548 results on '"An, Jiyan"'
Search Results
2. Research on Recognition and Feature Extraction of SQL Attack Action.
3. Enhancing One-Class Anomaly Detection in Unlabeled Datasets Through Unsupervised Data Refinement.
4. Cross-Modal Attention Alignment Network with Auxiliary Text Description for Zero-Shot Sketch-Based Image Retrieval.
5. LoFT: LoRA-Based Efficient and Robust Fine-Tuning Framework for Adversarial Training.
6. Importance-Guided Sequential Training for Physics-Informed Neural Networks.
7. CoSen-IDS: A Novel Cost-Sensitive Intrusion Detection System on Imbalanced Data in 5G Networks.
8. STRCA: A Lightweight and Accurate Root Cause Analysis System Based on 5G Signalling Trace.
9. FoRAG: Factuality-optimized Retrieval Augmented Generation for Web-enhanced Long-form Question Answering.
10. Face4Rag: Factual Consistency Evaluation for Retrieval Augmented Generation in Chinese.
11. Fast and Accurate Root Cause Analysis Based on Signalling Messages for 5G Networks.
12. Manticore: An Unsupervised Intrusion Detection System Based on Contrastive Learning in 5G Networks.
13. AutoML for Large Capacity Modeling of Meta's Ranking Systems.
14. Rankitect: Ranking Architecture Search Battling World-class Engineers at Meta Scale.
15. AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models via Watermark LoRA.
16. Spectral Clustering Based Resource Allocation Strategy for Distributed Large-scale Network Emulation.
17. AdaTT: Adaptive Task-to-Task Fusion Network for Multitask Learning in Recommendations.
18. LActDet: An Automatic Network Attack Activity Detection Framework for Multi-step Attacks.
19. A Cost-effective Automation Method of Massive Vulnerabilities Analysis and Remediation Based on Cloud Native.
20. Causal-Inspired Influence Maximization in Hypergraphs Under Temporal Constraints.
21. CACluster: A Clustering Approach for IoT Attack Activities Based on Contextual Analysis.
22. Marketing Budget Allocation with Offline Constrained Deep Reinforcement Learning.
23. udPINNs: An Enhanced PDE Solving Algorithm Incorporating Domain of Dependence Knowledge.
24. Research on Current Calibration Method for Polarographic Oxygen Permeability Tester.
25. ATS: A Fully Automatic Troubleshooting System with Efficient Anomaly Detection and Localization.
26. Implementation of a Cost-Effective Privacy Leakage Detection System for Hosted Programs.
27. Model-free Reinforcement Learning with Stochastic Reward Stabilization for Recommender Systems.
28. Incremental Informational Value of Floorplans for Rent Price Prediction - Applications of Modern Computer Vision Techniques in Real-Estate.
29. A Shapley-based Lightweight Global Explainer for Network Intrusion Detection System.
30. Robust System Instance Clustering for Large-Scale Web Services.
31. Sparse Reconstruction Method for Flow Fields Based on Mode Decomposition Autoencoder.
32. Harnessing Resource and Demand Flexibility for Energy Management in Urban Micro-grids.
33. LibHunter: An Unsupervised Approach for Third-party Library Detection without Prior Knowledge.
34. StinAttack: A Lightweight and Effective Adversarial Attack Simulation to Ensemble IDSs for Satellite- Terrestrial Integrated Network.
35. Automated Privacy Network Traffic Detection via Self-labeling and Learning.
36. Software-hardware co-design for fast and scalable training of deep learning recommendation models.
37. Research on Optimization Strategy of Central Air-conditioning System for Power Demand Response.
38. Cascaded Multi-Class Network Intrusion Detection With Decision Tree and Self-attentive Model.
39. iSwift: Fast and Accurate Impact Identification for Large-scale CDNs.
40. Achieving Sublinear Complexity under Constant T in T-interval Dynamic Networks.
41. The APC Algorithm of Solving Large-Scale Linear Systems: A Generalized Analysis.
42. Multi-dimensional alignment via Variational Autoencoders for Generalized Zero-Shot and Few-Shot Learning.
43. A Correlation Attack on Full SNOW-V and SNOW-Vi.
44. Explainable Survival Analysis with Convolution-Involved Vision Transformer.
45. Exploring the Limits of Differentially Private Deep Learning with Group-wise Clipping.
46. Multi-Objective Online Learning.
47. Towards the Better Ranking Consistency: A Multi-task Learning Framework for Early Stage Ads Ranking.
48. Discovering Human Interactions with Large-Vocabulary Objects via Query and Multi-Scale Detection.
49. New Rectangle Attack Against SKINNY Block Cipher.
50. Learning-based Task Offloading in Dynamic Orbital Edge Computing Network.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.