2024.9.26
2024
Security
IEEE International Conference on Ubiquitous Intelligence and Computing(UIC)
A Vulnerability-Driven Gym for Training Autonomous Cyber Agents with Reinforcement LearningWeixia Cai, Huashan Chen, Han Miao, Feng Liu, Yong Zhang, Xiaojia Yang
Security
IEEE International Joint Conference on Biometrics (IJCB)
Modeling Spoof Noise by De-spoofing Diffusion and its Application in Face Anti-spoofingBin Zhang, Xiangyu Zhu, Xiaoyu Zhang, Zhen Lei
2024.6.17
Security
Pattern Recognition
MetaTKG++: Learning evolving factor enhanced meta-knowledge for temporal knowledge graph reasoningYuwei Xia, Mengqi Zhang, Qiang Liu, Shu Wu, Xiao-Yu Zhang
2024.5.23
Security
Findings of the Association for Computational Linguistics ACL 2024
Chain-of-History Reasoning for Temporal Knowledge Graph ForecastingYuwei Xia, Ding Wang, Qiang Liu, Liang Wang, Shu Wu, Xiao-Yu Zhang
2024.5.16
Security
Intelligent Computing Technology and Applications
Semantics Fusion of Hierarchical Transformers for Multimodal Named Entity RecognitionZhao Tong, Qiang Liu, Haichao Shi, Yuwei Xia, Shu Wu & Xiao-Yu Zhang
2024.5.19
Security
IEEE International Conference on Multimedia and Expo (ICME 2024)
GAN Inversion for Image Editing via Unsupervised Domain AdaptationSiyu Xing, Chen Gong, Hewei Guo, Xiao-Yu Zhang, Xinwen Hou, Yu Liu
2024.3.13
Security
International Journal of Computer Vision (IJCV)
Learning Spatiotemporal Inconsistency via Thumbnail Layout for Face Deepfake DetectionYuting Xu, Jian Liang, Lijun Sheng, Xiao-Yu Zhang
2024.3.13
Network Security
The 24th International Conference on Computational Science (ICCS 2024)
A Framework for Intelligent Generation of Intrusion Detection Rules Based on Grad-CAMXingyu Wang
2024.05
2023
Computer Vision
The 6th Chinese Conference on Pattern Recognition and Computer Vision (PRCV 2023)
Spoof-guided Image Decomposition for Face Anti-spoofingBin Zhang, Xiangyu Zhu, Xiaoyu Zhang, Shukai Chen, and Zhen Lei
2023.08.23
Computer Vision
IJCB 2023
Modeling Spoof Noise by De-spoofing Diffusion and its Application in Face Anti-spoofingBin Zhang, etc.
Network Security
Globecom 2023
Towards Open-Set APT Malware Classification under Few-Shot SettingHuaifeng Bao, etc.
Network Security
SciSec 2023 2023
AST2Vec: A Robust Neural Code Representation for Malicious PowerShell DetectionHan Miao, etc.
Data Mining
29TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD 2023)
Rumor Detection with Diverse Counterfactual EvidenceKaiwei Zhang, Junchi Yu, Haichao Shi, Jian Liang, Xiao-Yu Zhang*
2023.05.17
Network Security
IEEE Transactions on Information Forensics and Security. (TIFS) 2023
Prism: Real-Time Privacy Protection Against Temporal Network Traffic AnalyzersWenhao Li, Xiao-Yu Zhang*, Huaifeng Bao, Binbin Yang, Zhaoxuan Li, Haichao Shi, Qiang Wang
2023.04.13
Computer Vision
International Conference on Computational Science. (ICCS 2023)
Payload Level Graph Attention Network for Web Attack Traffic DetectionHuaifeng Bao, Wenhao Li, Xingyu Wang, Zixian Tang, Qiang Wang, Wen Wang, and Feng Liu
2023.04.06
Computer Vision
IEEE Transactions on Information Forensics and Security. (TIFS) 2023
Masked Relation Learning for DeepFake DetectionZiming Yang, Jian Liang, Yuting Xu, Xiao-Yu Zhang, and Ran He
2023.02.14
Computer Vision
IEEE Transactions on Information Forensics and Security. (TIFS) 2023
Masked Relation Learning for DeepFake DetectionZiming Yang, Jian Liang, Yuting Xu, Xiao-Yu Zhang, and Ran He
2023.02.14
Computer Vision
IEEE Transactions on Image Processing. (TIP) 2023
StochasticFormer: Stochastic Modeling for Weakly Supervised Temporal Action LocalizationHaichao Shi; Xiao-Yu Zhang and Changsheng Li
2023.02.11
2022
Computer Vision
The 27th AAAI Conference on Artificial Intelligence (AAAI-2022)
Grouped Knowledge Distillation for Deep Face RecognitionWeisong Zhao, Xiangyu Zhu, Kaiwen Guo, Xiao-Yu Zhang* and Zhen Lei
2022.11.19
Network Security
The 24th IEEE International Conference on High Performance Computing and Communications (HPCC-2022)
A Glimpse of the Whole: Detecting Few-shot Android Malware Encrypted Network TrafficWenhao Li, Xiao-Yu Zhang*, Huaifeng Bao, Qiang Wang, Haichao Shi and Zhaoxuan Li
2022.10.24
Network Security
IEEE/ACM Transcations on Networking. (ToN) 2022
ProGraph: Robust Network Traffic Identification with Graph PropagationWenhao Li, Xiao-Yu Zhang*, Huaifeng Bao, Haichao Shi and Qiang Wang
2022.10.15
Knowledge Graph
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing. (EMMLP) 2022
MetaTKG: Learning Evolutionary Meta-Knowledge for Temporal Knowledge Graph ReasoningYuwei Xia, Mengqi Zhang, Qiang Liu*, Shu Wu and Xiao-Yu Zhang
2022.10.07
Network Security
Computer Networks. (CN) 2022
Robust Network Traffic Identification with Graph MatchingWenhao Li, Xiao-Yu Zhang*, Baohuai Feng, Qiang Wang and Zhaoxuan Li
2022.09.17
Network Security
Military Communications Conference (MILCOM), 2022
High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep TreeQiang Wang, Wenhao Li, Huaifeng Bao, Zixian Tang, Wen Wang*, Feng Liu, Lingyun Ying.
2022.09.10
Computer Vision
Pattern Recognition. (PR) 2022
OW-TAL: Learning Unknown Human Activities for Open-World Temporal Action LocalizationYaru Zhang, Xiao-Yu Zhang and Haichao Shi
2022.09.04
Computer Graphics
The IEEE International Conference on Multimedia & Expo (ICME2022)
A Novel Stereo Matching Pipeline with Robustness and Unfixed Disparity Search RangeJiazhi Liu and Feng Liu
2022.08.26
Computer Vision
ACM MM 2022
Dynamic Graph Modeling for Weakly-Supervised Temporal Action LocalizationHaichao Shi, Xiao-Yu Zhang, Changsheng Li, Lixing Gong, Yong Li, Yongjun Bao
2022.06.30
Computer Vision
IEEE Transactions on Image Processing. (TIP) 2022
Action Shuffling for Weakly Supervised Temporal LocalizationXiao-Yu Zhang; Haichao Shi; Changsheng Li and Xinchu Shi
2022.06.13
Computer Vision
Machine Intelligence Research. (MIR) 2022
TwinNet: Twin Structured Knowledge Transfer Network for Weakly Supervised Action LocalizationXiao-Yu Zhang, Haichao Shi*, Changsheng Li, Lixin Duan
2022.05.12
Computer Graphics
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 2022
Modified 2D-Ghost-Free Stereoscopic Display with Depth-of-Field EffectsJiazhi Liu and Feng Liu
2022.05.12
2022.04.11
Computer Vision
IEEE Transactions on Information Forensics and Security. (TIFS) 2022
Heterogeneous Face Recognition via Face Synthesis with Identity-Attribute DisentanglementZiming Yang, Jian Liang, Chaoyou Fu, Mandi Luo and Xiao-Yu Zhang
2022.03.17
Computer Graphics
26th International Conference on Pattern Recognition (ICPR2022)
Robust Stereo Matching with an Unfixed and Adaptive Disparity Search RangeJiazhi Liu and Feng Liu
2022.03.09
Network Security
International Conference on Computational Science. (ICCS 2022)
AMDetector: Detecting Large-scale and Novel Android Malware Traffic with Meta-learningWenhao Li, Xiao-Yu Zhang, Huaifeng Bao and Lin Li.
2022.03.04
Network Security
International Conference on Computational Science. (ICCS 2022)
GBLNet: Detecting Intrusion Traffic with Multi-granularity BiLSTMWenhao Li and Xiao-Yu Zhang.
2022.03.04
2021
Computer Vision
Computer Vision and Image Understanding.(CVIU) 2021
SAPS: Self-Attentive Pathway Search for weakly-supervised action localization with background-action augmentationXiao-Yu Zhang, Yaru Zhang, Haichao Shi and Jing Dong
2021.07.24
Computer Vision
International Journal of Computer Vision .(IJCV) 2021
Lamp-hq: A large-scale multi-pose high-quality database and benchmark for nir-vis face recognitionAijing Yu, Haoxue Wu, Huaibo Huang, Zhen Lei and Ran He
2021.02.12
Malware Detection
SciSec 2021: Science of Cyber Security. (SciSec 2021)
Mining Trojan Detection Based on Multi-dimensional Static FeaturesZixian Tang, Qiang Wang, Wenhao Li, Huaifeng Bao, Feng Liu, and Wen Wang.
2021.06.04
Network Security
International Conference on Computational Science. (ICCS 2021)
HSLF: HTTP Header Sequence based LSH fingerprints for Application Traffic ClassificationZixian Tang, Qiang Wang, Wenhao Li, Huaifeng Bao, Feng Liu, and Wen Wang.
2021.03.04
Computer Vision
Pattern Recognition. (PR) 2022
Weakly-supervised Action Localization Via Embedding-modeling Iterative OptimizationXiao-Yu Zhang, Haichao Shi, Changsheng Li, Peng Li, Zekun Li, Peng Ren.
2021.01.16
2020
Computer Vision
AAAI 2020
Multi-Instance Multi-Label Action Recognition and Localization Based on Spatio-Temporal Pre-Trimming for Untrimmed VideosXiao-Yu Zhang, Haichao Shi, Changsheng Li, Peng Li
2020.04.03
Computer Vision
IEEE Transactions on Neural Networks and Learning Systems. (TNNLS) 2020
AdapNet: Adaptability Decomposing Encoder-Decoder Network for Weakly Supervised Action Recognition and LocalizationXiao-Yu Zhang, Changsheng Li, Haichao Shi*, Xiaobin Zhu, Peng Li, Jing Dong
2020.01.23
2019
Computer Vision
AAAI 2019
Learning Transferable Self-attentive Representations for Action Recognition in Untrimmed Videos with Weak SupervisionXiao-Yu Zhang, Haichao Shi, Changsheng, Kai Zheng, Xiaobin Zhu, Lixin Duan
2019.07.17
Computer Vision
Neurocomputing 2019
Active Semi-supervised Learning Based on Self-expressive Correlation with Generative Adversarial NetworksXiao-Yu Zhang, Haichao Shi, Xiaobin Zhu, Peng Li
2019.01.08
2018
Computer Vision
AAAI 2019
SSGAN: Secure Steganography Based on Generative Adversarial NetworksHaichao Shi, Jing Dong, Wei Wang, Yinlong Qian, Xiao-Yu Zhang*
2018.05.10