Shiwei Chen

Orcid: 0000-0002-3149-7430

According to our database1, Shiwei Chen authored at least 19 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing Multi-Label Classification via Dynamic Label-Order Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Multi-Agent Trajectory Prediction With Spatio-Temporal Sequence Fusion.
IEEE Trans. Multim., 2023

An Optimization Model for the Demand-Responsive Transit With Non-Fixed Stops and Multi-Vehicle Type.
IEEE Access, 2023

Target-to-Source Augmentation for Aspect Sentiment Triplet Extraction.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

An Empirical Study of Sentiment-Enhanced Pre-Training for Aspect-Based Sentiment Analysis.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

2022
Boundary-Driven Table-Filling for Aspect Sentiment Triplet Extraction.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

2021
Construction of higher-level MDS matrices in nested SPNs.
Inf. Sci., 2021

Security Analysis of Even-Mansour Structure Hash Functions.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
Sentiment Analysis About Investors and Consumers in Energy Market Based on BERT-BiLSTM.
IEEE Access, 2020

Zero-Shot Image Classification via Consistent Subspace Learning.
Proceedings of the CNIOT 2020: 2020 International Conference on Computing, 2020

2019
Classification of EEG-based single-trial motor imagery tasks using a B-CSP method for BCI.
Frontiers Inf. Technol. Electron. Eng., 2019

A Structural Attack on Type-I Generalized Feistel Networks.
IEEE Access, 2019

2018
Preimage Attacks on Some Hashing Modes Instantiating Reduced-Round LBlock.
IEEE Access, 2018

Machine Learning based Construction simulation and Optimization.
Proceedings of the 2018 Winter Simulation Conference, 2018

2015
A second preimage attack on zipper hash.
Secur. Commun. Networks, 2015

An Improved Way to Construct the Parity-check Equations in Fast Correlation Attacks.
J. Networks, 2015

Optimally maintaining a multi-state system with limited imperfect preventive repairs.
Int. J. Syst. Sci., 2015

2009
A Second Preimage Attack on the Merkle-Damgard Scheme with a Permutation for Hash Functions.
Proceedings of the SECRYPT 2009, 2009

2007
An Improved Collision Attack on MD5 Algorithm.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007


  Loading...