Di Jin
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Known people with the same name:
- Di Jin 001 (Tianjin University, College of Intelligence and Computing, China)
- Di Jin 002 (Technical University of Darmstadt, Germany)
- Di Jin 003 (University of Michigan, USA)
- Di Jin 004 (Brown University, Providence, RI, USA)
- Di Jin 005 (Amazon.com Inc., Seattle, WA, USA)
- Di Jing
Bibliography
2025
Eigen-1: Adaptive Multi-Agent Refinement with Monitor-Based RAG for Scientific Reasoning.
CoRR, September, 2025
CoRR, June, 2025
WorkForceAgent-R1: Incentivizing Reasoning Capability in LLM-based Web Agents via Reinforcement Learning.
CoRR, May, 2025
Accommodate Knowledge Conflicts in Retrieval-augmented LLMs: Towards Reliable Response Generation in the Wild.
CoRR, April, 2025
CoRR, January, 2025
A Toxic Euphemism Detection framework for online social network based on Semantic Contrastive Learning and dual channel knowledge augmentation.
Inf. Process. Manag., 2025
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2025
InjectTST: Injecting Global Information into Independent Channels for Long Time Series Forecasting.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025
2024
Withstanding detector attacks in continuous-variable quantum key distribution via mean-restricted unary linear regression.
Quantum Inf. Process., February, 2024
InjectTST: A Transformer Method of Injecting Global Information into Independent Channels for Long Time Series Forecasting.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
Thermo-Optic Response and Optical Bistablility of Integrated High-Index Doped Silica Ring Resonators.
Sensors, December, 2023
Exponent and Logarithm Component-Wise Construction Method of FCM Clustering Validity Function Based on Subjective and Objective Weighting.
Int. J. Fuzzy Syst., March, 2023
Kinematic Analysis of the variable Height rotating Mechanism for End-Traction upper limb Rehabilitation robot.
Int. J. Robotics Autom., 2023
Data-Efficient Alignment of Large Language Models with Human Feedback Through Natural Language.
CoRR, 2023
The Art of SOCRATIC QUESTIONING: Zero-shot Multimodal Reasoning with Recursive Thinking and Self-Questioning.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 2023 USENIX Annual Technical Conference, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
2022
Quantum Inf. Process., 2022
Power Probabilistic Energy Flow Calculation for Integrated Energy System Considering Uncertainties of Renewable Energy Output and Load.
Proceedings of the HP3C 2022: 6th International Conference on High Performance Compilation, 2022
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), 2022
2021
Development and implementation of an LIS-based validation system for autoverification toward zero defects in the automated reporting of laboratory test results.
BMC Medical Informatics Decis. Mak., 2021
J. Am. Medical Informatics Assoc., 2021
Continuous-Variable Quantum Key Distribution Based on Heralded Hybrid Linear Amplifier with a Local Local Oscillator.
Entropy, 2021
Adv. Intell. Syst., 2021
Proceedings of the Neural Information Processing - 28th International Conference, 2021
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021
2020
Calling Out Bluff: Attacking the Robustness of Automatic Scoring Systems with Simple Adversarial Testing.
CoRR, 2020
The image-based analysis and classification of urine sediments using a LeNet-5 neural network.
Comput. methods Biomech. Biomed. Eng. Imaging Vis., 2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Predicting Internet of Things Data Traffic Through LSTM and Autoregressive Spectrum Analysis.
Proceedings of the NOMS 2020, 2020
Proceedings of the 21st Annual Conference of the International Speech Communication Association, 2020
A Data Forwarding Mechanism based on Deep Reinforcement Learning for Deterministic Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
TextAttack: A Framework for Adversarial Attacks, Data Augmentation, and Adversarial Training in NLP.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: System Demonstrations, 2020
Proceedings of the Computer Vision - ECCV 2020, 2020
Proceedings of the 28th International Conference on Computational Linguistics, 2020
An Approach for Constructing Service Developers Oriented Heterogeneous Information Network.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
2019
New Motion Intention Acquisition Method of Lower Limb Rehabilitation Robot Based on Static Torque Sensors.
Sensors, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
CoRR, 2018
2017
PurdueNLP at SemEval-2017 Task 1: Predicting Semantic Textual Similarity with Paraphrase and Event Embeddings.
Proceedings of the 11th International Workshop on Semantic Evaluation, 2017
Proceedings of the Eleventh International Conference on Web and Social Media, 2017
Leveraging Behavioral and Social Information for Weakly Supervised Collective Classification of Political Discourse on Twitter.
Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, 2017
2016
Proceedings of the 20th SIGNLL Conference on Computational Natural Language Learning: Shared Task, 2016
2015
基于双边滤波的信号边界特征匹配与延拓 (Signal Boundary Characteristic Matching Extension Based on Bilateral Filtering).
计算机科学, 2015
2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2009
Secur. Commun. Networks, 2009
2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2006
Simul. Model. Pract. Theory, 2006