Mohan Li

Orcid: 0000-0002-2290-046X

According to our database1, Mohan Li authored at least 72 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
SproutBench: A Benchmark for Safe and Ethical Large Language Models for Youth.
CoRR, August, 2025

Latent Fusion Jailbreak: Blending Harmful and Harmless Representations to Elicit Unsafe LLM Outputs.
CoRR, August, 2025

Conditional Multi-Stage Failure Recovery for Embodied Agents.
CoRR, July, 2025

Towards Robust and Secure Embodied AI: A Survey on Vulnerabilities and Attacks.
CoRR, February, 2025

Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks.
CoRR, January, 2025

A Survey on Federated Learning in Human Sensing.
CoRR, January, 2025

Query-Efficient Model Inversion Attacks: An Information Flow View.
IEEE Trans. Inf. Forensics Secur., 2025

Invisible trigger image: A dynamic neural backdoor attack based on hidden feature.
Neurocomputing, 2025

A 16.4pJ/bit Fully Integrated IR-UWB Transmitter with PSK+PPM Modulation and On-Chip Antenna.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2025

Mitigating Hallucinations in Large Vision-Language Models by Adaptively Constraining Information Flow.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
Security analysis of a reversible data hiding scheme in encrypted images by redundant space transfer.
J. King Saud Univ. Comput. Inf. Sci., January, 2024

An Access Control Method Against Unauthorized and Noncompliant Behaviors of Real-Time Data in Industrial IoT.
IEEE Internet Things J., January, 2024

DiaLoc: An Iterative Approach to Embodied Dialog Localization.
CoRR, 2024

Reversible data hiding in encrypted image with secure multi-party for telemedicine applications.
Biomed. Signal Process. Control., 2024

WHISMA: A Speech-LLM to Perform Zero-Shot Spoken Language Understanding.
Proceedings of the IEEE Spoken Language Technology Workshop, 2024

LT-Defense: Searching-free Backdoor Defense via Exploiting the Long-tailed Effect.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

Prompting Whisper for QA-driven Zero-shot End-to-end Spoken Language Understanding.
Proceedings of the 25th Annual Conference of the International Speech Communication Association, 2024

Multi-Frequency Federated Learning for Human Activity Recognition Using Head-Worn Sensors.
Proceedings of the International Conference on Intelligent Environments, 2024

Smart Grid Attack Region Partitioning Strategy Based on Node Importance.
Proceedings of the 9th IEEE International Conference on Data Science in Cyberspace, 2024

DiaLoc: An Iterative Approach to Embodied Dialog Localization.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Watch Your Words: Successfully Jailbreak LLM by Mitigating the "Prompt Malice".
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024

2023
Digital Twin-Based Cyber Range for Industrial Internet of Things.
IEEE Consumer Electron. Mag., November, 2023

SAT: sampling acceleration tree for adaptive database repartition.
World Wide Web (WWW), September, 2023

Neighborhood Matching Entity Alignment Model for Vulnerability Knowledge Graphs.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Hierarchical Name-based Routing for Content Provider Mobility in ICN.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Domain Adaptive Self-supervised Training of Automatic Speech Recognition.
Proceedings of the 24th Annual Conference of the International Speech Communication Association, 2023

Cumulative Attention Based Streaming Transformer ASR with Internal Language Model Joint Training and Rescoring.
Proceedings of the IEEE International Conference on Acoustics, 2023

Towards a Unified End-to-End Language Understanding System for Speech and Text Inputs.
Proceedings of the IEEE Automatic Speech Recognition and Understanding Workshop, 2023

Entity Alignment Based on Multi-view Interaction Model in Vulnerability Knowledge Graphs.
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023

2022
Robust Truth Discovery Against Multi-round Data Poisoning Attacks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Non-Autoregressive End-to-End Approaches for Joint Automatic Speech Recognition and Spoken Language Understanding.
Proceedings of the IEEE Spoken Language Technology Workshop, 2022

Multi-round Data Poisoning Attack and Defense against Truth Discovery in Crowdsensing Systems.
Proceedings of the 23rd IEEE International Conference on Mobile Data Management, 2022

Self-regularised Minimum Latency Training for Streaming Transformer-based Speech Recognition.
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022

Multiple-hypothesis RNN-T Loss for Unsupervised Fine-tuning and Self-training of Neural Transducer.
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022

Transformer-Based Streaming ASR with Cumulative Attention.
Proceedings of the IEEE International Conference on Acoustics, 2022

A Survey on Knowledge Graph Embedding.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A Survey on Data Poisoning Attacks and Defenses.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
Spatiotemporal Data Cleaning and Knowledge Fusion.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Honeypot Identification in Softwarized Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021

Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets.
Mob. Networks Appl., 2021

An Investigation into the Multi-channel Time Domain Speaker Extraction Network.
Proceedings of the IEEE Spoken Language Technology Workshop, 2021

Transformer-Based Online Speech Recognition with Decoder-end Adaptive Computation Steps.
Proceedings of the IEEE Spoken Language Technology Workshop, 2021

Head-Synchronous Decoding for Transformer-Based Streaming ASR.
Proceedings of the IEEE International Conference on Acoustics, 2021

A Review of Entity Alignment based on Graph Convolutional Neural Network.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

A Survey on Translating Embedding based Entity Alignment in Knowledge Graphs.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Improving HS-DACS Based Streaming Transformer ASR with Deep Reinforcement Learning.
Proceedings of the IEEE Automatic Speech Recognition and Understanding Workshop, 2021

2020
Automated Attack and Defense Framework toward 5G Security.
IEEE Netw., 2020

Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems.
IEEE Internet Things J., 2020

Knowledge Fusion and Spatiotemporal Data Cleaning: A Review.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

2019
Block-DEF: A secure digital evidence framework using blockchain.
Inf. Sci., 2019

Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers.
CoRR, 2019

Lightweight Anonymous Geometric Routing for Internet of Things.
IEEE Access, 2019

A General Framework for Adjustable Neighbor Discovery in Wireless Sensor Networks.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Framewise Supervised Training Towards End-to-End Speech Recognition Models: First Results.
Proceedings of the 20th Annual Conference of the International Speech Communication Association, 2019

Automatic Discovery Mechanism of Blockchain Nodes Based on the Kademlia Algorithm.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Review of the Factorization Problem of Large Integers.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Research on Content Extraction of Rich Text Web Pages.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Distributed Cryptanalysis Framework Based on Mobile Phones.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Bitcoin Network Size Estimation Based on Coupon Collection Model.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Implementation of MD5 Collision Attack in Program.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Network Protocol Analysis Base on WeChat PC Version.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Comparison of Machine Learning Algorithms for Detecting XSS Attacks.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Research on SQL Injection and Defense Technology.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

End-to-end Speech Recognition with Adaptive Computation Steps.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
Answering the Min-Cost Quality-Aware Query on Multi-Sources in Sensor-Cloud Systems.
Sensors, 2018

Currency Preserving Query: Selecting the Newest Values from Multiple Tables.
IEICE Trans. Inf. Syst., 2018

Uncertain Rule Based Method for Determining Data Currency.
IEICE Trans. Inf. Syst., 2018

Greedy Embedding Strategy for Dynamic Graphs Based on Spanning Tree.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Quality-Aware Query Based on Relative Source Quality.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Information Privacy of Cyber Transportation System: Opportunities and Challenges.
Proceedings of the 6th Annual Conference on Research in Information Technology, 2017

2016
A minimized-rule based approach for improving data currency.
J. Comb. Optim., 2016

2010
Efficient Duplicate Record Detection Based on Similarity Estimation.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010


  Loading...