884 results on '"Ke, Xu"'
Search Results
2. Unsupervised Salient Instance Detection.
3. LTA-PCS: Learnable Task-Agnostic Point Cloud Sampling.
4. Color Shift Estimation-and-Correction for Image Enhancement.
5. Effective Video Mirror Detection with Inconsistent Motion Cues.
6. Enhancing Boundary Segmentation for Topological Accuracy with Skeleton-based Methods.
7. Rethinking and Optimizing Workload Redistribution in Large-scale Internet Data Centers.
8. ReND: Toward Reasoning-based BLE Neighbor Discovery by Integrating with Wi-Fi Fingerprints.
9. Performant TCP over Wi-Fi Direct.
10. Enhancing Fraud Transaction Detection via Unlabeled Suspicious Records.
11. A Horizontal Study on the Mixed IPID Assignment Vulnerability in the Linux Ecosystem.
12. Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization.
13. Reducing First-Frame Delay of Live Streaming by Simultaneously Initializing Window and Rate.
14. Deep Learning-Based Pulse-Shaping Filter Estimation for Fine-Grained WiFi Sensing.
15. Multi-Channel Graph Fusion Representation for Tabular Data Imputation.
16. Real-Time Processing of Ship Detection with SAR Image Based on FPGA.
17. Low-Quality Deepfake Video Detection Model Targeting Compression-Degraded Spatiotemporal Inconsistencies.
18. HILL: Hierarchy-aware Information Lossless Contrastive Learning for Hierarchical Text Classification.
19. RoleLLM: Benchmarking, Eliciting, and Enhancing Role-Playing Abilities of Large Language Models.
20. ADVSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification.
21. Low-Light Raw Image Enhancement on a Dataset Suffering Light Effects.
22. Learning Spatio-Temporal Relations with Multi-Scale Integrated Perception for Video Anomaly Detection.
23. Customizing a Generic Digital Transformation Objectives Model onto a Telecommunication Company.
24. Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed.
25. DoubleH: Twitter User Stance Detection via Bipartite Graph Neural Networks.
26. Online Social Behavior Enhanced Detection of Political Stances in Tweets.
27. Exploitation of Security Vulnerability on Retirement.
28. Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities.
29. Empowering Work-Life Harmony: Introducing a Porsche-Inspired Voice Digital Assistants Tailored for Women.
30. Cache Bandwidth Contention Leaks Secrets.
31. FusionArch: A Fusion-Based Accelerator for Point-Based Point Cloud Neural Networks.
32. Recasting Regional Lighting for Shadow Removal.
33. Adversarial Robust Safeguard for Evading Deep Facial Manipulation.
34. ZOOM: Learning Video Mirror Detection with Extremely-Weak Supervision.
35. Link Prediction in Multilayer Networks via Cross-Network Embedding.
36. Multi-View Dynamic Reflection Prior for Video Glass Surface Detection.
37. Boosting Neural Cognitive Diagnosis with Student's Affective State Modeling.
38. PTMQ: Post-training Multi-Bit Quantization of Neural Networks.
39. Marine Gravity Field Model Fusion Method Based on Water Depth: A Case Study of the South China Sea.
40. Efficient Two Photon Absorption for 400-nm Remote Optical Control at 2-μm Waveband in a Low-loss Multimode Silicon Waveguide.
41. From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices.
42. Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks.
43. Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic.
44. Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption.
45. OWL: A Large Language Model for IT Operations.
46. Graph-constrained diffusion for End-to-End Path Planning.
47. Data-driven Contribution-based Disciplinary Assessment System.
48. Make Each Iteration Count.
49. Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System.
50. Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.