Yi Tu

Orcid: 0000-0002-2051-8806

According to our database1, Yi Tu authored at least 26 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Rethinking the Evaluation of Pre-trained Text-and-Layout Models from an Entity-Centric Perspective.
CoRR, 2024

2023
Reading Order Matters: Information Extraction from Visually-rich Documents by Token Path Prediction.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

LayoutMask: Enhance Text-Layout Interaction in Multi-modal Pre-training for Document Understanding.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2022

Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks against 6-Round SHA-3.
IACR Cryptol. ePrint Arch., 2022

Comparative Study of the Thermal and Hydraulic Performance of Supercritical CO2 and Water in Microchannels Based on Entropy Generation.
Entropy, 2022

Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64.
Proceedings of the Information Security - 25th International Conference, 2022

Improving the Deep-Learning-Based Differential Distinguisher and Applications to Simeck.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Enhancing Differential-Neural Cryptanalysis.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
MITM Meets Guess-and-Determine: Further Improved Preimage Attacks against AES-like Hashing.
IACR Cryptol. ePrint Arch., 2021

Conditional Differential-Neural Cryptanalysis.
IACR Cryptol. ePrint Arch., 2021

Security analysis of Subterranean 2.0.
Des. Codes Cryptogr., 2021

2020
A Robust Moving Total Least-Squares Fitting Method for Measurement Data.
IEEE Trans. Instrum. Meas., 2020

Learning From Web Data With Self-Organizing Memory Module.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Image Cropping with Composition and Saliency Aware Aesthetic Score Map.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
New Techniques for Searching Differential Trails in Keccak.
IACR Trans. Symmetric Cryptol., 2019

BHONEM: Binary High-Order Network Embedding Methods for Networked-Guarantee Loans.
J. Comput. Sci. Technol., 2019

ProtoNet: Learning from Web Data with Memory.
CoRR, 2019

Risk Assessment for Networked-guarantee Loans Using High-order Graph Attention Representation.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

A Dynamic Default Prediction Framework for Networked-guarantee Loans.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

2018
Deep Modeling of the Evolution of User Preferences and Item Attributes in Dynamic Social Networks.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Neural Framework for Joint Evolution Modeling of User Feedback and Social Links in Dynamic Social Networks.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Prediction Defaults for Networked-guarantee Loans.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Learning Temporal Relationships Between Financial Signals.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

2016
Credit Card Fraud Detection Using Convolutional Neural Networks.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016


  Loading...