Dakui Wang

According to our database1, Dakui Wang authored at least 36 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Robust Malicious Domain Detection Against Adversarial Attacks on Heterogeneous Graph.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

Self-supervised Deep Heterogeneous Graph Neural Networks with Contrastive Learning.
Proceedings of the Computational Science - ICCS 2023, 2023

Mulan: A Multi-Level Alignment Model for Video Question Answering.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

MetaBERT: Collaborative Meta-Learning for Accelerating BERT Inference.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Few-shot Malicious Domain Detection on Heterogeneous Graph with Meta-learning.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
Application of distributed motion estimation for swarm MAVs in a GPS-restricted environment based on a wireless sensor network.
J. Supercomput., 2022

Rethinking the Feature Iteration Process of Graph Convolution Networks.
Proceedings of the International Joint Conference on Neural Networks, 2022

KAFNN: A Knowledge Augmentation Framework to Graph Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2022

DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Noise Suppression with Label Graph in Distantly Supervised Relation Extraction.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
Robust node embedding against graph structural perturbations.
Inf. Sci., 2021

FLOD: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority.
IACR Cryptol. ePrint Arch., 2021

Efficient Byzantine-Resilient Stochastic Gradient Desce.
CoRR, 2021

A Differential Privacy Collaborative Deep Learning Algorithm in Pervasive Edge Computing Environment.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Enhancing Label Representations with Relational Inductive Bias Constraint for Fine-Grained Entity Typing.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

2020
EaSTFLy: Efficient and secure ternary federated learning.
Comput. Secur., 2020

Generate Images with Obfuscated Attributes for Private Image Classification.
Proceedings of the MultiMedia Modeling - 26th International Conference, 2020

A Shared-Word Sensitive Sequence-to-Sequence Features Extractor for Sentences Matching.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

2019
Design and Parametric Analysis of the Threshold-Value Judging Mechanism in MEMS Security System.
Proceedings of the 14th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2019

Privacy-Preserving Distributed Machine Learning Based on Secret Sharing.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

2018
Improve Word Mover's Distance with Part-of-Speech Tagging.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

A Survey on Collaborative Deep Learning and Privacy-Preserving.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Efficient and Private Set Intersection of Human Genomes.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2018

2017
Improving Password Guessing Using Byte Pair Encoding.
Proceedings of the Information Security - 20th International Conference, 2017

Efficient and Scalable Privacy-Preserving Similar Document Detection.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Data field for mining big data.
Geo spatial Inf. Sci., 2016

2015
Select actionable positive or negative sequential patterns.
J. Intell. Fuzzy Syst., 2015

Comment on "Clustering by fast search and find of density peaks".
CoRR, 2015

The effect of micro-spring stiffness changes on the typical MEMS S&A device.
Proceedings of the 10th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2015

The parametric analysis of the centrifugal insurance mechanism in MEMS safety and arming device.
Proceedings of the 10th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2015

The calculation method of reliability based on MEMS Safety and Arming device.
Proceedings of the 10th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2015

The MEMS experiment and numerical simulations based on the explosion protection of micro-scale vehicles model.
Proceedings of the 10th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2015

Modeling nuclear shape with boundary representation of object.
Proceedings of the 2015 IEEE International Conference on Bioinformatics and Biomedicine, 2015

2014
ELMDF: A new classification algorithm based on Data Field.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014

Topology Potential-Based Parameter Selecting for Support Vector Machine.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

2013
A new method of face recognition with data field and PCA.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013


  Loading...