Jie Yu

Affiliations:
  • National University of Defense Technology, College of Computer, Changsha, China


According to our database1, Jie Yu authored at least 61 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SWEA: Changing Factual Knowledge in Large Language Models via Subject Word Embedding Altering.
CoRR, 2024

2023
PMET: Precise Model Editing in a Transformer.
CoRR, 2023

Dynamic Multi-View Fusion Mechanism for Chinese Relation Extraction.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

QAE: A Hard-Label Textual Attack Considering the Comprehensive Quality of Adversarial Examples.
Proceedings of the Natural Language Processing and Chinese Computing, 2023

2022
Textual adversarial attacks by exchanging text-self words.
Int. J. Intell. Syst., December, 2022

S-NER: A Concise and Efficient Span-Based Model for Named Entity Recognition.
Sensors, 2022

A novel bundling learning paradigm for named entity recognition.
Knowl. Based Syst., 2022

Towards an Efficient and Robust Adversarial Attack Against Neural Text Classifier.
Int. J. Pattern Recognit. Artif. Intell., 2022

Span-based joint entity and relation extraction augmented with sequence tagging mechanism.
CoRR, 2022

A Two-Phase Paradigm for Joint Entity-Relation Extraction.
CoRR, 2022

A Context-Aware Approach for Textual Adversarial Attack through Probability Difference Guided Beam Search.
CoRR, 2022

Few-shot Named Entity Recognition with Entity-level Prototypical Network Enhanced by Dispersedly Distributed Prototypes.
CoRR, 2022

Win-Win Cooperation: Bundling Sequence and Span Models for Named Entity Recognition.
CoRR, 2022

Fine-tuning more stable neural text classifiers for defending word level adversarial attacks.
Appl. Intell., 2022

KylinTune: DQN-based Energy-efficient Model for Browser in Mobile Devices.
Proceedings of the IEEE International Performance, 2022

Topic-Grained Text Representation-Based Model for Document Retrieval.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

Few-shot Named Entity Recognition with Entity-level Prototypical Network Enhanced by Dispersedly Distributed Prototypes.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

SummScore: A Comprehensive Evaluation Metric for Summary Quality Based on Cross-Encoder.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

2021
A Multimodal Adversarial Attack Framework Based on Local and Random Search Algorithms.
Int. J. Comput. Intell. Syst., 2021

Boosting Span-based Joint Entity and Relation Extraction via Squence Tagging Mechanism.
CoRR, 2021

Combating Word-level Adversarial Text with Robust Adversarial Training.
Proceedings of the International Joint Conference on Neural Networks, 2021

Span Representation Generation Method in Entity-Relation Joint Extraction.
Proceedings of the Intelligent Computing Theories and Application, 2021

Many-To-Many Chinese ICD-9 Terminology Standardization Based on Neural Networks.
Proceedings of the Intelligent Computing Theories and Application, 2021

A Unified Summarization Model with Semantic Guide and Keyword Coverage Mechanism.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

Hierarchical Encoder-Decoder Summary Model with an Instructor for Long Academic Papers.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2020
Deep Learning Research and Development Platform: Characterizing and Scheduling with QoS Guarantees on GPU Clusters.
IEEE Trans. Parallel Distributed Syst., 2020

Research on Chinese medical named entity recognition based on collaborative cooperation of multiple neural network models.
J. Biomed. Informatics, 2020

Generating More Effective and Imperceptible Adversarial Text Examples for Sentiment Classification.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Span-based Joint Entity and Relation Extraction with Attention-based Span-specific and Contextual Semantic Representations.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

2019
A hybrid approach for named entity recognition in Chinese electronic medical record.
BMC Medical Informatics Decis. Mak., 2019

Multi-classification of Theses to Disciplines Based on Metadata.
Proceedings of the Natural Language Processing and Chinese Computing, 2019

Incremental Learning of GAN for Detecting Multiple Adversarial Attacks.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019: Image Processing, 2019

GENIE: QoS-guided Dynamic Scheduling for CNN-based Tasks on SME Clusters.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

2018
A Novel Misclassification Attack Against Black Box Neural Network Classifiers.
Proceedings of the 14th International Conference on Semantics, Knowledge and Grids, 2018

Multiple CNN-based Tasks Scheduling across Shared GPU Platform in Research and Development Scenarios.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Research on Matrix Multiplication Based WeChat Group Tagging Technology.
Proceedings of the First IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2018

A BiLSTM-CRF Method to Chinese Electronic Medical Record Named Entity Recognition.
Proceedings of the 2018 International Conference on Algorithms, 2018

2017
上下文敏感的控制流完整性保护的改进方法 (Improved Method of Context-sensitive Control Flow Integrity Protection).
计算机科学, 2017

Drug-drug Interaction Extraction via Recurrent Neural Network with Multiple Attention Layers.
CoRR, 2017

An Optimization and Auto-Tuning Method for Scale-Free Graph Algorithms on SIMD Architectures.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

MicRun: A framework for scale-free graph algorithms on SIMD architecture of the Xeon Phi.
Proceedings of the 28th IEEE International Conference on Application-specific Systems, 2017

Drug-Drug Interaction Extraction via Recurrent Neural Network with Multiple Attention Layers.
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017

2016
ERPC: An Edge-Resources Based Framework to Reduce Bandwidth Cost in the Personal Cloud.
Proceedings of the Web-Age Information Management - 17th International Conference, 2016

Improving JavaScript Malware Classifier's Security against Evasion by Particle Swarm Optimization.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

ROP-Hunt: Detecting Return-Oriented Programming Attacks in Applications.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

An Optimized DHT for Linux Package Distribution.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

A novel optimization scheme for caching in locality-aware P2P networks.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Improving DHT Load Balance Using the Churn.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
REPS: 一种高效的容错并行概率流Skyline查询方法 (REPS: An Efficient Fault-tolerant Approach for Parallel Skyline Queries over Probabilistic Data Streams).
计算机科学, 2015

基于混合双层模型的DHT网络路由表快照算法 (Hybrid Method for Capturing Snapshot of Routing Table of DHT Networks).
计算机科学, 2015

2014
An Enhanced Kad Protocol Resistant to Eclipse Attacks.
Proceedings of the 9th IEEE International Conference on Networking, 2014

Routing table status influence of Monitoring Kad.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

2011
Enhancing host security using external environment sensors.
Int. J. Inf. Sec., 2011

Toward an Accurate Snapshot of DHT Networks.
IEEE Commun. Lett., 2011

Monitoring, analyzing and characterizing lookup traffic in a large-scale DHT.
Comput. Commun., 2011

ID Repetition in Structured P2P Networks.
Comput. J., 2011

2010
A Simple Effective Scheme to Enhance the Capability of Web Servers Using P2P Networks.
Proceedings of the 39th International Conference on Parallel Processing, 2010

2009
ID Repetition in Kad.
Proceedings of the Proceedings P2P 2009, 2009

A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks.
Proceedings of the Scalable Information Systems, 4th International ICST Conference, 2009

Active Measurement of Routing Table in Kad.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2007
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks.
Proceedings of the Third International Conference on Networking and Services (ICNS 2007), 2007


  Loading...