Mengyao Xu

Orcid: 0009-0003-4309-1950

According to our database1, Mengyao Xu authored at least 23 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Llama Nemoretriever Colembed: Top-Performing Text-Image Retrieval Model.
CoRR, July, 2025

MIRACL-VISION: A Large, multilingual, visual document retrieval benchmark.
CoRR, May, 2025

A Comprehensive Understanding of the Impact of Data Augmentation on the Transferability of 3D Adversarial Examples.
ACM Trans. Knowl. Discov. Data, February, 2025

IFM: Integrating and fine-tuning adversarial examples of recommendation system under multiple models to enhance their transferability.
Knowl. Based Syst., 2025

Generating Transferable Adversarial Point Clouds via Autoencoders for 3D Object Classification.
IET Comput. Vis., 2025

Crafting Transferable Adversarial Examples Against 3D Object Detection.
IET Comput. Vis., 2025

Control Strategy and Small Signal Stability Analysis of the Direct-Drive Wind Farm Transmitted Through the HC-HVdc System Under No Synchronous Power Support Conditions.
IEEE Access, 2025

Logprobs Know Uncertainty: Fighting LLM Hallucinations.
Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering, 2025

NV-Embed: Improved Techniques for Training LLMs as Generalist Embedding Models.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025

2024
Enhancing Q&A Text Retrieval with Ranking Models: Benchmarking, fine-tuning and deploying Rerankers for RAG.
CoRR, 2024

NV-Retriever: Improving text embedding models with effective hard-negative mining.
CoRR, 2024

2023
Pseudo-events: Tracking mediatization with machine learning over 40 years.
Comput. Hum. Behav., July, 2023

Tracking moral divergence with DDR in presidential debates over 60 years.
J. Comput. Soc. Sci., April, 2023

2022
Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker.
Decis. Anal., 2022

Identifying untrusted interactive behaviour in Enterprise Resource Planning systems based on a big data pattern recognition method using behavioural analytics.
Behav. Inf. Technol., 2022

2020
Analysis of news transmission mode based on fuzzy data classification and neural network simulation.
J. Intell. Fuzzy Syst., 2020

Multi-category Comparative Analysis of Factors Affecting E-commerce Sales.
Proceedings of the 19th Wuhan International Conference on E-Business, 2020

Multi-time Scale Optimal Bidding Strategy for an EV Aggregator in Energy and Regulation Markets.
Proceedings of the 18th IEEE International Conference on Industrial Informatics, 2020

2019
GMM and DRLSE Based Detection and Segmentation of Pests: A Case Study.
Proceedings of the 4th International Conference on Multimedia Systems and Signal Processing, 2019

An Identification Method of Untrusted Interactive Behavior in ERP System Based on Markov Chain.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2019

Comparison of Accuracy Estimation for Weighted k-Nearest Neighbor Classifiers.
Proceedings of the Fuzzy Systems and Data Mining V, 2019

Combining Clustering and SVR for Predicting Passengers of Regional Airports on Limited Sample.
Proceedings of the Fuzzy Systems and Data Mining V, 2019

Analysis and Comparison of Multi-Source Information Fusion Technologies.
Proceedings of the Fuzzy Systems and Data Mining V, 2019


  Loading...