Hongxia Jin

Orcid: 0009-0000-0222-4217

According to our database1, Hongxia Jin authored at least 207 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient Layout-Guided Image Inpainting for Mobile Use.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024

Token Fusion: Bridging the Gap between Token Pruning and Token Merging.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024

2023
Compositional Generalization in Spoken Language Understanding.
CoRR, 2023

Prompt Tuning for Zero-shot Compositional Learning.
CoRR, 2023

Continual Diffusion with STAMINA: STack-And-Mask INcremental Adapters.
CoRR, 2023

Virtual Prompt Injection for Instruction-Tuned Large Language Models.
CoRR, 2023

Instruction-following Evaluation through Verbalizer Manipulation.
CoRR, 2023

AlpaGasus: Training A Better Alpaca with Fewer Data.
CoRR, 2023

Continual Diffusion: Continual Customization of Text-to-Image Diffusion with C-LoRA.
CoRR, 2023

CWCL: Cross-Modal Transfer with Continuously Weighted Contrastive Loss.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

ESC: Exploration with Soft Commonsense Constraints for Zero-shot Object Navigation.
Proceedings of the International Conference on Machine Learning, 2023

Learning to Jointly Share and Prune Weights for Grounding Based Vision and Language Models.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

To Wake-Up or Not to Wake-Up: Reducing Keyword False Alarm by Successive Refinement.
Proceedings of the IEEE International Conference on Acoustics, 2023

Improved Mask-Based Neural Beamforming for Multichannel Speech Enhancement by Snapshot Matching Masking.
Proceedings of the IEEE International Conference on Acoustics, 2023

Dynamic Low-rank Estimation for Transformer-based Language Models.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

Explainable and Accurate Natural Language Understanding for Voice Assistants and Beyond.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

One-stage Progressive Dichotomous Segmentation.
Proceedings of the 34th British Machine Vision Conference 2023, 2023

GOHSP: A Unified Framework of Graph and Optimization-Based Heterogeneous Structured Pruning for Vision Transformer.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Hybrid Rule-Neural Coreference Resolution System based on Actor-Critic Learning.
CoRR, 2022

Neural Coreference Resolution based on Reinforcement Learning.
CoRR, 2022

A Robust Semantic Frame Parsing Pipeline on a New Complex Twitter Dataset.
CoRR, 2022

Numerical Optimizations for Weighted Low-rank Estimation on Language Model.
CoRR, 2022

A Closer Look at Knowledge Distillation with Features, Logits, and Gradients.
CoRR, 2022

MGA-VQA: Multi-Granularity Alignment for Visual Question Answering.
CoRR, 2022

A New Concept of Knowledge based Question Answering (KBQA) System for Multi-hop Reasoning.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022

DictFormer: Tiny Transformer with Shared Dictionary.
Proceedings of the Tenth International Conference on Learning Representations, 2022

Language model compression with weighted low-rank factorization.
Proceedings of the Tenth International Conference on Learning Representations, 2022

A New Design of VQA System based on Weighted Contextual Features.
Proceedings of the IEEE International Conference on Knowledge Graph, 2022

A Robust Semantic Frame Parsing Pipeline on a New Complex Twitter Dataset.
Proceedings of the IEEE International Conference on Knowledge Graph, 2022

Numerical Optimizations for Weighted Low-rank Estimation on Language Models.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

Explainable Slot Type Attentions to Improve Joint Intent Detection and Slot Filling.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

Lite-MDETR: A Lightweight Multi-Modal Detector.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Dual-lens Reference Image Super-Resolution.
Proceedings of the 33rd British Machine Vision Conference 2022, 2022

Foreground-Specialized Model Imitation for Instance Segmentation.
Proceedings of the Computer Vision - ACCV 2022, 2022

Text-Based Interactive Recommendation via Offline Reinforcement Learning.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

Improving Zero-Shot Phrase Grounding via Reasoning on External Knowledge and Spatial Relations.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

ISEEQ: Information Seeking Question Generation Using Dynamic Meta-Information Retrieval and Knowledge Graphs.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Exploring Covariate and Concept Shift for Detection and Calibration of Out-of-Distribution Data.
CoRR, 2021

An Adversarial Learning based Multi-Step Spoken Language Understanding System through Human-Computer Interaction.
CoRR, 2021

A Coarse to Fine Question Answering System based on Reinforcement Learning.
CoRR, 2021

Entity Context Graph: Learning Entity Representations fromSemi-Structured Textual Sources on the Web.
CoRR, 2021

Hyperparameter-free Continuous Learning for Domain Classification in Natural Language Understanding.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021

Automatic Mixed-Precision Quantization Search of BERT.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Negative Data Augmentation.
Proceedings of the 9th International Conference on Learning Representations, 2021

SAFENet: A Secure, Accurate and Fast Neural Network Inference.
Proceedings of the 9th International Conference on Learning Representations, 2021

Always Be Dreaming: A New Approach for Data-Free Class-Incremental Learning.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

An End-To-End Actor-Critic-Based Neural Coreference Resolution System.
Proceedings of the IEEE International Conference on Acoustics, 2021

Multi-Step Spoken Language Understanding System Based on Adversarial Learning.
Proceedings of the IEEE International Conference on Acoustics, 2021

Data Augmentation for Voice-Assistant NLU using BERT-based Interchangeable Rephrase.
Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume, 2021

Using Neighborhood Context to Improve Information Extraction from Visual Documents Captured on Mobile Phones.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

Enhancing the generalization for Intent Classification and Out-of-Domain Detection in SLU.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

2020
A New Concept of Multiple Neural Networks Structure Using Convex Combination.
IEEE Trans. Neural Networks Learn. Syst., 2020

Constructing biomedical domain-specific knowledge graph with minimum supervision.
Knowl. Inf. Syst., 2020

Modeling Token-level Uncertainty to Learn Unknown Concepts in SLU via Calibrated Dirichlet Prior RNN.
CoRR, 2020

A Complex KBQA System using Multiple Reasoning Paths.
CoRR, 2020

Reward Constrained Interactive Recommendation with Natural Language Feedback.
CoRR, 2020

Customizable and Rigorous Location Privacy through Policy Graph.
CoRR, 2020

Activity Recommendation: Optimizing Life in the Long Term.
Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications, 2020

Explainable and Efficient Sequential Correlation Network for 3D Single Person Concurrent Activity Detection.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2020

An Interactive Adversarial Reward Learning-Based Spoken Language Understanding System.
Proceedings of the Interspeech 2020, 2020

A BI-Model Approach for Handling Unknown Slot Values in Dialogue State Tracking.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

PGLP: Customizable and Rigorous Location Privacy Through Policy Graph.
Proceedings of the Computer Security - ESORICS 2020, 2020

Generating Dialogue Responses from a Semantic Latent Space.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020

Conditional Image Repainting via Semantic Bridge and Piecewise Value Function.
Proceedings of the Computer Vision - ECCV 2020, 2020

MISC: Multi-Condition Injection and Spatially-Adaptive Compositing for Conditional Person Image Synthesis.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Generalized ODIN: Detecting Out-of-Distribution Image Without Learning From Out-of-Distribution Data.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

An Interpretable Multimodal Visual Question Answering System using Attention-based Weighted Contextual Features.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

Towards Hands-Free Visual Dialog Interactive Recommendation.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Beyond word embeddings: learning entity and concept representations from large scale knowledge bases.
Inf. Retr. J., 2019

Taking a HINT: Leveraging Explanations to Make Vision and Language Models More Grounded.
CoRR, 2019

Text-Based Interactive Recommendation via Constraint-Augmented Reinforcement Learning.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

SkillBot: Towards Automatic Skill Development via User Demonstration.
Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2019

Teach Once and Use Everywhere - Building AI Assistant Eco-Skills via User Instruction and Demonstration.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Vision-Language Recommendation via Attribute Augmented Multimodal Reinforcement Learning.
Proceedings of the 27th ACM International Conference on Multimedia, 2019

A Visual Dialog Augmented Interactive Recommender System.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

Interpreting and Improving Deep Neural SLU Models via Vocabulary Importance.
Proceedings of the Interspeech 2019, 2019

Iterative Delexicalization for Improved Spoken Language Understanding.
Proceedings of the Interspeech 2019, 2019

Rare Sound Event Detection Using Deep Learning and Data Augmentation.
Proceedings of the Interspeech 2019, 2019

Learning Assistance from an Adversarial Critic for Multi-Outputs Prediction.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Taking a HINT: Leveraging Explanations to Make Vision and Language Models More Grounded.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

SLiQA-I: Towards Cold-start Development of End-to-end Spoken Language Interface for Question Answering.
Proceedings of the IEEE International Conference on Acoustics, 2019

Adversarial Multi-label Prediction for Spoken and Visual Signal Tagging.
Proceedings of the IEEE International Conference on Acoustics, 2019

A Progressive Model to Enable Continual Learning for Semantic Slot Filling.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

A New Concept of Convex based Multiple Neural Networks Structure.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Fast Domain Adaptation of Semantic Parsers via Paraphrase Attention.
Proceedings of the 2nd Workshop on Deep Learning Approaches for Low-Resource NLP, 2019

A Deep Reinforcement Learning Based Multi-Step Coarse to Fine Question Answering (MSCQA) System.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
RuleSelector: Selecting Conditional Action Rules from User Behavior Patterns.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

A New Concept of Deep Reinforcement Learning based Augmented General Sequence Tagging System.
CoRR, 2018

User Information Augmented Semantic Frame Parsing using Coarse-to-Fine Neural Networks.
CoRR, 2018

Accelerating Time Series Searching with Large Uniform Scaling.
Proceedings of the 2018 SIAM International Conference on Data Mining, 2018

Interactive recommendation via deep neural memory augmented contextual bandits.
Proceedings of the 12th ACM Conference on Recommender Systems, 2018

A Bi-Model Based RNN Semantic Frame Parsing Model for Intent Detection and Slot Filling.
Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2018

A Deep Reinforcement Learning Based Multimodal Coaching Model (DCM) for Slot Filling in Spoken Language Understanding(SLU).
Proceedings of the Interspeech 2018, 2018

User Information Augmented Semantic Frame Parsing Using Progressive Neural Networks.
Proceedings of the Interspeech 2018, 2018

Robust Spoken Language Understanding via Paraphrasing.
Proceedings of the Interspeech 2018, 2018

Training Recurrent Neural Network through Moment Matching for NLP Applications.
Proceedings of the Interspeech 2018, 2018

Learning Out-of-Vocabulary Words in Intelligent Personal Agents.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Network Approximation using Tensor Sketching.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Adversarial Active Learning for Sequences Labeling and Generation.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

A Neural Transition-based Model for Nested Mention Recognition.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018

A New Concept of Deep Reinforcement Learning based Augmented General Tagging System.
Proceedings of the 27th International Conference on Computational Linguistics, 2018

A Boosting-based Deep Neural Networks Algorithm for Reinforcement Learning.
Proceedings of the 2018 Annual American Control Conference, 2018

CRUISE: Cold-Start New Skill Development via Iterative Utterance Generation.
Proceedings of ACL 2018, Melbourne, Australia, July 15-20, 2018, System Demonstrations, 2018

2017
Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization.
ACM Trans. Priv. Secur., 2017

Generalizing DTW to the multi-dimensional case requires an adaptive approach.
Data Min. Knowl. Discov., 2017

Deep Neural Network Approximation using Tensor Sketching.
CoRR, 2017

PCASA: Proximity Based Continuous and Secure Authentication of Personal Devices.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Secure Pick Up: Implicit Authentication When You Start Using the Smartphone.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Private Incremental Regression.
Proceedings of the 36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, 2017

Disguise Adversarial Networks for Click-through Rate Prediction.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Searching Time Series with Invariance to Large Amounts of Uniform Scaling.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

PIANO: Proximity-Based User Authentication on Voice-Powered Internet-of-Things Devices.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

One-shot learning for fine-grained relation extraction via convolutional siamese neural network.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
DPHMM: Customizable Data Release with Differential Privacy via Hidden Markov Model.
CoRR, 2016

An Information-Theoretic Approach to Individual Sequential Data Sanitization.
Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, 2016

PPM: A Privacy Prediction Model for Online Social Networks.
Proceedings of the Social Informatics - 8th International Conference, 2016

I<sup>2</sup>Rec: An Iterative and Interactive Recommendation System for Event-Based Social Networks.
Proceedings of the Social, Cultural, and Behavioral Modeling, 9th International Conference, 2016

Differentially Private User Data Perturbation with Multi-level Privacy Controls.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2016

Context Matters?: How Adding the Obfuscation Option Affects End Users' Data Disclosure Decisions.
Proceedings of the 21st International Conference on Intelligent User Interfaces, 2016

Efficient Private Empirical Risk Minimization for High-dimensional Learning.
Proceedings of the 33nd International Conference on Machine Learning, 2016

Private spatial data aggregation in the local setting.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Differentially Private K-Means Clustering.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

EpicRec: Towards Practical Differentially Private Framework for Personalized Recommendation.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Privacy-CNH: A Framework to Detect Photo Privacy with Convolutional Neural Network using Hierarchical Features.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
A Practical Framework for Privacy-Preserving Data Analytics.
Proceedings of the 24th International Conference on World Wide Web, 2015

Personalized Mobile App Recommendation: Reconciling App Functionality and User Privacy Preference.
Proceedings of the Eighth ACM International Conference on Web Search and Data Mining, 2015

Towards Permission Request Prediction on Mobile Apps via Structure Feature Learning.
Proceedings of the 2015 SIAM International Conference on Data Mining, Vancouver, BC, Canada, April 30, 2015

Mobile App Security Risk Assessment: A Crowdsourcing Ranking Approach from User Comments.
Proceedings of the 2015 SIAM International Conference on Data Mining, Vancouver, BC, Canada, April 30, 2015

Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Investigating Effects of Control and Ads Awareness on Android Users' Privacy Behaviors and Perceptions.
Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2015

Predicting Privacy Behavior on Online Social Networks.
Proceedings of the Ninth International Conference on Web and Social Media, 2015

On Privacy Preserving Partial Image Sharing.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

PinPlace: associate semantic meanings with indoor locations without active fingerprinting.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

Protecting Your Children from Inappropriate Content in Mobile Apps: An Automatic Maturity Rating Framework.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

Private Analysis of Infinite Data Streams via Retroactive Grouping.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

Albatross: A Privacy-Preserving Location Sharing System.
Proceedings of the 10th ACM Symposium on Information, 2015

AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Defending against user identity linkage attack across multiple online social networks.
Proceedings of the 23rd International World Wide Web Conference, 2014

Privacy Concerns in Online Recommender Systems: Influences of Control and User Data Input.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

User Comment Analysis for Android apps and CSPI Detection with Comment Expansion.
Proceedings of the Proceeding of the 1st International Workshop on Privacy-Preserving IR: When Information Retrieval Meets Privacy and Security co-located with 37th Annual International ACM SIGIR conference, 2014

Location sharing privacy preference: analysis and personalized recommendation.
Proceedings of the 19th International Conference on Intelligent User Interfaces, 2014

Privacy-Preserving Personalized Recommendation: An Instance-Based Approach via Differential Privacy.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

Connect the dots by understanding user status and transitions.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Controllable Information Sharing for User Accounts Linkage across Multiple Online Social Networks.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

2013
Dimensionality of information disclosure behavior.
Int. J. Hum. Comput. Stud., 2013

Private proximity testing with an untrusted server.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Differential data analysis for recommender systems.
Proceedings of the Seventh ACM Conference on Recommender Systems, 2013

Recommendations-based location privacy control.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Counteracting the Negative Effect of Form Auto-completion on the Privacy Calculus.
Proceedings of the International Conference on Information Systems, 2013

Track D: Cyber-security ecosystem.
Proceedings of the 7th IEEE International Conference on Digital Ecosystems and Technologies, 2013

Preference-based location sharing: are more privacy options really better?
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
Community discovery and profiling with social messages.
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012

An analytical solution for consent management in patient privacy preservation.
Proceedings of the ACM International Health Informatics Symposium, 2012

User activity profiling with multi-layer analysis.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Content Recommendation for Attention Management in Unified Social Messaging.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
Social Analytics for Personalization in Work Environments.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011

Piracy Protection for Streaming Content in Home Networks.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Data leakage mitigation for discretionary access control in collaboration clouds.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Efficient traitor tracing for clone attack in content protection.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Decision Support for Patient Consent Management.
Proceedings of the 2011 IEEE International Conference on Healthcare Informatics, 2011

Quantified risk-adaptive access control for patient privacy protection in health information systems.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Content usage tracking in superdistribution.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Defending against the pirate evolution attack.
Int. J. Appl. Cryptogr., 2010

A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

SCOTT: set cover tracing technology.
Proceedings of the 18th International Conference on Multimedia 2010, 2010

Collaboration analytics: mining work patterns from collaboration activities.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

Exploring online social activities for adaptive search personalization.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

2009
Efficient Forensic Analysis for Anonymous Attack in Secure Content Distribution.
Int. J. Digit. Crime Forensics, 2009

Efficient Traitor Tracing for Content Protection.
Proceedings of the SECRYPT 2009, 2009

Broadcast Encryption for Differently Privileged.
Proceedings of the Emerging Challenges for Security, 2009

Practical tracing traitors.
Proceedings of the Media Forensics and Security I, 2009

Traitor Tracing without A Priori Bound on the Coalition Size.
Proceedings of the Information Security, 12th International Conference, 2009

Defending against the Pirate Evolution Attack.
Proceedings of the Information Security Practice and Experience, 2009

Can i play the movie i (or you) bought? new trends in DRM.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging.
Proceedings of the Computer Security, 2009

Selective message distribution with people-tagging in user-collaborative environments.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

Unifying Broadcast Encryption and Traitor Tracing for Content Protection.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Enabling secure digital marketplace.
Proceedings of the 17th International Conference on World Wide Web, 2008

Traitor Tracing for Anonymous Attack in Content Protection.
Proceedings of the SECRYPT 2008, 2008

Efficient Coalition Detection in Traitor Tracing.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Generalized traitor tracing for nested codes.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Adaptive traitor tracing for large anonymous attack.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008

Automatic Categorization of Tags in Collaborative Environments.
Proceedings of the Collaborative Computing: Networking, 2008

2007
Combinatorial Properties for Traceability Codes Using Error Correcting Codes.
IEEE Trans. Inf. Theory, 2007

The Application of Neuro-Fuzzy Decision Tree in Optimal Selection of Teconological Innovation Projects.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A Closer Look at Broadcast Encryption and Traitor Tracing for Content Protection.
Proceedings of the SECRYPT 2007, 2007

The Application of Neuro-FDT in Urban Short-Term Traffic Flow Prediction.
Proceedings of the Third International Conference on Natural Computation, 2007

Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack.
Proceedings of the Computer Security, 2007

A technique for self-certifying tamper resistant software.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

Bayesian Methods for Practical Traitor Tracing.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

Adaptive Traitor Tracing with Bayesian Networks.
Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, 2007

2006
Higher Dependability and Security for Mobile Applications.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

Traitor Tracing for Subscription-Based Systems.
Proceedings of the SECRYPT 2006, 2006

Privacy, traceability, and anonymity for content protection.
Proceedings of the 2006 International Conference on Privacy, 2006

Practical Forensic Analysis in Advanced Access Content System.
Proceedings of the Information Security Practice and Experience, 2006

Hybrid Traitor Tracing.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

2005
Towards Better Software Tamper Resistance.
Proceedings of the Information Security, 8th International Conference, 2005

Self-validating Branch-Based Software Watermarking.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Attacks and Forensic Analysis for Multimedia Content Protection.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Flexible Traitor Tracing for Anonymous Attacks.
Proceedings of the Communications and Multimedia Security, 2005

2004
Traitor tracing for prerecorded and recordable media.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004

2003
Software Tamper Resistance Using Program Certificates.
Proceedings of the Computer Safety, 2003

Proactive Software Tampering Detection.
Proceedings of the Information Security, 6th International Conference, 2003

Forensic Analysis for Tamper Resistant Software.
Proceedings of the 14th International Symposium on Software Reliability Engineering (ISSRE 2003), 2003

2001
An Approach to Higher Reliability Using Software Components.
Proceedings of the 12th International Symposium on Software Reliability Engineering (ISSRE 2001), 2001

1999
Run-time Result Certification for Distributed Computations.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999


  Loading...