Liwei Chen

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
Importance-based system cost management and failure risk analysis for different phases in life cycle.
Reliab. Eng. Syst. Saf., February, 2024

Boiler Furnace Temperature Field Measurement and Reconstruction Error Elimination Based on Temperature Field Residual Correction Network.
IEEE Trans. Instrum. Meas., 2024

Deep learning-based predictive modelling of transonic flow over an aerofoil.
CoRR, 2024

Harder Tasks Need More Experts: Dynamic Routing in MoE Models.
CoRR, 2024

Probing Multimodal Large Language Models for Global and Local Semantic Representation.
CoRR, 2024

How Temporal Unrolling Supports Neural Physics Simulators.
CoRR, 2024

Video-LaVIT: Unified Video-Language Pre-training with Decoupled Visual-Motional Tokenization.
CoRR, 2024

2023
KPDFI: Efficient data flow integrity based on key property against data corruption attack.
Comput. Secur., May, 2023

On Side-Channel Analysis of Memristive Cryptographic Circuits.
IEEE Trans. Inf. Forensics Secur., 2023

Center Weighted Convolution and GraphSAGE Cooperative Network for Hyperspectral Image Classification.
IEEE Trans. Geosci. Remote. Sens., 2023

Feature Fusion Network Model Based on Dual Attention Mechanism for Hyperspectral Image Classification.
IEEE Trans. Geosci. Remote. Sens., 2023

Spatial multi-scale attention U-improved network for blood vessel segmentation.
Signal Image Video Process., 2023

Performance-based maintenance analysis and resource allocation in irrigation networks.
Reliab. Eng. Syst. Saf., 2023

IoT-Enabled Fault Prediction and Maintenance for Smart Charging Piles.
IEEE Internet Things J., 2023

A New Method of Identifying the Prognostic Factors of Hepatocellular Carcinoma Patients.
Int. J. Perform. Eng., 2023

Power-balanced Memristive Cryptographic Implementation Against Side Channel Attacks.
CoRR, 2023

A Step Closer to Comprehensive Answers: Constrained Multi-Stage Question Decomposition with Large Language Models.
CoRR, 2023

The North System for Formosa Speech Recognition Challenge 2023.
CoRR, 2023

Unified Language-Vision Pretraining in LLM with Dynamic Discrete Visual Tokenization.
CoRR, 2023

Turbulent Flow Simulation using Autoregressive Conditional Diffusion Models.
CoRR, 2023

Taiwanese Hakka Across Taiwan Corpus and Formosa Speech Recognition Challenge 2023 - Hakka ASR.
Proceedings of the 26th Conference of the Oriental COCOSDA International Committee for the Co-ordination and Standardisation of Speech Databases and Assessment Techniques, 2023

BVSNO: Binary Code Vulnerability Detection Based on Slice Semantic and Node Order.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Identify Vulnerability Types: A Cross-Project Multiclass Vulnerability Classification System Based on Deep Domain Adaptation.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Exploring Gate-Diversity Enabled by Reconfigurable Memristive Technology.
Proceedings of the 30th IEEE International Conference on Electronics, Circuits and Systems, 2023

Embedding the Social Value in Algorithmic Innovation and Companies Competitiveness: Evidence from the food-delivery platforms in China.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Speaker-Independent Acoustic-to-Articulatory Speech Inversion.
Proceedings of the IEEE International Conference on Acoustics, 2023

A Unified One-Shot Prosody and Speaker Conversion System with Self-Supervised Discrete Speech Units.
Proceedings of the IEEE International Conference on Acoustics, 2023

Exploring Wav2vec 2.0 Fine Tuning for Improved Speech Emotion Recognition.
Proceedings of the IEEE International Conference on Acoustics, 2023

A Multimodal Deep Learning Model for Preoperative Risk Prediction of Follicular Thyroid Carcinoma.
Proceedings of the IEEE International Conference on E-health Networking, 2023

Hybrid Deep-Machine Learning Model for Modified Leader-Follower Consensus Tracking Control UAVs Flock Strategy.
Proceedings of the International Conference on Frontiers of Artificial Intelligence and Machine Learning, 2023

Code Property Graph based Vulnerability Type Identification with Fusion Representation.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Cross Domain on Snippets: BiLSTM-TextCNN based Vulnerability Detection with Domain Adaptation.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

DPFCFI: A Hardware-Based Forward Control-Flow Integrity for Architecture and Microarchitecture.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

Side-channel Attacks on Memristive Circuits Under External Disturbances.
Proceedings of the 32nd IEEE Asian Test Symposium, 2023

Navel Gazing or the Long View?: The Influence of Firm Positioning with Respect to OSS Communities on a Developer's Firm Embeddedness.
Proceedings of the 29th Americas Conference on Information Systems, 2023

Latent Positional Information is in the Self-Attention Variance of Transformer Language Models Without Positional Embeddings.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), 2023

Learning Similarity Metrics for Volumetric Simulations with Multiscale CNNs.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

A Vector Quantized Approach for Text to Speech Synthesis on Real-World Spontaneous Speech.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
An autonomous navigation approach for unmanned vehicle in outdoor unstructured terrain with dynamic and negative obstacles.
Robotica, 2022

Risk-informed based comprehensive path-planning method for radioactive materials road transportation.
Reliab. Eng. Syst. Saf., 2022

An integrated probabilistic risk assessment methodology for maritime transportation of spent nuclear fuel based on event tree and hydrodynamic model.
Reliab. Eng. Syst. Saf., 2022

Maintenance cost-based importance analysis under different maintenance strategies.
Reliab. Eng. Syst. Saf., 2022

A novel resource management scheme for virtualized cyber-physical-social system.
Phys. Commun., 2022

Method for counting labeled neurons in mouse brain regions based on image representation and registration.
Medical Biol. Eng. Comput., 2022

Double-Branch Local Context Feature Extraction Network for Hyperspectral Image Classification.
IEEE Geosci. Remote. Sens. Lett., 2022

Spectral-Spatial Hyperspectral Image Classification Based on Multiple Views and Multigraphs Fusion With Few Labeled Samples.
IEEE Geosci. Remote. Sens. Lett., 2022

Model and simulation analysis for the reliability of the transportation network.
J. Simulation, 2022

How Does Intelligent System Knowledge Empowerment Yield Payoffs? Uncovering the Adaptation Mechanisms and Contingency Role of Work Experience.
Inf. Syst. Res., 2022

A Teacher-student Framework for Unsupervised Speech Enhancement Using Noise Remixing Training and Two-stage Inference.
CoRR, 2022

Learned Turbulence Modelling with Differentiable Fluid Solvers.
CoRR, 2022

Utilizing Mask RCNN for Monitoring Postoperative Free Flap: Circulatory Compromise Detection Based on Visible-Light and Infrared Images.
IEEE Access, 2022

A Postoperative Free Flap Monitoring System: Circulatory Compromise Detection Based on Visible-Light Image.
IEEE Access, 2022

BERT-Based Vulnerability Type Identification with Effective Program Representation.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

TFCFI:Transparent Forward Fine-grained Control-Flow Integrity Protection.
Proceedings of the IEEE International Conference on Trust, 2022

Path-Based Pre-Routing Timing Prediction for Modern Very Large-Scale Integration Designs.
Proceedings of the 23rd International Symposium on Quality Electronic Design, 2022

Binary-level Directed Symbolic Execution Through Pattern Learning.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

An Effective Buffer Overflow Detection With Super Data-Flow Graphs.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

An Efficient Metric-Based Approach for Static Use-After-Free Detection.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

MVDetecter: Vulnerability Primitive-based General Memory Vulnerability Detection.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

BHMVD: Binary Code-based Hybrid Neural Network for Multiclass Vulnerability Detection.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

Automated Vulnerable Codes Mutation through Deep Learning for Variability Detection.
Proceedings of the International Joint Conference on Neural Networks, 2022

Fine-Grained Style Control In Transformer-Based Text-To-Speech Synthesis.
Proceedings of the IEEE International Conference on Acoustics, 2022

Inductive Vulnerability Detection via Gated Graph Neural Network.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

Gadgets Splicing: Dynamic Binary Transformation for Precise Rewriting.
Proceedings of the IEEE/ACM International Symposium on Code Generation and Optimization, 2022

PointerChecker: Tag-Based and Hardware-Assisted Memory Safety against Memory Corruption.
Proceedings of the IEEE 31st Asian Test Symposium, 2022

GRIN: Make Rewriting More Precise.
Proceedings of the ASSE 2022: 3rd Asia Service Sciences and Software Engineering Conference, Macao, February 24, 2022

Multi-organizational Embeddedness: Impacts on Developers' Turnover and Career Mobility.
Proceedings of the 28th Americas Conference on Information Systems, 2022

2021
Regional Localization of Mouse Brain Slices Based on Unified Modal Transformation.
Symmetry, 2021

Mission reliability modeling of UAV swarm and its structure optimization based on importance measure.
Reliab. Eng. Syst. Saf., 2021

Importance measure-based maintenance optimization strategy for pod slewing system.
Reliab. Eng. Syst. Saf., 2021

How Does Employee Infusion Use of CRM Systems Drive Customer Satisfaction? Mechanism Differences Between Face-to-Face and Virtual Channels.
MIS Q., 2021

Towards high-accuracy deep learning inference of compressible turbulent flows over aerofoils.
CoRR, 2021

Identification of Arrhythmia by Using a Decision Tree and Gated Network Fusion Model.
Comput. Math. Methods Medicine, 2021

Highly Uniform All-Vacuum-Deposited Inorganic Perovskite Artificial Synapses for Reservoir Computing.
Adv. Intell. Syst., 2021

Accelerating Data-Flow Analysis with Full-Partitioning.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Finding Runtime Usable Gadgets: On the Security of Return Address Authentication.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Self-Attention based Automated Vulnerability Detection with Effective Data Representation.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Temporal Context in Speech Emotion Recognition.
Proceedings of the Interspeech 2021, 22nd Annual Conference of the International Speech Communication Association, Brno, Czechia, 30 August, 2021

Speech Representation Learning Combining Conformer CPC with Deep Cluster for the ZeroSpeech Challenge 2021.
Proceedings of the Interspeech 2021, 22nd Annual Conference of the International Speech Communication Association, Brno, Czechia, 30 August, 2021

Twine Stack: A Hybrid Mechanism Achieving Less Cost for Return Address Protection.
Proceedings of the 30th IEEE Asian Test Symposium, 2021

2020
Efficient Return Address Verification Based on Dislocated Stack.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

ABCFI: Fast and Lightweight Fine-Grained Hardware-Assisted Control-Flow Integrity.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

A resilience measure for supply chain systems considering the interruption with the cyber-physical systems.
Reliab. Eng. Syst. Saf., 2020

Spectral Analysis for Semantic Segmentation with Applications on Feature Truncation and Weak Annotation.
CoRR, 2020

An Efficient Vulnerability Extrapolation Using Similarity of Graph Kernel of PDGs.
Proceedings of the 19th IEEE International Conference on Trust, 2020

AVDHRAM: Automated Vulnerability Detection based on Hierarchical Representation and Attention Mechanism.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Time-frequency Overlapped Signals Intelligent Modulation Recognition in Underlay CRN.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

An Improved Particle Swarm Optimization Algorithm for Pigeon Brain Tissue MRI Image Segmentation.
Proceedings of the ICAIP 2020: 4th International Conference on Advances in Image Processing, 2020

Zipper Stack: Shadow Stacks Without Shadow.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Mobile Health (mHealth) Channel Preference: An Integrated Perspective of Approach-Avoidance Beliefs and Regulatory Focus.
J. Assoc. Inf. Syst., 2019

Investigating the learning performances between sequence- and context-based teaching designs for virtual reality (VR)-based machine tool operation training.
Comput. Appl. Eng. Educ., 2019

Using Selective Syntactic Online Compiler to Promote Programming Learning.
Proceedings of the IEEE International Conference on Engineering, Technology and Education, 2019

Board Game Design for Python Programming Education.
Proceedings of the IEEE International Conference on Engineering, Technology and Education, 2019

Discrimination of benign and malignant pulmonary tumors in computed tomography: effective priori information of fast learning network architecture.
Proceedings of the Medical Imaging 2019: Image Processing, 2019

Generative Adversarial Networks for Unpaired Voice Transformation on Impaired Speech.
Proceedings of the Interspeech 2019, 2019

Dam: A Practical Scheme to Mitigate Data-Oriented Attacks with Tagged Memory Based on Hardware.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019

2018
SQL-to-Text Generation with Graph-to-Sequence Model.
CoRR, 2018

Peer learning efficacy analysis on undergraduate software design course.
Comput. Appl. Eng. Educ., 2018

Encoding implicit relation requirements for relation extraction: A joint inference approach.
Artif. Intell., 2018

TMDFI: Tagged Memory Assisted for Fine-Grained Data-Flow Integrity Towards Embedded Systems Against Software Exploitation.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A competing round-robin prediction model for histologic subtype prediction of lung adenocarcinomas based on thoracic computed tomography.
Proceedings of the Medical Imaging 2018: Biomedical Applications in Molecular, 2018

A Comprehensive Detection of Memory Corruption Vulnerabilities for C/C++ Programs.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Exploiting Rich Syntactic Information for Semantic Parsing with Graph-to-Sequence Model.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018

Function-Oriented Programming: A New Class of Code Reuse Attack in C Applications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
A nonparametric approach to the automated protocol fingerprint inference.
J. Netw. Comput. Appl., 2017

Rethinking robust and accurate application protocol identification.
Comput. Networks, 2017

Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

2016
Multiple-combinational-channel: A network architecture for workload balance and deadlock free.
Future Gener. Comput. Syst., 2016

Knowledge transfer of software tool development for functional requirements analysis.
Comput. Appl. Eng. Educ., 2016

224-Gbps transmission for next-generation WDM long-reach PON using CAP modulation.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2016

TDSS: A New Word Sense Representation Framework for Information Retrieval.
Proceedings of the Natural Language Understanding and Intelligent Applications, 2016

A 1.3 V noise-cancelling low noise amplifier for ultra wideband applications.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

2015
Gas Turbine Blades Fault Diagnosis Method with EMD Energy Entropy and Related Vector Machine.
J. Inf. Hiding Multim. Signal Process., 2015

Cross-national differences in individual knowledge-seeking patterns: a climato-economic contextualization.
Eur. J. Inf. Syst., 2015

A 200-Gbps OFDM long-reach PON over 60-km transmission without inline and pre-amplifier.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2015

Physicians' Online Popularity and Price Premiums for Online Health Consultations: A Combined Signaling Theory and Online Feedback Mechanisms Explanation.
Proceedings of the International Conference on Information Systems, 2015

Learn to Solve Algebra Word Problems Using Quadratic Programming.
Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, 2015

2014
A novel hardware/software partitioning for SIMD-based real-time AVS video decoder.
Multim. Tools Appl., 2014

Stiffness and elastic Deformation of a 3-leg 5-DOF Parallel manipulator with One Composite leg.
Int. J. Robotics Autom., 2014

Applying reverse engineering and complexity analysis to refine a cost estimation model based on function point.
Proceedings of the Intelligent Systems and Applications, 2014

Location-based social networking information services in university campus.
Proceedings of the 2nd International Conference on Systems and Informatics, 2014

Consumer Awareness and Use of Mobile Health Services in India: An Urban - Rural Comparison Study.
Proceedings of the International Conference on Information Systems, 2014

Joint Inference for Knowledge Base Population.
Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, 2014

Encoding Relation Requirements for Relation Extraction via Joint Inference.
Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, 2014

2013
An Algorithm with High Accuracy for Harmonic Analysis of Power System.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Realizing hardware accelerated AVS video playback on the Godson Platform.
Proceedings of the 20th IEEE International Conference on Electronics, 2013

2012
A Novel HW/SW Partitioning with SIMD Instructions for AVS Video Decoder.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

Explore Person Specific Evidence in Web Person Name Disambiguation.
Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, 2012

MCC: A Load Balancing and Deadlock Free Interconnect Network for Cache Coherent Chip Multiprocessors.
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012

Learning Chinese Entity Attributes from Online Encyclopedia.
Proceedings of the Web Technologies and Applications, 2012

2011
The activities and typologies in service innovation design and deployment: A socio-technical perspective on university based Living Lab.
Proceedings of the 2011 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 2011

2010
Geometric Capacity Provisioning for Wavelength-Switched WDM Networks.
Proceedings of the Algorithms for Next Generation Networks, 2010

Analysis and Study of Embedded Capability to HSBH by SPA.
J. Softw., 2010

Evaluating whole-page relevance.
Proceedings of the Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2010

Evaluating search systems using result page context.
Proceedings of the Information Interaction in Context Symposium, 2010

2009
Accuracy and efficiency comparisons of single- and multi-cycled software classification models.
Inf. Softw. Technol., 2009

Predicting user interests from contextual information.
Proceedings of the 32nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2009

Understanding Cross National Difference in Knowledge Seeking Behavior Model: A Survival Perspective.
Proceedings of the International Conference on Information Systems, 2009

Adaptive Stereo Video Object Segmentation Based on Depth and Spatio-temporal Information.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

Automatic Segmentation of Video Object under Static Background.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
Integration of the grey relational analysis with genetic algorithm for software effort estimation.
Eur. J. Oper. Res., 2008

Research on Disparity and Background-based Object Segmentation in Stereo Video.
Proceedings of the Technological Developments in Education and Automation, 2008

A Collaborative Learning System Based on Multi-agent.
Proceedings of the ALPIT 2008, 2008

2007
Finite Element Simulation of Viscoelastic Damping Materials.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007

2006
Uniform versus non-uniform band switching in WDM networks.
Comput. Networks, 2006

2005
Dynamic resource allocation in wavelength division multiplexing networks with optical bypass and waveband switching.
PhD thesis, 2005

Efficient routing and wavelength assignment for reconfigurable WDM ring networks with wavelength converters.
IEEE/ACM Trans. Netw., 2005

Dynamic routing and wavelength assignment with optical bypass using ring embeddings.
Opt. Switch. Netw., 2005

Uniform vs. non-uniform band switching in WDM networks.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005

2004
Optimal waveband switching in WDM networks.
Proceedings of IEEE International Conference on Communications, 2004

2003
Efficient Routing and Wavelength Assignment for Reconfigurable WDM Networks with Wavelength Converters.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003


  Loading...