNNs. To obtain test oracle information, DNN testing requires a huge cost to label test inputs, which greatly affects the efficiency of DNN testing. To...

    Yali Tao, Chuanqi Tao, Hong**g Guo, Bohan Li in Advanced Data Mining and Applications (2022)

  8. No Access

    Chapter and Conference Paper

    Tackling Non-stationarity in Decentralized Multi-Agent Reinforcement Learning with Prudent Q-Learning

    Multi-Agent Reinforcement Learning (MARL) is challenging due to the non-stationary issue of an agent’s learning environment caused by multiple co-evolving agents, i.e., the uncertainty rises with multiple agen...

    Jianan Wei, Liang Wang, ** Tao, Hao Hu in Web Information Systems and Applications (2022)

  9. No Access

    Chapter and Conference Paper

    Sensor Data Normalization Among Heterogeneous Smartphones for Implicit Authentication

    Nowadays, smartphones have become an important part in people’s life. Existing traditional explicit authentication mechanisms can hardly protect the privacy of users, which makes implicit authentication mechan...

    Zuodong **, Muyan Yao, Dan Tao in Algorithms and Architectures for Parallel Processing (2022)

  10. No Access

    Chapter and Conference Paper

    Evaluating the Parallel Execution Schemes of Smart Contract Transactions in Different Blockchains: An Empirical Study

    In order to increase throughput, more and more blockchains begin to provide the ability to execute smart contract transactions in parallel. However, there is currently no research work on evaluating parallel e...

    Jianfeng Shi, Chengzhi Li, Heng Wu in Algorithms and Architectures for Parallel … (2022)

  11. No Access

    Chapter and Conference Paper

    Market-Aware Dynamic Person-Job Fit with Hierarchical Reinforcement Learning

    Person-Job Fit (PJF) is the core of online recruitment. Several recent methods took PJF as a preference-learning problem, and tried to learn two-sided preferences from their historical behaviors. However, they...

    Bin Fu, Hongzhi Liu, Hui Zhao, Yao Zhu in Database Systems for Advanced Applications (2022)

  12. No Access

    Chapter and Conference Paper

    A Joint Framework for Explainable Recommendation with Knowledge Reasoning and Graph Representation

    With the development of recommendation systems (RSs), researchers are no longer only satisfied with the recommendation results, but also put forward requirements for the recommendation reasons, which helps imp...

    Luhao Zhang, Ruiyu Fang, Tianchi Yang in Database Systems for Advanced Applications (2022)

  13. No Access

    Chapter and Conference Paper

    Fast Fourier Orthogonalization over NTRU Lattices

    FALCON is an efficient and compact lattice-based signature scheme. It is also one of the round 3 finalists in the NIST PQC standardization process. The core of FALCON is a trapdoor sampling algorithm, which ha...

    Shuo Sun, Yongbin Zhou, Rui Zhang, Yang Tao in Information and Communications Security (2022)

  14. No Access

    Chapter and Conference Paper

    A Deep Learning Framework for Removing Bias from Single-Photon Emission Computerized Tomography

    After being photographed by medical equipment, noise in the unprocessed medical image is removed through manual processing and correction to create a proper medical image. However, manually processing medical ...

    Josh Jia-Ching Ying, Wan-Ju Yang, Ji Zhang in Advanced Data Mining and Applications (2022)

  15. No Access

    Chapter and Conference Paper

    Out-of-Domain Semantics to the Rescue! Zero-Shot Hybrid Retrieval Models

    The pre-trained language model (eg, BERT) based deep retrieval models achieved superior performance over lexical retrieval models (eg, BM25) in many passage retrieval tasks. However, limited work has been done to...

    Tao Chen, Mingyang Zhang, **g Lu, Michael Bendersky in Advances in Information Retrieval (2022)

  16. No Access

    Chapter and Conference Paper

    Coreference Resolution with Syntax and Semantics

    Recent years have witnessed a widespread increase of interest in coreference resolution (CR) in the natural language processing (NLP) community. While most research efforts have focused on the span-based metho...

    Zhiyuan Ma, Dan Meng, Chao Kong, Liang Zhou in Web Information Systems and Applications (2022)

  17. No Access

    Chapter and Conference Paper

    Gated Hypergraph Neural Network for Scene-Aware Recommendation

    To improve e-commercial recommender systems, researchers have never stopped exploring the interactions between users and items. Unfortunately, most existing methods only explore one or some certain components ...

    Tianchi Yang, Luhao Zhang, Chuan Shi in Database Systems for Advanced Applications (2022)

  18. No Access

    Chapter and Conference Paper

    Tipster: A Topic-Guided Language Model for Topic-Aware Text Segmentation

    The accurate segmentation and structural topics of plain documents not only meet people’s reading habit, but also facilitate various downstream tasks. Recently, some works have consistently given positive hint...

    Zheng Gong, Shiwei Tong, Han Wu, Qi Liu in Database Systems for Advanced Applications (2022)

  19. No Access

    Chapter and Conference Paper

    Diversify Search Results Through Graph Attentive Document Interaction

    The goal of search result diversification is to retrieve diverse documents to meet as many different information needs as possible. Graph neural networks provide a feasible way to capture the sophisticated rel...

    **anghong Xu, Kai Ouyang, Yin Zheng in Database Systems for Advanced Applications (2022)

  20. No Access

    Chapter and Conference Paper

    Leveraging Search History for Improving Person-Job Fit

    As the core technique of online recruitment platforms, person-job fit can improve hiring efficiency by accurately matching job positions with qualified candidates. However, existing studies mainly focus on the re...

    Yupeng Hou, **ngyu Pan, Wayne **n Zhao in Database Systems for Advanced Applications (2022)

previous disabled Page of 13