Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleNovember 2024
Editing Personality For Large Language Models
Natural Language Processing and Chinese ComputingPages 241–254https://doi.org/10.1007/978-981-97-9434-8_19AbstractThis paper introduces an innovative task focused on editing the personality traits of Large Language Models (LLMs). This task seeks to adjust the models’ responses to opinion-related questions on specified topics since an individual’s personality ...
- ArticleNovember 2024
Model-Agnostic Knowledge Distillation Between Heterogeneous Models
Natural Language Processing and Chinese ComputingPages 245–257https://doi.org/10.1007/978-981-97-9431-7_19AbstractThe goal of KD is to transfer valuable knowledge from a strong teacher model to a weaker student model in order to bridge the performance gap. However, the conventional teacher-student paradigm of KD can not be applied to the teacher model and ...
- research-articleOctober 2024
Mitigating Sample Selection Bias with Robust Domain Adaption in Multimedia Recommendation
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 7581–7590https://doi.org/10.1145/3664647.3680615Industrial multimedia recommendation systems extensively utilize cascade architectures to deliver personalized content for users, generally consisting of multiple stages like retrieval and ranking. However, retrieval models have long suffered from Sample ...
- research-articleSeptember 2024
RDB-YOLOv8n: Insulator defect detection based on improved lightweight YOLOv8n model
Journal of Real-Time Image Processing (SPJRTIP), Volume 21, Issue 5https://doi.org/10.1007/s11554-024-01557-yAbstractInsulator defect detection is pivotal for the reliable functioning of power transmission and distribution networks. This paper introduces an optimized lightweight model for insulator defect detection, RDB-YOLOv8n, which addresses the limitations ...
- research-articleAugust 2024
Make Your Home Safe: Time-aware Unsupervised User Behavior Anomaly Detection in Smart Homes via Loss-guided Mask
- Jingyu Xiao,
- Zhiyao Xu,
- Qingsong Zou,
- Qing Li,
- Dan Zhao,
- Dong Fang,
- Ruoyu Li,
- Wenxin Tang,
- Kang Li,
- Xudong Zuo,
- Penghui Hu,
- Yong Jiang,
- Zixuan Weng,
- Michael R. Lyu
KDD '24: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 3551–3562https://doi.org/10.1145/3637528.3671708Smart homes, powered by the Internet of Things, offer great convenience but also pose security concerns due to abnormal behaviors, such as improper operations of users and potential attacks from malicious attackers. Several behavior modeling methods have ...
-
- research-articleAugust 2024
Advancing entity alignment with dangling cases: a structure-aware approach through optimal transport learning and contrastive learning
Neural Computing and Applications (NCAA), Volume 36, Issue 32Pages 20387–20400https://doi.org/10.1007/s00521-024-10276-1AbstractEntity alignment (EA) aims to discover the equivalent entities in different knowledge graphs (KGs), which plays an important role in knowledge engineering. Recently, EA with dangling entities has been proposed as a more realistic setting, which ...
- research-articleJune 2024JUST ACCEPTED
A Question-centric Multi-experts Contrastive Learning Framework for Improving the Accuracy and Interpretability of Deep Sequential Knowledge Tracing Models
ACM Transactions on Knowledge Discovery from Data (TKDD), Just Accepted https://doi.org/10.1145/3674840Knowledge tracing (KT) plays a crucial role in predicting students’ future performance by analyzing their historical learning processes. Deep neural networks (DNNs) have shown great potential in solving the KT problem. However, there still exist some ...
- research-articleJuly 2024
MATE: When multi-agent Deep Reinforcement Learning meets Traffic Engineering in multi-domain networks
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 247, Issue Chttps://doi.org/10.1016/j.comnet.2024.110399AbstractAs the global network evolves into a large-scale interconnection system with multiple distributed domains, scalability and efficiency have become equally important for Traffic Engineering (TE). Traditional centralized TE suffers from significant ...
- research-articleMay 2024
DeviceRadar: Online IoT Device Fingerprinting in ISPs Using Programmable Switches
IEEE/ACM Transactions on Networking (TON), Volume 32, Issue 5Pages 3854–3869https://doi.org/10.1109/TNET.2024.3398778Device fingerprinting can be used by Internet Service Providers (ISPs) to identify vulnerable IoT devices for early prevention of threats. However, due to the wide deployment of middleboxes in ISP networks, some important data, e.g., 5-tuples and flow ...
- research-articleMay 2024
NCTM: A Novel Coded Transmission Mechanism for Short Video Deliveries
WWW '24: Proceedings of the ACM Web Conference 2024Pages 2847–2858https://doi.org/10.1145/3589334.3645387With the rapid popularity of short video applications, a large number of short video transmissions occupy the bandwidth, placing a heavy load on the Internet. Due to the extensive number of short videos and the predominant service for mobile users, ...
- research-articleMay 2024
Air-CAD: Edge-Assisted Multi-Drone Network for Real-time Crowd Anomaly Detection
WWW '24: Proceedings of the ACM Web Conference 2024Pages 2817–2825https://doi.org/10.1145/3589334.3645362Drones connected via the web are increasingly being used for crowd anomaly detection (CAD). Existing solutions, however, face many challenges, such as low accuracy and high latency due to drones' dynamic shooting distances and angles as well as limited ...
- research-articleJuly 2024
A receiver-driven transport protocol using differentiated algorithms for differential congestion in datacenters
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 245, Issue Chttps://doi.org/10.1016/j.comnet.2024.110357AbstractWith the continuous development of applications, data centers run application traffic from various service providers, and the requirements for data center networks are also increasing. Congestion control has always been a hot topic of discussion. ...
- research-articleJuly 2024
A clinically actionable and explainable real-time risk assessment framework for stroke-associated pneumonia
Artificial Intelligence in Medicine (AIIM), Volume 149, Issue Chttps://doi.org/10.1016/j.artmed.2024.102772AbstractThe current medical practice is more responsive rather than proactive, despite the widely recognized value of early disease detection, including improving the quality of care and reducing medical costs. One of the cornerstones of early disease ...
Highlights- Explainable real-time risk assessment system for stroke-associated pneumonia (SAP)
- The first Transformer-based model designed for the task of early disease detection and exploiting the fine-grained intra-visit records
- The early ...
- research-articleFebruary 2024
An automatic riveting method for robots based on the improved EDCircles algorithm
Robotics and Computer-Integrated Manufacturing (RCIM), Volume 86, Issue Chttps://doi.org/10.1016/j.rcim.2023.102648AbstractBecause of many advantages, such as single-sided riveting and no welding, blind rivet nuts are widely used to fasten various metal sheets and pipes. However, fixing the blind rivet nut to the base material is mainly accomplished by manual ...
Highlights- We design a morphology-based image binarization method.
- We propose an improved EDCircles algorithm based on the geometric characteristics of circular arcs.
- We design a circle optimization method.
- We perform experiments that ...
- ArticleJanuary 2024
Foreground Feature Enhancement and Peak & Background Suppression for Fine-Grained Visual Classification
AbstractFine-grained visual classification task is challenging due to large variation in the appearance of the same subcategories and similarity in the appearance of different subcategories. To tackle the challenges, locating multiple discriminative ...
- research-articleJuly 2024
SeIoT: Detecting Anomalous Semantics in Smart Homes via Knowledge Graph
- Ruoyu Li,
- Qing Li,
- Yucheng Huang,
- Qingsong Zou,
- Dan Zhao,
- Zhengxin Zhang,
- Yong Jiang,
- Fa Zhu,
- Athanasios V. Vasilakos
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 7005–7018https://doi.org/10.1109/TIFS.2024.3428856Existing IoT Network Anomaly Detection Systems (NADSes) typically treat IoT devices as independent entities and model them by Euclidean space features. These approaches suffer from low accuracies on new attacks (e.g., platform-based attacks and evasion ...
- research-articleMay 2024
Metis: understanding and enhancing in-network regular expressions
- Zhengxin Zhang,
- Yucheng Huang,
- Gunaglin Duan,
- Qing Li,
- Dan Zhao,
- Yong Jiang,
- Lianbo Ma,
- Xi Xiao,
- Hengyang Xu
NIPS '23: Proceedings of the 37th International Conference on Neural Information Processing SystemsArticle No.: 3402, Pages 77867–77881Regular expressions (REs) offer one-shot solutions for many networking tasks, e.g., network intrusion detection. However, REs purely rely on expert knowledge and cannot learn from massive ubiquitous network data for automatic management. Today, neural ...
- research-articleMay 2024
Interpreting unsupervised anomaly detection in security via rule extraction
NIPS '23: Proceedings of the 37th International Conference on Neural Information Processing SystemsArticle No.: 2718, Pages 62224–62243Many security applications require unsupervised anomaly detection, as malicious data are extremely rare and often only unlabeled normal data are available for training (i.e., zero-positive). However, security operators are concerned about the high stakes ...
- research-articleNovember 2023
A Cooperative Caching System in Heterogeneous Edge Networks
IEEE Transactions on Mobile Computing (ITMV), Volume 23, Issue 7Pages 7635–7649https://doi.org/10.1109/TMC.2023.3336955Recently, the rapid growth of video content and the increasing demand for high Quality of Experience (QoE) have significantly strained the backbone network. Edge caching is a promising approach to alleviate the strain by caching content closer to users. ...