Tianyu Du

Orcid: 0000-0003-1141-157X

According to our database1, Tianyu Du authored at least 43 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ERA-CoT: Improving Chain-of-Thought through Entity Relationship Analysis.
CoRR, 2024

RA-ISF: Learning to Answer and Understand from Retrieval Augmentation via Iterative Self-Feedback.
CoRR, 2024

2023
Research on the lateralization of brain functional complexity in mild cognitive impairment-Alzheimer's disease progression based on multiscale lateralized brain entropy.
Biomed. Signal Process. Control., September, 2023

Multi-level caching and data verification based on ethereum blockchain.
Wirel. Networks, February, 2023

Image Registration Algorithm for Remote Sensing Images Based on Pixel Location Information.
Remote. Sens., January, 2023

Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models.
CoRR, 2023

ReMasker: Imputing Tabular Data with Masked Autoencoding.
CoRR, 2023

Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks.
CoRR, 2023

RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks.
CoRR, 2023

Torch-Choice: A PyTorch Package for Large-Scale Choice Modelling with Python.
CoRR, 2023

On the Security Risks of Knowledge Graph Reasoning.
Proceedings of the 32nd USENIX Security Symposium, 2023

UniT: A Unified Look at Certified Robust Training against Text Adversarial Perturbation.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

VLATTACK: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

A Deep Learning based Multi-edge-type decoding algorithm for 5G NR LDPC codes.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

An Embarrassingly Simple Backdoor Attack on Self-supervised Learning.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
DetectS ec: Evaluating the robustness of object detection models to adversarial attacks.
Int. J. Intell. Syst., 2022

Demystifying Self-supervised Trojan Attacks.
CoRR, 2022

Reasoning over Multi-view Knowledge Graphs.
CoRR, 2022

Learning Transferrable Representations of Career Trajectories for Economic Prediction.
CoRR, 2022

Latency-aware computation offloading and DQN-based resource allocation approaches in SDN-enabled MEC.
Ad Hoc Networks, 2022

ROLAND: Graph Learning Framework for Dynamic Graphs.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique.
Comput. Secur., 2021

Enhancing Model Robustness by Incorporating Adversarial Knowledge into Semantic Representation.
Proceedings of the IEEE International Conference on Acoustics, 2021

Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation.
Proceedings of the 29th USENIX Security Symposium, 2020

SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Spreading social influence with both positive and negative opinions in online networks.
Big Data Min. Anal., 2019

TextBugger: Generating Adversarial Text Against Real-world Applications.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Neural Network Model for Classifying the Economic Recession and Construction of Financial Stress Index.
Proceedings of the Data Science, 2019

Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Symmetric Frame Cracking: A Powerful Dynamic Textual CAPTCHAs Cracking Policy.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Quantifying Graph Anonymity, Utility, and De-anonymity.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Online E-Commerce Fraud: A Large-Scale Detection and Analysis.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

2017
Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Influence Spread in Social Networks with both Positive and Negative Influences.
Proceedings of the Computing and Combinatorics - 23rd International Conference, 2017

2015
Protective Dummy-byte Preamble Padding for improving ZigBee packet transmission under Wi-Fi interference.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Adaptive Preamble Padding with Retransmission Control for ZigBee network under Wi-Fi interference.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

2014
Adaptive Transmit Power Adjustment Technique for ZigBee Network under Wi-Fi Interference.
Proceedings of the Ad Hoc Networks - 6th International ICST Conference, 2014

2013
Study of clear channel assessment mechanism for ZigBee packet transmission under Wi-Fi interference.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

ACK with Interference Detection Technique for ZigBee Network under Wi-Fi Interference.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013


  Loading...