Shiyu Li

Orcid: 0009-0006-9440-711X

According to our database1, Shiyu Li authored at least 68 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
NDRec: A Near-Data Processing System for Training Large-Scale Recommendation Models.
IEEE Trans. Computers, May, 2024

Blockchain-Based Portable Authenticated Data Transmission for Mobile Edge Computing: A Universally Composable Secure Solution.
IEEE Trans. Computers, April, 2024

Hardening Password-Based Credential Databases.
IEEE Trans. Inf. Forensics Secur., 2024

ASDF: Assembly State Detection Utilizing Late Fusion by Integrating 6D Pose Estimation.
CoRR, 2024

Nurse-in-the-Loop Artificial Intelligence for Precision Management of Type 2 Diabetes in a Clinical Trial Utilizing Transfer-Learned Predictive Digital Twin.
CoRR, 2024

GBOT: Graph-Based 3D Object Tracking for Augmented Reality-Assisted Assembly Guidance.
Proceedings of the IEEE Conference Virtual Reality and 3D User Interfaces, 2024

2023
Infrared image enhancement algorithm based on detail enhancement guided image filtering.
Vis. Comput., December, 2023

HealthFort: A Cloud-Based eHealth System With Conditional Forward Transparency and Secure Provenance via Blockchain.
IEEE Trans. Mob. Comput., November, 2023

EMS-i: An Efficient Memory System Design with Specialized Caching Mechanism for Recommendation Inference.
ACM Trans. Embed. Comput. Syst., October, 2023

Edge-Cloud-Assisted Certificate Revocation Checking: An Efficient Solution Against Irresponsible Service Providers.
IEEE Internet Things J., September, 2023

Development of a Fast Convergence Gray-Level Co-Occurrence Matrix for Sea Surface Wind Direction Extraction from Marine Radar Images.
Remote. Sens., April, 2023

DyNNamic: Dynamically Reshaping, High Data-Reuse Accelerator for Compact DNNs.
IEEE Trans. Computers, March, 2023

There Is Always a Way Out! Destruction-Resistant Key Management: Formal Definition and Practical Instantiation.
IACR Cryptol. ePrint Arch., 2023

Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics.
IACR Cryptol. ePrint Arch., 2023

Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery.
IACR Cryptol. ePrint Arch., 2023

In-Storage Acceleration of Graph-Traversal-Based Approximate Nearest Neighbor Search.
CoRR, 2023

SiDA: Sparsity-Inspired Data-Aware Serving for Efficient and Scalable Large Mixture-of-Experts Models.
CoRR, 2023

Block-Wise Mixed-Precision Quantization: Enabling High Efficiency for Practical ReRAM-based DNN Accelerators.
CoRR, 2023

USCoCa: A Subcarrier Frequency Continuous Calibration Method for Backscattered Concurrent Data Mode in UHF RFID System.
Proceedings of the IEEE International Conference on RFID, 2023

Privacy-Driven Fine-Grained Data Trading.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

Si-Kintsugi: Towards Recovering Golden-Like Performance of Defective Many-Core Spatial Architectures for AI.
Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture, 2023

PANDA: Architecture-Level Power Evaluation by Unifying Analytical and Machine Learning Solutions.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

INCA: Input-stationary Dataflow at Outside-the-box Thinking about Deep Learning Accelerators.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2023

Accelerating Sparse Attention with a Reconfigurable Non-volatile Processing-In-Memory Architecture.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

DeSTSeg: Segmentation Guided Denoising Student-Teacher for Anomaly Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Improving the Robustness and Efficiency of PIM-Based Architecture by SW/HW Co-Design.
Proceedings of the 28th Asia and South Pacific Design Automation Conference, 2023

An Effective Reversible Data Hiding Scheme Used in Compressible Encryption Which Can Prevent Loss.
Proceedings of the 2nd International Conference on Algorithms, 2023

2022
Processing-in-Memory Technology for Machine Learning: From Basic to ASIC.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

Research on multiple jellyfish classification and detection based on deep learning.
Multim. Tools Appl., 2022

Joint decision-making model of preventive maintenance and delayed monitoring SPC based on imperialist competitive algorithm.
J. Intell. Fuzzy Syst., 2022

Stability Analysis of DC Microgrid based on Passivity-based Stability Criterion.
Proceedings of the 31st IEEE International Symposium on Industrial Electronics, 2022

Cascading structured pruning: enabling high data reuse for sparse DNN accelerators.
Proceedings of the ISCA '22: The 49th Annual International Symposium on Computer Architecture, New York, New York, USA, June 18, 2022

DEEP: Developing Extremely Efficient Runtime On-Chip Power Meters.
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022

Badge: Blockchain-Assisted Secure Authenticated Data Transmission in Mobile Edge Computing.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Cryptoanalysis of an Authenticated Data Structure Scheme With Public Privacy-Preserving Auditing.
IEEE Trans. Inf. Forensics Secur., 2021

Real-Time Jellyfish Classification and Detection Based on Improved YOLOv3 Algorithm.
Sensors, 2021

Neural Image Beauty Predictor Based on Bradley-Terry Model.
CoRR, 2021

ESCALATE: Boosting the Efficiency of Sparse CNN Accelerator with Kernel Decomposition.
Proceedings of the MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021

BESURE: Blockchain-Based Cloud-Assisted eHealth System with Secure Data Provenance.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Clustering-Based Reinforcement Learning Routing Protocol with Low Complexity for Underwater Acoustic Sensor Networks.
Proceedings of the 10th IEEE/CIC International Conference on Communications in China, 2021

NASGEM: Neural Architecture Search via Graph Embedding Method.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Anti-steganalysis for image on convolutional neural networks.
Multim. Tools Appl., 2020

NASGEM: Neural Architecture Search via Graph Embedding Method.
CoRR, 2020

Orientation-independent Feature Matching (OIFM) for Multimodal Retinal Image Registration.
Biomed. Signal Process. Control., 2020

Optical Micro-scanning Reconstruction Technique for a Thermal Microscope Imaging System.
Proceedings of 2020 International Conference on Medical Imaging and Computer-Aided Diagnosis, 2020

Research on Association Analysis Technology of Network Attack Trace Based on Web Log.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

PENNI: Pruned Kernel Sharing for Efficient CNN Inference.
Proceedings of the 37th International Conference on Machine Learning, 2020

End-to-End Thorough Body Perception for Person Search.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Faster and transferable deep learning steganalysis on GPU.
J. Real Time Image Process., 2019

A Hybrid of Differential Evolution and Genetic Algorithm for the Multiple Geographical Feature Label Placement Problem.
ISPRS Int. J. Geo Inf., 2019

SwiftNet: Using Graph Propagation as Meta-knowledge to Search Highly Representative Neural Architectures.
CoRR, 2019

Bifurcation analysis of a two-species diffusive model.
Appl. Math. Lett., 2019

A Recognition Method of Urine Cast Based On Deep Learning.
Proceedings of the International Conference on Systems, Signals and Image Processing, 2019

Towards Decentralized Deep Learning with Differential Privacy.
Proceedings of the Cloud Computing - CLOUD 2019, 2019

2018
LEASGD: an Efficient and Privacy-Preserving Decentralized Algorithm for Distributed Learning.
CoRR, 2018

Attack on Deep Steganalysis Neural Networks.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
人工智能在神经医学中的应用综述 (Application Survey of Artificial Intelligence in Neurology).
计算机科学, 2017

Efficient Path Finding Method Based Evaluation Function in Large Scene Online Games and Its Application.
J. Inf. Hiding Multim. Signal Process., 2017

An effective heuristic for project scheduling with resource availability cost.
Eur. J. Oper. Res., 2017

Mathematical Model of Cellular Automata in Urban Taxi Network - Take GanZhou as an Example.
Proceedings of the Computational Intelligence and Intelligent Systems, 2017

2016
Tunable silicon micro-ring laser for coherent optical communication.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2016

2015
The distribution of gaps between summands in generalized Zeckendorf decompositions.
J. Comb. Theory, Ser. A, 2015

Watershed-Scale Phosphorus Balance Evaluation Using a Mass Balance Method.
Proceedings of the Geo-Informatics in Resource Management and Sustainable Ecosystem, 2015

2013
On the Residue Classes of π(n) Modulo t.
Integers, 2013

2008
Compression of Human Motion Animation Using the Reduction of Interjoint Correlation.
EURASIP J. Image Video Process., 2008

2007
Watermarking for Progressive Human Motion Animation.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2005
Embedded Key-Frame Extraction for CG Animation by Frame Decimation.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Kinematics based motion compression for human figure animation.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005


  Loading...