Jialing He

Orcid: 0000-0002-8643-0647

According to our database1, Jialing He authored at least 41 papers between 2017 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
Multi-Task Learning for Short-Term Electric Vehicle Charging Demand Forecasting: Joint Prediction of EV Count and Energy Consumption.
IEEE Trans. Smart Grid, May, 2026

RLAC: Rate-Limiting Anonymous Credential for Low Altitude Intelligent Transportation.
IEEE Trans. Netw. Sci. Eng., 2026

DVA-ACLF: Designated Verifier Asymmetric Anonymous Credential Scheme for Low-Altitude Flight.
IEEE Trans. Netw. Sci. Eng., 2026

Safeguarding ISAC Performance in Low-Altitude Wireless Networks Under Channel Access Attack.
IEEE Trans. Inf. Forensics Secur., 2026

Joint Trajectory and Link Quality Prediction in LAENets via Multi-Task Time-Series Large Models.
IEEE Trans. Cogn. Commun. Netw., 2026

HP2: Hybrid and precision-guided filter pruning for CNN compression.
Inf. Sci., 2026

MegaScale-Data: Scaling DataLoader for Multisource Large Foundation Model Training.
Proceedings of the 21st European Conference on Computer Systems, 2026

2025
Preventing Non-Intrusive Load Monitoring Privacy Invasion: A Precise Adversarial Attack Scheme for Networked Smart Meters.
IEEE Trans. Mob. Comput., December, 2025

Security-Aware Joint Sensing, Communication, and Computing Optimization in Low Altitude Wireless Networks.
CoRR, November, 2025

Safeguarding ISAC Performance in Low-Altitude Wireless Networks Under Channel Access Attack.
CoRR, August, 2025

Efficient Blockchain-based Steganography via Backcalculating Generative Adversarial Network.
CoRR, June, 2025

Disrupting Vision-Language Model-Driven Navigation Services via Adversarial Object Fusion.
CoRR, May, 2025

Maintaining Privacy in Smart Grid: Utilizing the Adversarial Attack Paradigm to Counter Nonintrusive Load Monitoring Models.
IEEE Internet Things J., April, 2025

OVERLORD: Ultimate Scaling of DataLoader for Multi-Source Large Foundation Model Training.
CoRR, April, 2025

MMCE: A Framework for Deep Monotonic Modeling of Multiple Causal Effects.
CoRR, April, 2025

Advancing Non-Intrusive Load Monitoring: Predicting Appliance-Level Power Consumption With Indirect Supervision.
IEEE Trans. Netw. Sci. Eng., 2025

Tackling Data Mining Risks: A Tripartite Covert Channel Merging Blockchain and IPFS.
IEEE Trans. Netw. Sci. Eng., 2025

Semantic and Precise Trigger Inversion: Detecting Backdoored Language Models.
IEEE Trans. Inf. Forensics Secur., 2025

Accurate, Secure, and Efficient Semi-Constrained Navigation Over Encrypted City Maps.
IEEE Trans. Dependable Secur. Comput., 2025

Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability.
Proceedings of the ACM on Web Conference 2025, 2025

Overcoming Data Mining in Blockchain-Based Covert Communication: Transaction Withdrawal and Multisig Embedding.
Proceedings of the 24th IEEE International Conference on Trust, 2025

S-RAG: A Novel Audit Framework for Detecting Unauthorized Use of Personal Data in RAG Systems.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025

2024
Cognitive Tracing Data Trails: Auditing Data Provenance in Discriminative Language Models Using Accumulated Discrepancy Score.
Cogn. Comput., November, 2024

Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics.
IEEE Trans. Knowl. Data Eng., May, 2024

ABDP: Accurate Billing on Differentially Private Data Reporting for Smart Grids.
IEEE Trans. Serv. Comput., 2024

Contrast-Then-Approximate: Analyzing Keyword Leakage of Generative Language Models.
IEEE Trans. Inf. Forensics Secur., 2024

TransTroj: Transferable Backdoor Attacks to Pre-trained Models via Embedding Indistinguishability.
CoRR, 2024

EvilEdit: Backdooring Text-to-Image Diffusion Models in One Second.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

A Generic Blockchain-based Steganography Framework with High Capacity via Reversible GAN.
Proceedings of the IEEE INFOCOM 2024, 2024

2023
InFocus: Amplifying Critical Feature Influence on Non-Intrusive Load Monitoring Through Self-Attention Mechanisms.
IEEE Trans. Smart Grid, September, 2023

S-T CRF: Spatial-Temporal Conditional Random Field for Human Trajectory Prediction.
CoRR, 2023

Contrastive Fusion Representation: Mitigating Adversarial Attacks on VQA Models.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

MSDC: Exploiting Multi-State Power Consumption in Non-intrusive Load Monitoring Based on a Dual-CNN Model.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Video Aficionado: We Know What You Are Watching.
IEEE Trans. Mob. Comput., 2022

Proof of Continuous Work for Reliable Data Storage Over Permissionless Blockchain.
IEEE Internet Things J., 2022

Blockchain Meets Covert Communication: A Survey.
IEEE Commun. Surv. Tutorials, 2022

Practical Blockchain-Based Steganographic Communication Via Adversarial AI: A Case Study In Bitcoin.
Comput. J., 2022

2019
An Efficient and Accurate Nonintrusive Load Monitoring Scheme for Power Consumption.
IEEE Internet Things J., 2019

Provable Data Integrity of Cloud Storage Service With Enhanced Security in the Internet of Things.
IEEE Access, 2019

Non-intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2017
An Efficient Sparse Coding-Based Data-Mining Scheme in Smart Grid.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017


  Loading...