Jialing He
Orcid: 0000-0002-8643-0647
According to our database1,
Jialing He authored at least 41 papers
between 2017 and 2026.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2026
Multi-Task Learning for Short-Term Electric Vehicle Charging Demand Forecasting: Joint Prediction of EV Count and Energy Consumption.
IEEE Trans. Smart Grid, May, 2026
RLAC: Rate-Limiting Anonymous Credential for Low Altitude Intelligent Transportation.
IEEE Trans. Netw. Sci. Eng., 2026
DVA-ACLF: Designated Verifier Asymmetric Anonymous Credential Scheme for Low-Altitude Flight.
IEEE Trans. Netw. Sci. Eng., 2026
Safeguarding ISAC Performance in Low-Altitude Wireless Networks Under Channel Access Attack.
IEEE Trans. Inf. Forensics Secur., 2026
Joint Trajectory and Link Quality Prediction in LAENets via Multi-Task Time-Series Large Models.
IEEE Trans. Cogn. Commun. Netw., 2026
Proceedings of the 21st European Conference on Computer Systems, 2026
2025
Preventing Non-Intrusive Load Monitoring Privacy Invasion: A Precise Adversarial Attack Scheme for Networked Smart Meters.
IEEE Trans. Mob. Comput., December, 2025
Security-Aware Joint Sensing, Communication, and Computing Optimization in Low Altitude Wireless Networks.
CoRR, November, 2025
Safeguarding ISAC Performance in Low-Altitude Wireless Networks Under Channel Access Attack.
CoRR, August, 2025
Efficient Blockchain-based Steganography via Backcalculating Generative Adversarial Network.
CoRR, June, 2025
Disrupting Vision-Language Model-Driven Navigation Services via Adversarial Object Fusion.
CoRR, May, 2025
Maintaining Privacy in Smart Grid: Utilizing the Adversarial Attack Paradigm to Counter Nonintrusive Load Monitoring Models.
IEEE Internet Things J., April, 2025
OVERLORD: Ultimate Scaling of DataLoader for Multi-Source Large Foundation Model Training.
CoRR, April, 2025
CoRR, April, 2025
Advancing Non-Intrusive Load Monitoring: Predicting Appliance-Level Power Consumption With Indirect Supervision.
IEEE Trans. Netw. Sci. Eng., 2025
IEEE Trans. Netw. Sci. Eng., 2025
IEEE Trans. Inf. Forensics Secur., 2025
Accurate, Secure, and Efficient Semi-Constrained Navigation Over Encrypted City Maps.
IEEE Trans. Dependable Secur. Comput., 2025
Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability.
Proceedings of the ACM on Web Conference 2025, 2025
Overcoming Data Mining in Blockchain-Based Covert Communication: Transaction Withdrawal and Multisig Embedding.
Proceedings of the 24th IEEE International Conference on Trust, 2025
S-RAG: A Novel Audit Framework for Detecting Unauthorized Use of Personal Data in RAG Systems.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025
2024
Cognitive Tracing Data Trails: Auditing Data Provenance in Discriminative Language Models Using Accumulated Discrepancy Score.
Cogn. Comput., November, 2024
IEEE Trans. Knowl. Data Eng., May, 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Inf. Forensics Secur., 2024
TransTroj: Transferable Backdoor Attacks to Pre-trained Models via Embedding Indistinguishability.
CoRR, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
A Generic Blockchain-based Steganography Framework with High Capacity via Reversible GAN.
Proceedings of the IEEE INFOCOM 2024, 2024
2023
InFocus: Amplifying Critical Feature Influence on Non-Intrusive Load Monitoring Through Self-Attention Mechanisms.
IEEE Trans. Smart Grid, September, 2023
CoRR, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
MSDC: Exploiting Multi-State Power Consumption in Non-intrusive Load Monitoring Based on a Dual-CNN Model.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
IEEE Internet Things J., 2022
Practical Blockchain-Based Steganographic Communication Via Adversarial AI: A Case Study In Bitcoin.
Comput. J., 2022
2019
IEEE Internet Things J., 2019
Provable Data Integrity of Cloud Storage Service With Enhanced Security in the Internet of Things.
IEEE Access, 2019
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2017
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017