Yongfeng Huang

Orcid: 0000-0003-3825-2230

Affiliations:
  • Tsinghua University, Department of Electronic Engineering, Beijing, China


According to our database1, Yongfeng Huang authored at least 290 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Context-Aware Linguistic Steganography Model Based on Neural Machine Translation.
IEEE ACM Trans. Audio Speech Lang. Process., 2024

Clue-Guided Path Exploration: An Efficient Knowledge Base Question-Answering Framework with Low Computational Resource Consumption.
CoRR, 2024

Towards the Robustness of Differentially Private Federated Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Frame-level steganalysis of QIM steganography in compressed speech based on multi-dimensional perspective of codeword correlations.
J. Ambient Intell. Humaniz. Comput., July, 2023

Personalized News Recommendation: Methods and Challenges.
ACM Trans. Inf. Syst., January, 2023

Linguistic Steganalysis Toward Social Network.
IEEE Trans. Inf. Forensics Secur., 2023

Linguistic Steganalysis in Few-Shot Scenario.
IEEE Trans. Inf. Forensics Secur., 2023

A Blockchain-Based Secure Searching Strategy for Metadata in Mobile Edge Computing.
IEEE Internet Things J., 2023

Semi-supervised named entity recognition in multi-level contexts.
Neurocomputing, 2023

Blockchain-based Privacy-Preserving Group Data Auditing with Secure User Revocation.
Comput. Syst. Sci. Eng., 2023

Specializing Small Language Models towards Complex Style Transfer via Latent Attribute Pre-Training.
CoRR, 2023

FoodGPT: A Large Language Model in Food Testing Domain with Incremental Pre-training and Knowledge Graph Prompt.
CoRR, 2023

FedSampling: A Better Sampling Strategy for Federated Learning.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Hi-Stega: A Hierarchical Linguistic Steganography Framework Combining Retrieval and Generation.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

CATS: Connection-Aware and Interaction-Based Text Steganalysis in Social Networks.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

A Three-Stage Framework for Event-Event Relation Extraction with Large Language Model.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Minimizing Distortion in Steganography via Adaptive Language Model Tuning.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Emotion Recognition in Social Network Texts Based on A Multilingual Architecture.
Proceedings of the IEEE International Conference on Data Mining, 2023

LINK: Linguistic Steganalysis Framework with External Knowledge.
Proceedings of the IEEE International Conference on Acoustics, 2023

CLEVA: Chinese Language Models EVAluation Platform.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

Specializing Small Language Models Towards Complex Style Transfer via Latent Attribute Pre-Training.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

FoodS and FoodIM: Food-Testing Item Recommendation Models for Two Different Users with Different Usage Abilities.
Proceedings of the 4th Asia Service Sciences and Software Engineering Conference, 2023

Exploration of the Effectiveness and Characteristics of ChatGPT in Steganalysis Tasks.
Proceedings of the 4th Asia Service Sciences and Software Engineering Conference, 2023

Solving Math Word Problems via Cooperative Reasoning induced Language Models.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

MVP-Tuning: Multi-View Knowledge Retrieval with Prompt Tuning for Commonsense Reasoning.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
FedCTR: Federated Native Ad CTR Prediction with Cross-platform User Behavior Data.
ACM Trans. Intell. Syst. Technol., 2022

SeSy: Linguistic Steganalysis Framework Integrating Semantic and Syntactic Features.
IEEE Signal Process. Lett., 2022

Research on covert communication channel based on modulation of common compressed speech codec.
Neural Comput. Appl., 2022

Real-time steganalysis for streaming media based on multi-channel convolutional sliding windows.
Knowl. Based Syst., 2022

PCAE: A framework of plug-in conditional auto-encoder for controllable text generation.
Knowl. Based Syst., 2022

Recurrent synchronization network for emotion-cause pair extraction.
Knowl. Based Syst., 2022

CBFF: A cloud-blockchain fusion framework ensuring data accountability for multi-cloud environments.
J. Syst. Archit., 2022

Multi-level reversible data hiding for crypto-imagery via a block-wise substitution-transposition cipher.
J. Inf. Secur. Appl., 2022

A multi-task learning framework for end-to-end aspect sentiment triplet extraction.
Neurocomputing, 2022

Enhancing structure modeling for relation extraction with fine-grained gating and co-attention.
Neurocomputing, 2022

Fengshenbang 1.0: Being the Foundation of Chinese Cognitive Intelligence.
CoRR, 2022

FairVFL: A Fair Vertical Federated Learning Framework with Contrastive Adversarial Learning.
CoRR, 2022

AdaVAE: Exploring Adaptive GPT-2s in Variational Auto-Encoders for Language Modeling.
CoRR, 2022

FedCL: Federated Contrastive Learning for Privacy-Preserving Recommendation.
CoRR, 2022

Unified and Effective Ensemble Knowledge Distillation.
CoRR, 2022

FairRank: Fairness-aware Single-tower Ranking Framework for News Recommendation.
CoRR, 2022

End-to-end Learnable Diversity-aware News Recommendation.
CoRR, 2022

Semi-FairVAE: Semi-supervised Fair Representation Learning with Adversarial Variational Autoencoder.
CoRR, 2022

Are Big Recommendation Models Fair to Cold Users?
CoRR, 2022

Quality-aware News Recommendation.
CoRR, 2022

NoisyTune: A Little Noise Can Help You Finetune Pretrained Language Models Better.
CoRR, 2022

Game of Privacy: Towards Better Federated Platform Collaboration under Privacy Restriction.
CoRR, 2022

FeedRec: News Feed Recommendation with Various User Feedbacks.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

T-GRU: conTextual Gated Recurrent Unit model for high quality Linguistic Steganography.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

MM-Rec: Visiolinguistic Model Empowered Multimodal News Recommendation.
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022

Is News Recommendation a Sequential Recommendation Task?
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022

UserBERT: Pre-training User Model with Contrastive Self-supervision.
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022

ProFairRec: Provider Fairness-aware News Recommendation.
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022

FUM: Fine-grained and Fast User Modeling for News Recommendation.
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022

News Recommendation with Candidate-aware User Modeling.
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022

FairVFL: A Fair Vertical Federated Learning Framework with Contrastive Adversarial Learning.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

FedAttack: Effective and Covert Poisoning Attack on Federated Recommendation via Hard Sampling.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

Rethinking InfoNCE: How Many Negative Samples Do You Need?
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Association Extraction and Recognition of Multiple Emotion Expressed in Social Texts.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

RelU-Net: Syntax-aware Graph U-Net for Relational Triple Extraction.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

DebiasGAN: Eliminating Position Bias in News Recommendation with Adversarial Learning.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

Attribute-based encryption with outsourced computation for access control in IoTs.
Proceedings of the ASSE 2022: 3rd Asia Service Sciences and Software Engineering Conference, Macao, February 24, 2022

Two Birds with One Stone: Unified Model Learning for Both Recall and Ranking in News Recommendation.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2022, 2022

NoisyTune: A Little Noise Can Help You Finetune Pretrained Language Models Better.
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), 2022

Learning Reasoning Patterns for Relational Triple Extraction with Mutual Generation of Text and Graph.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2022, 2022

2021
VAE-Stega: Linguistic Steganography Based on Variational Auto-Encoder.
IEEE Trans. Inf. Forensics Secur., 2021

Linguistic Steganography: From Symbolic Space to Semantic Space.
IEEE Signal Process. Lett., 2021

Linguistic Generative Steganography With Enhanced Cognitive-Imperceptibility.
IEEE Signal Process. Lett., 2021

A Multi-grained Log Auditing Scheme for Cloud Data Confidentiality.
Mob. Networks Appl., 2021

In-hospital resource utilization prediction from electronic medical records with deep learning.
Knowl. Based Syst., 2021

A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing.
J. Syst. Archit., 2021

KeMRE: Knowledge-enhanced medical relation extraction for Chinese medicine instructions.
J. Biomed. Informatics, 2021

UEPF:A blockchain based Uniform Encoding and Parsing Framework in multi-cloud environments.
KSII Trans. Internet Inf. Syst., 2021

LBAC: A lightweight blockchain-based access control scheme for the internet of things.
Inf. Sci., 2021

Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams.
Neurocomputing, 2021

Research on information security in text emotional steganography based on machine learning.
Enterp. Inf. Syst., 2021

Pixel-Stega: Generative Image Steganography Based on Autoregressive Models.
CoRR, 2021

An unsupervised extractive summarization method based on multi-round computation.
CoRR, 2021

UserBERT: Contrastive User Model Pre-training.
CoRR, 2021

FedKD: Communication Efficient Federated Learning via Knowledge Distillation.
CoRR, 2021

Smart Bird: Learnable Sparse Attention for Efficient and Effective Transformer.
CoRR, 2021

Fastformer: Additive Attention Can Be All You Need.
CoRR, 2021

Is News Recommendation a Sequential Recommendation Task?
CoRR, 2021

Personalized News Recommendation: A Survey.
CoRR, 2021

DebiasGAN: Eliminating Position Bias in News Recommendation with Adversarial Learning.
CoRR, 2021

MM-Rec: Multimodal News Recommendation.
CoRR, 2021

FedGNN: Federated Graph Neural Network for Privacy-Preserving Recommendation.
CoRR, 2021

FeedRec: News Feed Recommendation with Various User Feedbacks.
CoRR, 2021

Chapter Six - Protecting personal sensitive data security in the cloud with blockchain.
Adv. Comput., 2021

Empowering News Recommendation with Pre-trained Language Models.
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021

Personalized News Recommendation with Knowledge-aware Interactive Matching.
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021

DA-Transformer: Distance-aware Transformer.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021

Jointly Extracting Explicit and Implicit Relational Triples with Reasoning Pattern Enhanced Binary Pointer Network.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021

User-as-Graph: User Modeling with Heterogeneous Graph Pooling for News Recommendation.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Fast Detection of Heterogeneous Parallel Steganography for Streaming Voice.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

A Vehicle Intrusion Detection System Based on Time Interval and Data Fields.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

NewsBERT: Distilling Pre-trained Language Model for Intelligent News Application.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021

Uni-FedRec: A Unified Privacy-Preserving News Recommendation Framework for Model Training and Online Serving.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021

Provably Secure Generative Linguistic Steganography.
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021

Hi-Transformer: Hierarchical Interactive Transformer for Efficient and Effective Long Document Modeling.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

One Teacher is Enough? Pre-trained Language Model Distillation from Multiple Teachers.
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021

HieRec: Hierarchical User Interest Modeling for Personalized News Recommendation.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

PP-Rec: News Recommendation with Personalized User Interest and Time-aware News Popularity.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

Fairness-aware News Recommendation with Decomposed Adversarial Learning.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Distribution Matching for Rationalization.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Detecting Entities of Works for Chinese Chatbot.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2020

Fast Steganalysis Method for VoIP Streams.
IEEE Signal Process. Lett., 2020

An ECC-based access control scheme with lightweight decryption and conditional authentication for data sharing in vehicular networks.
Soft Comput., 2020

TS-CSW: text steganalysis and hidden capacity estimation based on convolutional sliding windows.
Multim. Tools Appl., 2020

Multi-source data fusion for aspect-level sentiment classification.
Knowl. Based Syst., 2020

Blockchain-based verification framework for data integrity in edge-cloud storage.
J. Parallel Distributed Comput., 2020

StegoNote: Steganography in Guitar Music Using Note Modulation.
Int. J. Netw. Secur., 2020

Improving Attention Mechanism with Query-Value Interaction.
CoRR, 2020

FedCTR: Federated Native Ad CTR Prediction with Multi-Platform User Behavior Data.
CoRR, 2020

Graph-Stega: Semantic Controllable Steganographic Text Generation Guided by Knowledge Graph.
CoRR, 2020

Privacy-Preserving News Recommendation Model Training via Federated Learning.
CoRR, 2020

FedNER: Privacy-preserving Medical Named Entity Recognition with Federated Learning.
CoRR, 2020

Neural news recommendation with negative feedback.
CCF Trans. Pervasive Comput. Interact., 2020

Detecting Steganography in Inactive Voice-Over-IP Frames Based on Statistic Characteristics of Fundamental Frequency.
IEEE Access, 2020

Graph Enhanced Representation Learning for News Recommendation.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

High-Performance Linguistic Steganalysis, Capacity Estimation and Steganographic Positioning.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

Multi-modal Steganography Based on Semantic Relevancy.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

Improving Text-Image Matching with Adversarial Learning and Circle Loss for Multi-modal Steganography.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

SentiRec: Sentiment Diversity-aware Neural News Recommendation.
Proceedings of the 1st Conference of the Asia-Pacific Chapter of the Association for Computational Linguistics and the 10th International Joint Conference on Natural Language Processing, 2020

Named Entity Recognition in Multi-level Contexts.
Proceedings of the 1st Conference of the Asia-Pacific Chapter of the Association for Computational Linguistics and the 10th International Joint Conference on Natural Language Processing, 2020

User Modeling with Click Preference and Reading Satisfaction for News Recommendation.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Linguistic Steganalysis via Densely Connected LSTM with Feature Pyramid.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

A Multi-dilation Convolution Neural Network for Atrial Fibrillation Detection.
Proceedings of the ICDSP 2020: 4th International Conference on Digital Signal Processing, 2020

FCEM: A Novel Fast Correlation Extract Model For Real Time Steganalysis Of VoIP Stream Via Multi-Head Attention.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

CBI: A Data Access Control System Based on Cloud and Blockchain Integration.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

PTUM: Pre-training User Model from Unlabeled User Behaviors via Self-supervision.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

Privacy-Preserving News Recommendation Model Learning.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

A Multi-Task Learning Neural Network for Emotion-Cause Pair Extraction.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

Clickbait Detection with Style-Aware Title Modeling and Co-attention.
Proceedings of the Chinese Computational Linguistics - 19th China National Conference, CCL 2020, Hainan, China, October 30, 2020

Named Entity Recognition with Context-Aware Dictionary Knowledge.
Proceedings of the Chinese Computational Linguistics - 19th China National Conference, CCL 2020, Hainan, China, October 30, 2020

Text Steganalysis with Attentional L STM-CNN.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020

Attentive Pooling with Learnable Norms for Text Representation.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

2019
RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2019

TS-RNN: Text Steganalysis Based on Recurrent Neural Networks.
IEEE Signal Process. Lett., 2019

A Fast and Efficient Text Steganalysis Method.
IEEE Signal Process. Lett., 2019

Public audit for operation behavior logs with error locating in cloud storage.
Soft Comput., 2019

A novel steganographic method for algebraic-code-excited-linear-prediction speech streams based on fractional pitch delay search.
Multim. Tools Appl., 2019

Aspect-based sentiment analysis via fusing multiple sources of textual knowledge.
Knowl. Based Syst., 2019

Semi-supervised dimensional sentiment analysis with variational autoencoder.
Knowl. Based Syst., 2019

Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay.
J. Univers. Comput. Sci., 2019

Privacy-preserving public auditing for secure data storage in fog-to-cloud computing.
J. Netw. Comput. Appl., 2019

Public auditing for shared cloud data with efficient and secure group management.
Inf. Sci., 2019

Unsupervised pre-trained filter learning approach for efficient convolution neural network.
Neurocomputing, 2019

Neural Chinese word segmentation with dictionary.
Neurocomputing, 2019

Knowledge-enhanced neural networks for sentiment analysis of Chinese reviews.
Neurocomputing, 2019

Public Auditing for Trusted Cloud Storage Services.
IEEE Secur. Priv., 2019

Automatic construction of target-specific sentiment lexicon.
Expert Syst. Appl., 2019

Using GGNN to recommend log statement level.
CoRR, 2019

Fast Steganalysis Method for VoIP Streams.
CoRR, 2019

Legends of Nature and Editors-in-chief.
CoRR, 2019

Water Preservation in Soan River Basin using Deep Learning Techniques.
CoRR, 2019

Real-Time Steganalysis for Stream Media Based on Multi-channel Convolutional Sliding Windows.
CoRR, 2019

Helpfulness-aware review based neural recommendation.
CCF Trans. Pervasive Comput. Interact., 2019

Steganalysis of AMR Speech Based on Multiple Classifiers Combination.
IEEE Access, 2019

Efficient Real-Time Integrity Auditing With Privacy-Preserving Arbitration for Images in Cloud Storage System.
IEEE Access, 2019

Neural Chinese Named Entity Recognition via CNN-LSTM-CRF and Joint Training with Word Segmentation.
Proceedings of the World Wide Web Conference, 2019

Neural Chinese Word Segmentation with Lexicon and Unlabeled Data via Posterior Regularization.
Proceedings of the World Wide Web Conference, 2019

MSA: Jointly Detecting Drug Name and Adverse Drug Reaction Mentioning Tweets with Multi-Head Self-Attention.
Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, 2019

Neural Demographic Prediction using Search Query.
Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, 2019

THU_NGN at SemEval-2019 Task 12: Toponym Detection and Disambiguation on Scientific Papers.
Proceedings of the 13th International Workshop on Semantic Evaluation, 2019

THU_NGN at SemEval-2019 Task 3: Dialog Emotion Classification using Attentional LSTM-CNN.
Proceedings of the 13th International Workshop on Semantic Evaluation, 2019

Learning a Semantic Space for Modeling Images, Tags and Feelings in Cross-Media Search.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2019

Hierarchical User and Item Representation with Three-Tier Attention for Recommendation.
Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2019

NPA: Neural News Recommendation with Personalized Attention.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

IStego100K: Large-Scale Image Steganalysis Dataset.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

GAN-TStega: Text Steganography Based on Generative Adversarial Networks.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Behavioral Security in Covert Communication Systems.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Neural News Recommendation with Attentive Multi-View Learning.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Steganalysis of VoIP Streams with CNN-LSTM Network.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

An access control scheme with fine-grained time constrained attributes based on smart contract and trapdoor.
Proceedings of the 26th International Conference on Telecommunications, 2019

Hierarchical Representation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

A No-Pairing Proxy Re-Encryption Scheme for Data Sharing in Untrusted Cloud.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Muscle Artifacts Cancellation Framework for ECG Signals Combining Convolution Auto-encoder and Average Beat Subtraction.
Proceedings of the 4th International Conference on Biomedical Signal and Image Processing, 2019

Multicast Multipath TCP for Reliable Communication in Wireless Scenarios.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Reviews Meet Graphs: Enhancing User and Item Representations for Recommendation with Hierarchical Attentive Graph Neural Network.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

Neural News Recommendation with Multi-Head Self-Attention.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

Neural News Recommendation with Heterogeneous User Behavior.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

Neural Gender Prediction from News Browsing Data.
Proceedings of the Chinese Computational Linguistics - 18th China National Conference, 2019

Title-Aware Neural News Topic Prediction.
Proceedings of the Chinese Computational Linguistics - 18th China National Conference, 2019

Neural Review Rating Prediction with User and Product Memory.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

Neural Gender Prediction in Microblogging with Emotion-aware User Representation.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

ARP: Aspect-aware Neural Review Rating Prediction.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

Sentiment Lexicon Enhanced Neural Sentiment Classification.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

NICE: Neural In-Hospital Cost Estimation from Medical Records.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

Fast Neural Chinese Named Entity Recognition with Multi-head Self-attention.
Proceedings of the Knowledge Graph and Semantic Computing: Knowledge Computing and Language Understanding, 2019

Neural News Recommendation with Topic-Aware News Representation.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019

2018
Twitter100k: A Real-World Dataset for Weakly Supervised Cross-Media Retrieval.
IEEE Trans. Multim., 2018

RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network.
IEEE Trans. Inf. Forensics Secur., 2018

Domain attention model for multi-domain sentiment classification.
Knowl. Based Syst., 2018

A hybrid unsupervised method for aspect term and opinion target extraction.
Knowl. Based Syst., 2018

Enabling Efficient Verification of Dynamic Data Possession and Batch Updating in Cloud Storage.
KSII Trans. Internet Inf. Syst., 2018

Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication.
IEEE Commun. Lett., 2018

Optimization of CNN through Novel Training Strategy for Visual Classification Problems.
Entropy, 2018

Automatically Generate Steganographic Text Based on Markov Model and Huffman Coding.
CoRR, 2018

TS-CNN: Text Steganalysis from Semantic Space Based on Convolutional Neural Network.
CoRR, 2018

AAG-Stega: Automatic Audio Generation-based Steganography.
CoRR, 2018

A novel method of speech information hiding based on 3D-Magic Matrix.
CoRR, 2018

Clinical Assistant Diagnosis for Electronic Medical Record Based on Convolutional Neural Network.
CoRR, 2018

A Benchmark Dataset and Learning High-Level Semantic Embeddings of Multimedia for Cross-Media Retrieval.
IEEE Access, 2018

Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption.
Proceedings of the 17th IEEE International Conference On Trust, 2018

THU_NGN at SemEval-2018 Task 2: Residual CNN-LSTM Network with Attention for English Emoji Prediction.
Proceedings of The 12th International Workshop on Semantic Evaluation, 2018

THU_NGN at SemEval-2018 Task 10: Capturing Discriminative Attributes with MLP-CNN model.
Proceedings of The 12th International Workshop on Semantic Evaluation, 2018

THU_NGN at SemEval-2018 Task 3: Tweet Irony Detection with Densely connected LSTM and Multi-task Learning.
Proceedings of The 12th International Workshop on Semantic Evaluation, 2018

THU_NGN at SemEval-2018 Task 1: Fine-grained Tweet Sentiment Intensity Analysis with Attention CNN-LSTM.
Proceedings of The 12th International Workshop on Semantic Evaluation, 2018

Neural Chinese Word Segmentation with Dictionary Knowledge.
Proceedings of the Natural Language Processing and Chinese Computing, 2018

Distant Supervision for Relation Extraction with Neural Instance Selector.
Proceedings of the Natural Language Processing and Chinese Computing, 2018

Neural Sentence-Level Sentiment Classification with Heterogeneous Supervision.
Proceedings of the IEEE International Conference on Data Mining, 2018

RITS: Real-Time Interactive Text Steganography Based on Automatic Dialogue Model.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Design and Implementation of Web System Based on Blockchain.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Facebook5k: A Novel Evaluation Resource Dataset for Cross-Media Search.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Focused Crawler Framework Based on Open Search Engine.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Tweet Emoji Prediction Using Hierarchical Model with Attention.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

Neural Metaphor Detecting with CNN-LSTM Model.
Proceedings of the Workshop on Figurative Language Processing, 2018

2017
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage.
IEEE Trans. Serv. Comput., 2017

Collaboratively Training Sentiment Classifiers for Multiple Domains.
IEEE Trans. Knowl. Data Eng., 2017

Distributed steganalysis of compressed speech.
Soft Comput., 2017

Enabling public auditability for operation behaviors in cloud storage.
Soft Comput., 2017

Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs.
Signal Process., 2017

Detecting Steganography of Adaptive Multirate Speech with Unknown Embedding Rate.
Mob. Inf. Syst., 2017

云数据持有性审计研究与进展 (Research and Development of Auditing Techniques for Cloud Data Possession).
计算机科学, 2017

Domain-specific sentiment classification via fusing sentiment knowledge from multiple sources.
Inf. Fusion, 2017

CSFL: A novel unsupervised convolution neural network approach for visual pattern classification.
AI Commun., 2017

A New Similarity Computation Method in Collaborative Filtering Based Recommendation System.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Sentence-level Sentiment Classification with Weak Supervision.
Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2017

A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding.
Proceedings of the Security and Privacy in Communication Networks, 2017

THU_NGN at IJCNLP-2017 Task 2: Dimensional Sentiment Analysis for Chinese Phrases with Deep LSTM.
Proceedings of the IJCNLP 2017, Shared Tasks, Taipei, Taiwan, November 27, 2017

Text Steganography with High Embedding Rate: Using Recurrent Neural Networks to Generate Chinese Classic Poetry.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

Measuring Self-monitoring Using Facebook Online Data Based on Snyder's Psychological Theories.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Image Captioning with Object Detection and Localization.
Proceedings of the Image and Graphics - 9th International Conference, 2017

Ensuring reliable logging for data accountability in untrusted cloud storage.
Proceedings of the IEEE International Conference on Communications, 2017

SigRA: A New Similarity Computation Method in Recommendation System.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

Active Sentiment Domain Adaptation.
Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, 2017

2016
Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics.
Secur. Commun. Networks, 2016

Universal steganography model for low bit-rate speech codec.
Secur. Commun. Networks, 2016

A multi-granularity fuzzy computing model for sentiment classification of Chinese reviews.
J. Intell. Fuzzy Syst., 2016

Text Steganography Based on Ci-poetry Generation Using Markov Chain Model.
KSII Trans. Internet Inf. Syst., 2016

Microblog sentiment classification with heterogeneous sentiment knowledge.
Inf. Sci., 2016

Co-detecting social spammers and spam messages in microblogging via exploiting social contexts.
Neurocomputing, 2016

Structured microblog sentiment classification via social context regularization.
Neurocomputing, 2016

Towards building a high-quality microblog-specific Chinese sentiment lexicon.
Decis. Support Syst., 2016

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating.
Comput. Intell. Neurosci., 2016

Fragile Watermarking Based Proofs of Retrievability for Archival Cloud Data.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Sentiment Domain Adaptation with Multi-Level Contextual Sentiment Knowledge.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Sentiment Domain Adaptation with Multiple Sources.
Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, 2016

Personalized Microblog Sentiment Classification via Multi-Task Learning.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Reputation Audit in Multi-cloud Storage through Integrity Verification and Data Dynamics.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Optimal matrix embedding for Voice-over-IP steganography.
Signal Process., 2015

A High-Capacity Covering Code for Voice-Over-IP Steganography.
Int. J. Inf. Technol. Web Eng., 2015

Improved adaptive partial-matching steganography for Voice over IP.
Comput. Commun., 2015

A Fuzzy Computing Model for Identifying Polarity of Chinese Sentiment Words.
Comput. Intell. Neurosci., 2015

Collaborative Multi-domain Sentiment Classification.
Proceedings of the 2015 IEEE International Conference on Data Mining, 2015

Social Spammer and Spam Message Co-Detection in Microblogging with Social Context Regularization.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

A delay-based TCP for solving incast problem in data centers.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

Microblog Sentiment Classification with Contextual Knowledge Regularization.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics of Pulse Positions.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

An Efficient VoIP Steganography Based on Random Binary Matrix.
Proceedings of the 10th International Conference on P2P, 2015

2014
Designing a new TCP based on FAST TCP for datacenter.
Proceedings of the IEEE International Conference on Communications, 2014

An improved parallel association rules algorithm based on MapReduce framework for big data.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

A detection method of subliminal channel based on VoIP communication.
Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, 2014

2013
An Information- Theoretical Model for Streaming Media Based Stegosystems.
Comput. Informatics, 2013

Medoop: A medical information platform based on Hadoop.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

Lead-lag analysis via sparse co-projection in correlated text streams.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

Review rating prediction based on the content and weighting strong social relation of reviewers.
Proceedings of the 2013 international workshop on Mining unstructured big data using natural language processing, 2013

A method to build subliminal channel in streaming media with multiple steganography methods.
Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing, 2013

2012
Steganography Integration Into a Low-Bit Rate Speech Codec.
IEEE Trans. Inf. Forensics Secur., 2012

Short text classification based on strong feature thesaurus.
J. Zhejiang Univ. Sci. C, 2012

Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis.
J. Zhejiang Univ. Sci. C, 2012

Network service registration based on role-goal-process-service meta-model in a P2P network.
IET Commun., 2012

A Novel Focused Crawler Based on Breadcrumb Navigation.
Proceedings of the Advances in Swarm Intelligence - Third International Conference, 2012

Algorithm of identifying opinion leaders in BBS.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec.
IEEE Trans. Inf. Forensics Secur., 2011

Pulse position checking-based steganalysis of G.723.1 compressed speech in VoIP.
Int. J. Multim. Intell. Secur., 2011

Steganalysis of compressed speech to detect covert voice over Internet protocol channels.
IET Inf. Secur., 2011

An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP.
Proceedings of IEEE International Conference on Communications, 2011

2010
Reversible Data Hiding Using Histogram Shifting in Small Blocks.
Proceedings of IEEE International Conference on Communications, 2010

2009
Performance of Database Driven Network Applications from the User Perspective.
KSII Trans. Internet Inf. Syst., 2009

An Adaptive Steganography Scheme for Voice Over IP.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

An M-Sequence Based Steganography Model for Voice over IP.
Proceedings of IEEE International Conference on Communications, 2009

2008
The Effect of Task Relevance on Electrophysiological Response to Emotional Stimuli.
Proceedings of the Advances in Neural Networks, 2008

A Detailed Study on the Modulation of Emotion Processing by Spatial Location.
Proceedings of the Advances in Neural Networks, 2008

Implementation of Covert Communication Based on Steganography.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Covert Channels Based on Jitter Field of the RTCP Header.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

An Approach to Information Hiding in Low Bit-Rate Speech Stream.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
A Peer-To-Peer Traffic Identification Method Using Machine Learning.
Proceedings of the International Conference on Networking, 2007


  Loading...