Teng Hu

Orcid: 0009-0008-1247-5931

According to our database1, Teng Hu authored at least 46 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
AnomalyDiffusion: Few-Shot Anomaly Image Generation with Diffusion Model.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
N-Accesses: A Blockchain-Based Access Control Framework for Secure IoT Data Management.
Sensors, October, 2023

Incorporating Prior Knowledge in Local Differentially Private Data Collection for Frequency Estimation.
IEEE Trans. Big Data, April, 2023

The Opportunity in Difficulty: A Dynamic Privacy Budget Allocation Mechanism for Privacy-Preserving Multi-dimensional Data Collection.
ACM Trans. Manag. Inf. Syst., March, 2023

Locally differentially private high-dimensional data synthesis.
Sci. China Inf. Sci., January, 2023

SAMVG: A Multi-stage Image Vectorization Model with the Segment-Anything Model.
CoRR, 2023

Stroke-based Neural Painting and Stylization with Dynamically Predicted Painting Region.
CoRR, 2023

DocPrompt: Large-scale continue pretrain for zero-shot and few-shot document question answering.
CoRR, 2023

Stroke-based Neural Painting and Stylization with Dynamically Predicted Painting Region.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Hard Anomaly Detection: An Adversarial Data Augmentation Solution.
Proceedings of the IEEE International Conference on Data Mining, 2023

Phasic Content Fusing Diffusion Model with Directional Distribution Consistency for Few-Shot Model Adaption.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Sparse Black-Box Inversion Attack with Limited Information.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks.
Sensors, 2022

Study of the Buried Basin C-H, Based on the Multi-Source Remote Sensing Data.
Remote. Sens., 2022

Population of Degrading Small Impact Craters in the Chang'E-4 Landing Area Using Descent and Ground Images.
Remote. Sens., 2022

Reconstruction of Power Pylons From LiDAR Point Clouds Based on Structural Segmentation and Parameter Estimation.
IEEE Geosci. Remote. Sens. Lett., 2022

Federated synthetic data generation with differential privacy.
Neurocomputing, 2022

ERNIE-Layout: Layout Knowledge Enhanced Pre-training for Visually-rich Document Understanding.
CoRR, 2022

Targeted Anonymization: A Face Image Anonymization Method for Unauthorized Models.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Sparse Adversarial Attack For Video Via Gradient-Based Keyframe Selection.
Proceedings of the IEEE International Conference on Acoustics, 2022

2021
Fundamental Limits of Data Utility: A Case Study for Data-Driven Identity Authentication.
IEEE Trans. Comput. Soc. Syst., 2021

G-CAS: Greedy Algorithm-Based Security Event Correlation System for Critical Infrastructure Network.
Secur. Commun. Networks, 2021

A low-query black-box adversarial attack based on transferability.
Knowl. Based Syst., 2021

Transaction-based classification and detection approach for Ethereum smart contract.
Inf. Process. Manag., 2021

Application of Improved Asynchronous Advantage Actor Critic Reinforcement Learning Model on Anomaly Detection.
Entropy, 2021

GRU and Multi-autoencoder based Insider Threat Detection for Cyber Security.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Time Series Forecasting and Classification Models Based on Recurrent with Attention Mechanism and Generative Adversarial Networks.
Sensors, 2020

Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats.
Sensors, 2020

An equalisation control method for network big data transmission based on parallel computing.
Int. J. Internet Protoc. Technol., 2020

A Privacy-Preserving Blockchain-based Information Shared Scheme in Smart-Cities.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Detecting Malware on X86-Based IoT Devices in Autonomous Driving.
IEEE Wirel. Commun., 2019

Coarse-to-Fine Extraction of Small-Scale Lunar Impact Craters From the CCD Images of the Chang'E Lunar Orbiters.
IEEE Trans. Geosci. Remote. Sens., 2019

Using XGBoost to Discover Infected Hosts Based on HTTP Traffic.
Secur. Commun. Networks, 2019

Integrating Traffics with Network Device Logs for Anomaly Detection.
Secur. Commun. Networks, 2019

An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning.
Secur. Commun. Networks, 2019

A Lockable Abnormal Electromagnetic Signal Joint Detection Algorithm.
Int. J. Pattern Recognit. Artif. Intell., 2019

Network Intrusion Feature Map Node Equalization Algorithm Based on Modified Variable Step-Size Constant Modulus.
Int. J. Pattern Recognit. Artif. Intell., 2019

High-resolution geological mapping and age determination for ILRS site characterization.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

DataEther: Data Exploration Framework For Ethereum.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

A Large-Scale Empirical Study on Control Flow Identification of Smart Contracts.
Proceedings of the 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2019

2018
Rule Anomaly-Free Mechanism of Security Function Chaining in 5G.
IEEE Access, 2018

DFCPM: A Dominant Feature Co-location Pattern Miner.
Proceedings of the Web and Big Data - Second International Joint Conference, 2018

Spatial Co-location Pattern Mining Based on Density Peaks Clustering and Fuzzy Theory.
Proceedings of the Web and Big Data - Second International Joint Conference, 2018

2015
Automatic Extraction and Identification of Lunar Impact Craters Based on Optical Data and DEMs Acquired by the Chang'E Satellites.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2015

2012
Dense Corresponding Pixel Matching Between Aerial Epipolar Images Using an RGB-Belief Propagation Algorithm.
IEEE Geosci. Remote. Sens. Lett., 2012


  Loading...