Jie Shi

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
Multimodal deep learning for art behavior analysis and personalized teaching path generation.
Discov. Artif. Intell., December, 2025

PHFS: Progressive Hierarchical Feature Selection Based on Adaptive Sample Weighting.
IEEE Trans. Neural Networks Learn. Syst., August, 2025

Trans-XFed: An Explainable Federated Learning for Supply Chain Credit Assessment.
CoRR, August, 2025

Mind the Generation Process: Fine-Grained Confidence Estimation During LLM Generation.
CoRR, August, 2025

Enhanced Prediction of CAR T-Cell Cytotoxicity with Quantum-Kernel Methods.
CoRR, July, 2025

Analysis of the potential and charm of LED new energy in stage design.
Serv. Oriented Comput. Appl., June, 2025

PBCAT: Patch-based composite adversarial training against physically realizable attacks on object detection.
CoRR, June, 2025

Intra-Modality Self-Enhancement Mirror Network for RGB-T Salient Object Detection.
IEEE Trans. Circuits Syst. Video Technol., March, 2025

ACE: Concept Editing in Diffusion Models without Performance Degradation.
CoRR, March, 2025

Integrating Weather Station Data and Radar for Precipitation Nowcasting: SmaAt-fUsion and SmaAt-Krige-GNet.
CoRR, February, 2025

RMR: A Relative Membership Risk Measure for Machine Learning Models.
IEEE Trans. Dependable Secur. Comput., 2025

Alert Summarization for Online Service Systems by Validating Propagation Paths of Faults.
Proc. ACM Softw. Eng., 2025

RAICL-DSC: Retrieval-Augmented In-Context Learning for Dialogue State Correction.
Knowl. Based Syst., 2025

BAST-Mamba: Binaural Audio Spectrogram Mamba Transformer for binaural sound localization.
Neurocomputing, 2025

TransCORALNet: A two-stream transformer CORAL networks for supply chain credit assessment cold start.
Expert Syst. Appl., 2025

ADBM: Adversarial Diffusion Bridge Model for Reliable Adversarial Purification.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025

AlphaEdit: Null-Space Constrained Knowledge Editing for Language Models.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025

EPAS: Efficient Online Log Parsing via Asynchronous Scheduling of LLM Queries.
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025

VOCE: A Virtual On-Call Engineer for Automated Alert Incident Analysis Using a Large Language Model.
Proceedings of the Fundamental Approaches to Software Engineering, 2025

Gen-SQL: Efficient Text-to-SQL By Bridging Natural Language Question And Database Schema With Pseudo-Schema.
Proceedings of the 31st International Conference on Computational Linguistics, 2025

Multi-Turn Jailbreaking Large Language Models via Attention Shifting.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
Computational Aids on Mental Health: Revolutionizing Care in the Digital Age.
IEEE Trans. Comput. Soc. Syst., October, 2024

Intuitionistic Fuzzy Sequential Three-Way Decision Model in Incomplete Information Systems.
Symmetry, September, 2024

Oceanic Mesoscale Eddy Fitting Using Legendre Polynomial Surface Fitting Model Based on Along-Track Sea Level Anomaly Data.
Remote. Sens., August, 2024

Weighted Guided Optional Fusion Network for RGB-T Salient Object Detection.
ACM Trans. Multim. Comput. Commun. Appl., May, 2024

GA-SmaAt-GNet: Generative adversarial small attention GNet for extreme precipitation nowcasting.
Knowl. Based Syst., 2024

DMTFS-FO: Dynamic multi-task feature selection based on flexible loss and orthogonal constraint.
Expert Syst. Appl., 2024

ECS-SC: Long-tailed classification via data augmentation based on easily confused sample selection and combination.
Expert Syst. Appl., 2024

Perfect Gradient Inversion in Federated Learning: A New Paradigm from the Hidden Subset Sum Problem.
CoRR, 2024

ADBM: Adversarial diffusion bridge model for reliable adversarial purification.
CoRR, 2024

Mitigating Hallucinations in Large Language Models via Self-Refinement-Enhanced Knowledge Retrieval.
CoRR, 2024

Enhancing Confidence Expression in Large Language Models Through Learning from Past Experience.
CoRR, 2024

Large Language Model Can Continue Evolving From Mistakes.
CoRR, 2024

Higher-order multi-scale computational approach and its convergence for nonlocal gradient elasticity problems of composite materials.
Comput. Math. Appl., 2024

Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based Approach.
Proceedings of the 33rd USENIX Security Symposium, 2024

SPMIS: An Investigation of Synthetic Spoken Misinformation Detection.
Proceedings of the IEEE Spoken Language Technology Workshop, 2024

ConformalRefiner: Retinal Vessel Topology Reconstruction via Conformal Risk Control.
Proceedings of the Rough Sets - International Joint Conference, 2024

Towards Neuron Attributions in Multi-Modal Large Language Models.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

TeDA: A Testing Framework for Data Usage Auditing in Deep Learning Model Development.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

VoiceDefense: Protecting Automatic Speaker Verification Models Against Black-box Adversarial Attacks.
Proceedings of the 25th Annual Conference of the International Speech Communication Association, 2024

High-precision Online Log Parsing with Large Language Models.
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, 2024

DDA-NG: Fusing Non-negative Matrix Factorization and Graph Tranformer to Enhance Potential Dmg-Disease Associations.
Proceedings of the 5th International Conference on Computer Engineering and Intelligent Control, 2024

ADVSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification.
Proceedings of the IEEE International Conference on Acoustics, 2024

Small Language Model Can Self-Correct.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Novel Wideband Millimeter-Wave GaN Power Amplifier Design Using Transistors With Large Drain Capacitance and High Optimum Load Impedance.
IEEE Trans. Circuits Syst. II Express Briefs, December, 2023

Design of a Highly Efficient Class-F GaN MMIC Power Amplifier Using a Multi-Function Bias Network and a Harmonic-Isolation L-C Resonator.
IEEE Trans. Circuits Syst. I Regul. Pap., December, 2023

Cigarette Production Line Flow Automatic Control System Based on PLC Technology and Embedded Software.
Scalable Comput. Pract. Exp., November, 2023

FS-MGKC: Feature selection based on structural manifold learning with multi-granularity knowledge coordination.
Inf. Sci., November, 2023

Feature selection via maximizing inter-class independence and minimizing intra-class redundancy for hierarchical classification.
Inf. Sci., May, 2023

Virtual network function deployment algorithm based on graph convolution deep reinforcement learning.
J. Supercomput., April, 2023

PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2023

A Novel Method to Design Steerable Differential Beamformer Using Linear Acoustics Vector Sensor Array.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

DragNUWA: Fine-grained Control in Video Generation by Integrating Text, Image, and Trajectory.
CoRR, 2023

3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

A Multi-UAVs Cooperative Spectrum Sensing Method Based on Improved IDW Algorithm.
Proceedings of the Space Information Networks - 7th International Conference, 2023

ShellGPT: Generative Pre-trained Transformer Model for Shell Language Understanding.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

DoubleDeceiver: Deceiving the Speaker Verification System Protected by Spoofing Countermeasures.
Proceedings of the 24th Annual Conference of the International Speech Communication Association, 2023

Differential Aggregation against General Colluding Attackers.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

A Data Flow Framework with High Throughput and Low Latency for Permissioned Blockchains.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

QUDA: Query-Limited Data-Free Model Extraction.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation.
IEEE Trans. Dependable Secur. Comput., 2022

Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications.
IEEE Trans. Dependable Secur. Comput., 2022

Imaging of Insect Hole in Living Tree Trunk Based on Joint Driven Algorithm of Electromagnetic Inverse Scattering.
Sensors, 2022

Fall Detection for Shipboard Seafarers Based on Optimized BlazePose and LSTM.
Sensors, 2022

Attention based deep neural network for micro-fracture extraction of sequential coal rock CT images.
Multim. Tools Appl., 2022

Adaptive multi-scale feature fusion based U-net for fracture segmentation in coal rock images.
J. Intell. Fuzzy Syst., 2022

DiVAE: Photorealistic Images Synthesis with Denoising Diffusion Decoder.
CoRR, 2022

Causality-based Neural Network Repair.
CoRR, 2022

Repairing Adversarial Texts Through Perturbation.
Proceedings of the Theoretical Aspects of Software Engineering, 2022

MExMI: Pool-based Active Model Extraction Crossover Membership Inference.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

TransPatch: A Transformer-based Generator for Accelerating Transferable Patch Generation in Adversarial Attacks Against Object Detection Models.
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022

A software-defined security middle platform architecture.
Proceedings of the 5th International Conference on Computer Science and Software Engineering, 2022

2021
Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack.
CoRR, 2021

A-FMI: Learning Attributions from Deep Networks via Feature Map Importance.
CoRR, 2021

Game-theoretic Understanding of Adversarially Learned Features.
CoRR, 2021

DAFAR: Defending against Adversaries by Feedback-Autoencoder Reconstruction.
CoRR, 2021

Rethinking Natural Adversarial Examples for Classification Models.
CoRR, 2021

Towards a Unified Game-Theoretic View of Adversarial Perturbations and Robustness.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Backdoor Pre-trained Models Can Transfer to All.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Towards Demystifying Adversarial Robustness of Binarized Neural Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
A Multiscale Recognition Method for the Optimization of Traffic Signs Using GMM and Category Quality Focal Loss.
Sensors, 2020

A simulated annealing approach for resolution guided homogeneous cryo-electron microscopy image selection.
Quant. Biol., 2020

Rotation invariant angle-density based features for an ice image classification system.
Expert Syst. Appl., 2020

Tourism demonstration system for large-scale museums based on 3D virtual simulation technology.
Electron. Libr., 2020

Sparse representation based direction-of-arrival estimation using circular acoustic vector sensor arrays.
Digit. Signal Process., 2020

Rotation-Equivariant Neural Networks for Privacy Protection.
CoRR, 2020

Deep Quaternion Features for Privacy Protection.
CoRR, 2020

Bident Structure for Neural Network Model Protection.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Where Does the Robustness Come from?: A Study of the Transformation-based Ensemble Defence.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020

2019
MCTE: Minimizes Task Completion Time and Execution Cost to Optimize Scheduling Performance for Smart Grid Cloud.
IEEE Access, 2019

BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks.
Proceedings of the Computer Security - ESORICS 2019, 2019

An Evaluation Strategy of Energy Storage Construction for Industrial Users Based on K-Means Clustering Algorithm.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

A New Task Scheduling for Minimizing Completion Time and Execution Cost in Smart Grid Cloud.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

2018
A Novel Data Aggregation Preprocessing Algorithm in Flash Memory for Iot Based Power Grid Storage System.
IEEE Access, 2018

Biological Features De-identification in Iris Images.
Proceedings of the 15th International Symposium on Pervasive Systems, 2018

Fourier Transform based Features for Clean and Polluted Water Image Classification.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

A (k, n) Visual Cryptography Based on Shamir's Secret Sharing.
Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing, 2018

2017
Sound Source Localization Using Non-Conformal Surface Sound Field Transformation Based on Spherical Harmonic Wave Decomposition.
Sensors, 2017

2016
Efficient authorisation update on cloud data.
Int. J. Web Grid Serv., 2016

Extended target tracking filter with intermittent observations.
IET Signal Process., 2016

2015
Constructing plausible innocuous pseudo queries to protect user query intention.
Inf. Sci., 2015

A Reservation Multichannel MAC Protocol Utilize Blind Source Separation.
Proceedings of the Intelligent Robotics and Applications - 8th International Conference, 2015

2014
Hybrid Forecasting Model for Very-Short Term Wind Power Forecasting Based on Grey Relational Analysis and Wind Speed Distribution Features.
IEEE Trans. Smart Grid, 2014

A Multichannel MAC Protocol for Underwater Acoustic Sensor Networks.
Proceedings of the International Conference on Underwater Networks & Systems, Rome, Italy, November 12, 2014

Batch Clone Detection in RFID-enabled supply chain.
Proceedings of the IEEE International Conference on RFID, 2014

Authorized Keyword Search on Encrypted Data.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Visual attention based image zero watermark scheme with ensemble similarity.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013

Attack and defense mechanisms of malicious EPC event injection in EPC discovery service.
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013

Lightweight Management of Authorization Update on Cloud Data.
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013

Analyzing and Controlling Information Inference of Fine-Grained Access Control Policies in Relational Databases.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
A Sensitivity-Enhanced Refractive Index Sensor Using a Single-Mode Thin-Core Fiber Incorporating an Abrupt Taper.
Sensors, 2012

Data transformation and query management in personal health sensor networks.
J. Netw. Comput. Appl., 2012

A secure and efficient discovery service system in EPCglobal network.
Comput. Secur., 2012

SecTTS: A secure track & trace system for RFID-enabled supply chains.
Comput. Ind., 2012

Design and Implementation of a Secure Prototype for EPCglobal Network Services.
Proceedings of the Radio Frequency Identification System Security, 2012

SecDS: a secure EPC discovery service system in EPCglobal network.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Design and FPGA implementation of digital pulse compression for HF chirp radar based on modified orthogonal transformation.
IEICE Electron. Express, 2011

Forecasting power output of photovoltaic system based on weather classification and support vector machine.
Proceedings of the 2011 IEEE Industry Applications Society Annual Meeting, 2011

Serial fingerprint device driver development based on EFI.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Enabling Knowledge Extraction from Low Level Sensor Data.
Proceedings of the Database and Expert Systems Applications, 2011

2010
A fine-grained access control model for relational databases.
J. Zhejiang Univ. Sci. C, 2010

2009
Using Sensor Networks to Measure Intensity in Sporting Activities.
Proceedings of the Quality of Service in Heterogeneous Networks, 2009

An Innovative Variational Level Set Model for Multiphase Image Segmentation.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

On the Soundness Property for SQL Queries of Fine-grained Access Control in DBMSs.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Controlling Information Leakage of Fine-Grained Access Model in DBMSs.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Finding Motifs of Financial Data Streams in Real Time.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008

Dynamic data recovery for database systems based on fine grained transaction log.
Proceedings of the 12th International Database Engineering and Applications Symposium (IDEAS 2008), 2008

Adaptive Power Allocation for Multi-hop OFDM System with Non-regenerative Relaying.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Multi-objective modelling and decision support using a Bayesian network approximation to a non-point source pollution model.
Environ. Model. Softw., 2007

1988
Control of motors by microprocessors for space positioning and localization.
Microprocess. Microprogramming, 1988


  Loading...