2024

Security

IEEE International Joint Conference on Biometrics (IJCB)

Modeling Spoof Noise by De-spoofing Diffusion and its Application in Face Anti-spoofing

Bin Zhang, Xiangyu Zhu, Xiaoyu Zhang, Zhen Lei

CCF-C

2024.6.17

Security

Pattern Recognition

MetaTKG++: Learning evolving factor enhanced meta-knowledge for temporal knowledge graph reasoning

Yuwei Xia, Mengqi Zhang, Qiang Liu, Shu Wu, Xiao-Yu Zhang

CCF-B

2024.5.23

Security

Findings of the Association for Computational Linguistics ACL 2024

Chain-of-History Reasoning for Temporal Knowledge Graph Forecasting

Yuwei Xia, Ding Wang, Qiang Liu, Liang Wang, Shu Wu, Xiao-Yu Zhang

CCF-B

2024.5.16

Security

Intelligent Computing Technology and Applications

Semantics Fusion of Hierarchical Transformers for Multimodal Named Entity Recognition

Zhao Tong, Qiang Liu, Haichao Shi, Yuwei Xia, Shu Wu & Xiao-Yu Zhang

CCF-C

2024.5.19

Security

IEEE International Conference on Multimedia and Expo (ICME 2024)

GAN Inversion for Image Editing via Unsupervised Domain Adaptation

Siyu Xing, Chen Gong, Hewei Guo, Xiao-Yu Zhang, Xinwen Hou, Yu Liu

CCF-B

2024.3.13

Security

International Journal of Computer Vision (IJCV)

Learning Spatiotemporal Inconsistency via Thumbnail Layout for Face Deepfake Detection

Yuting Xu, Jian Liang, Lijun Sheng, Xiao-Yu Zhang

CCF-A

2024.3.13

Network Security

The 24th International Conference on Computational Science (ICCS 2024)

A Framework for Intelligent Generation of Intrusion Detection Rules Based on Grad-CAM

Xingyu Wang

IIE-B

2024.05

2023

Computer Vision

The 6th Chinese Conference on Pattern Recognition and Computer Vision (PRCV 2023)

Spoof-guided Image Decomposition for Face Anti-spoofing

Bin Zhang, Xiangyu Zhu, Xiaoyu Zhang, Shukai Chen, and Zhen Lei

CCF-C

2023.08.23

Computer Vision

IJCB 2023

Modeling Spoof Noise by De-spoofing Diffusion and its Application in Face Anti-spoofing

Bin Zhang, etc.

CCF-C
Computer Vision

ICCV 2023

TALL: Thumbnail Layout for Deepfake Video Detection

Yuting Xu, etc.

CCF-A
Computer Vision

ACM MM 2023

Cross-architecture distillation for face recognition

Weisong Zhao, etc.

CCF-A
Network Security

Globecom 2023

Towards Open-Set APT Malware Classification under Few-Shot Setting

Huaifeng Bao, etc.

CCF-C
Network Security

SciSec 2023 2023

AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection

Han Miao, etc.

IIE-C
Data Mining

29TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD 2023)

Rumor Detection with Diverse Counterfactual Evidence

Kaiwei Zhang, Junchi Yu, Haichao Shi, Jian Liang, Xiao-Yu Zhang*

CCF-A

2023.05.17

Network Security

IEEE Transactions on Information Forensics and Security. (TIFS) 2023

Prism: Real-Time Privacy Protection Against Temporal Network Traffic Analyzers

Wenhao Li, Xiao-Yu Zhang*, Huaifeng Bao, Binbin Yang, Zhaoxuan Li, Haichao Shi, Qiang Wang

CCF-A

2023.04.13

Computer Vision

International Conference on Computational Science. (ICCS 2023)

Payload Level Graph Attention Network for Web Attack Traffic Detection

Huaifeng Bao, Wenhao Li, Xingyu Wang, Zixian Tang, Qiang Wang, Wen Wang, and Feng Liu

IIE-B

2023.04.06

Computer Vision

IEEE Transactions on Information Forensics and Security. (TIFS) 2023

Masked Relation Learning for DeepFake Detection

Ziming Yang, Jian Liang, Yuting Xu, Xiao-Yu Zhang, and Ran He

CCF-A

2023.02.14

Computer Vision

IEEE Transactions on Information Forensics and Security. (TIFS) 2023

Masked Relation Learning for DeepFake Detection

Ziming Yang, Jian Liang, Yuting Xu, Xiao-Yu Zhang, and Ran He

CCF-A

2023.02.14

Computer Vision

IEEE Transactions on Image Processing. (TIP) 2023

StochasticFormer: Stochastic Modeling for Weakly Supervised Temporal Action Localization

Haichao Shi; Xiao-Yu Zhang and Changsheng Li

CCF-A

2023.02.11

2022

Computer Vision

The 27th AAAI Conference on Artificial Intelligence (AAAI-2022)

Grouped Knowledge Distillation for Deep Face Recognition

Weisong Zhao, Xiangyu Zhu, Kaiwen Guo, Xiao-Yu Zhang* and Zhen Lei

CCF-A

2022.11.19

Network Security

The 24th IEEE International Conference on High Performance Computing and Communications (HPCC-2022)

A Glimpse of the Whole: Detecting Few-shot Android Malware Encrypted Network Traffic

Wenhao Li, Xiao-Yu Zhang*, Huaifeng Bao, Qiang Wang, Haichao Shi and Zhaoxuan Li

CCF-C

2022.10.24

Network Security

IEEE/ACM Transcations on Networking. (ToN) 2022

ProGraph: Robust Network Traffic Identification with Graph Propagation

Wenhao Li, Xiao-Yu Zhang*, Huaifeng Bao, Haichao Shi and Qiang Wang

CCF-A

2022.10.15

Knowledge Graph

Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing. (EMMLP) 2022

MetaTKG: Learning Evolutionary Meta-Knowledge for Temporal Knowledge Graph Reasoning

Yuwei Xia, Mengqi Zhang, Qiang Liu*, Shu Wu and Xiao-Yu Zhang

CCF-B

2022.10.07

Network Security

Computer Networks. (CN) 2022

Robust Network Traffic Identification with Graph Matching

Wenhao Li, Xiao-Yu Zhang*, Baohuai Feng, Qiang Wang and Zhaoxuan Li

CCF-B

2022.09.17

Network Security

Military Communications Conference (MILCOM), 2022

High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree

Qiang Wang, Wenhao Li, Huaifeng Bao, Zixian Tang, Wen Wang*, Feng Liu, Lingyun Ying.

IIE-B

2022.09.10

Computer Vision

Pattern Recognition. (PR) 2022

OW-TAL: Learning Unknown Human Activities for Open-World Temporal Action Localization

Yaru Zhang, Xiao-Yu Zhang and Haichao Shi

CCF-B

2022.09.04

Computer Graphics

The IEEE International Conference on Multimedia & Expo (ICME2022)

A Novel Stereo Matching Pipeline with Robustness and Unfixed Disparity Search Range

Jiazhi Liu and Feng Liu

CCF-B

2022.08.26

Computer Vision

ACM MM 2022

Dynamic Graph Modeling for Weakly-Supervised Temporal Action Localization

Haichao Shi, Xiao-Yu Zhang, Changsheng Li, Lixing Gong, Yong Li, Yongjun Bao

CCF-A

2022.06.30

Computer Vision

IEEE Transactions on Image Processing. (TIP) 2022

Action Shuffling for Weakly Supervised Temporal Localization

Xiao-Yu Zhang; Haichao Shi; Changsheng Li and Xinchu Shi

CCF-A

2022.06.13

Computer Vision

Machine Intelligence Research. (MIR) 2022

TwinNet: Twin Structured Knowledge Transfer Network for Weakly Supervised Action Localization

Xiao-Yu Zhang, Haichao Shi*, Changsheng Li, Lixin Duan

2022.05.12

Computer Graphics

ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 2022

Modified 2D-Ghost-Free Stereoscopic Display with Depth-of-Field Effects

Jiazhi Liu and Feng Liu

CCF-B

2022.05.12

Crytography

信息安全学报 2022

ARX结构密码算法差分分析中模加运算的非独立性

Haiwen Qin and Baofeng Wu

CCF-C

2022.04.11

Computer Vision

IEEE Transactions on Information Forensics and Security. (TIFS) 2022

Heterogeneous Face Recognition via Face Synthesis with Identity-Attribute Disentanglement

Ziming Yang, Jian Liang, Chaoyou Fu, Mandi Luo and Xiao-Yu Zhang

CCF-A

2022.03.17

Computer Graphics

26th International Conference on Pattern Recognition (ICPR2022)

Robust Stereo Matching with an Unfixed and Adaptive Disparity Search Range

Jiazhi Liu and Feng Liu

CCF-C

2022.03.09

Network Security

International Conference on Computational Science. (ICCS 2022)

AMDetector: Detecting Large-scale and Novel Android Malware Traffic with Meta-learning

Wenhao Li, Xiao-Yu Zhang, Huaifeng Bao and Lin Li.

IIE-B

2022.03.04

Network Security

International Conference on Computational Science. (ICCS 2022)

GBLNet: Detecting Intrusion Traffic with Multi-granularity BiLSTM

Wenhao Li and Xiao-Yu Zhang.

IIE-B

2022.03.04

2021

Computer Vision

Computer Vision and Image Understanding.(CVIU) 2021

SAPS: Self-Attentive Pathway Search for weakly-supervised action localization with background-action augmentation

Xiao-Yu Zhang, Yaru Zhang, Haichao Shi and Jing Dong

CCF-B

2021.07.24

Computer Vision

International Journal of Computer Vision .(IJCV) 2021

Lamp-hq: A large-scale multi-pose high-quality database and benchmark for nir-vis face recognition

Aijing Yu, Haoxue Wu, Huaibo Huang, Zhen Lei and Ran He

CCF-A

2021.02.12

Malware Detection

SciSec 2021: Science of Cyber Security. (SciSec 2021)

Mining Trojan Detection Based on Multi-dimensional Static Features

Zixian Tang, Qiang Wang, Wenhao Li, Huaifeng Bao, Feng Liu, and Wen Wang.

IIE-C

2021.06.04

Network Security

International Conference on Computational Science. (ICCS 2021)

HSLF: HTTP Header Sequence based LSH fingerprints for Application Traffic Classification

Zixian Tang, Qiang Wang, Wenhao Li, Huaifeng Bao, Feng Liu, and Wen Wang.

IIE-B

2021.03.04

Computer Vision

Pattern Recognition. (PR) 2022

Weakly-supervised Action Localization Via Embedding-modeling Iterative Optimization

Xiao-Yu Zhang, Haichao Shi, Changsheng Li, Peng Li, Zekun Li, Peng Ren.

CCF-B

2021.01.16

2020

Computer Vision

AAAI 2020

Multi-Instance Multi-Label Action Recognition and Localization Based on Spatio-Temporal Pre-Trimming for Untrimmed Videos

Xiao-Yu Zhang, Haichao Shi, Changsheng Li, Peng Li

CCF-A

2020.04.03

Computer Vision

IEEE Transactions on Neural Networks and Learning Systems. (TNNLS) 2020

AdapNet: Adaptability Decomposing Encoder-Decoder Network for Weakly Supervised Action Recognition and Localization

Xiao-Yu Zhang, Changsheng Li, Haichao Shi*, Xiaobin Zhu, Peng Li, Jing Dong

CCF-B

2020.01.23

2019

Computer Vision

AAAI 2019

Learning Transferable Self-attentive Representations for Action Recognition in Untrimmed Videos with Weak Supervision

Xiao-Yu Zhang, Haichao Shi, Changsheng, Kai Zheng, Xiaobin Zhu, Lixin Duan 

CCF-A

2019.07.17

Computer Vision

Neurocomputing 2019

Active Semi-supervised Learning Based on Self-expressive Correlation with Generative Adversarial Networks

Xiao-Yu Zhang, Haichao Shi, Xiaobin Zhu, Peng Li 

CCF-C

2019.01.08

2018

Computer Vision

AAAI 2019

SSGAN: Secure Steganography Based on Generative Adversarial Networks

Haichao Shi, Jing Dong, Wei Wang, Yinlong Qian, Xiao-Yu Zhang*

CCF-A

2018.05.10