1,719 results on '"Yang, Xiao"'
Search Results
2. Dual Knowledge Distillation for Efficient Sound Event Detection.
3. BEE-Net: Bridging Semantic and Instance with Gated Encoding and Edge Constraint for Efficient Panoptic Segmentation.
4. CVFormer: Learning Circum-View Representation and Consistency for Vision-Based Occupancy Prediction via Transformers.
5. LibvDiff: Library Version Difference Guided OSS Version Identification in Binaries.
6. Towards Robust Evidence-Aware Fake News Detection via Improving Semantic Perception.
7. Towards Improving Phishing Detection System Using Human in the Loop Deep Learning Model.
8. Digital Twin based Test- and Verify Framework of Human-Robot Collaboration Solutions.
9. A Label Disambiguation-Based Multimodal Massive Multiple Instance Learning Approach for Immune Repertoire Classification.
10. AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials.
11. File Hijacking Vulnerability: The Elephant in the Room.
12. Leveraging Semantic Relations in Code and Data to Enhance Taint Analysis of Embedded Systems.
13. TriSAS: Toward Dependable Inter-SAS Coordination with Auditability.
14. GAPPO - A Graph Attention Reinforcement Learning based Robust Routing Algorithm.
15. A Dual-Mode Broadband Image Sensor Based on Graphene-CMOS Integration.
16. RL4NET++: A Packet-Level Network Simulation Framework for DRL-Based Routing Algorithms.
17. Current Scalability Issues in Multi-Bank 5V PMOS ESD structures: Root cause and Design Guideline.
18. An Adaptive Grasping Strategy for Dexterous Hands Based on Proximity-Contact Sensing.
19. Decompilation Based Deep Binary-Source Function Matching.
20. DEPS: A Demand-Oriented Framework for Edge Intelligent Production System.
21. Design and Analysis of A Highly Integrated Wireless Motor Drive System.
22. Small Footprint Multi-channel Network for Keyword Spotting with Centroid Based Awareness.
23. Defense Against Adversarial Attacks via Adversarial Noise Denoising Networks in Image Recognition.
24. Flexible Sensors Used for Lower Assisting Exoskeleton.
25. Real-time Multi-person Eyeblink Detection in the Wild for Untrimmed Video.
26. A2J-Transformer: Anchor-to-Joint Transformer Network for 3D Interacting Hand Pose Estimation from a Single RGB Image.
27. Learning Program Semantics for Vulnerability Detection via Vulnerability-Specific Inter-procedural Slicing.
28. An Enhanced Vulnerability Detection in Software Using a Heterogeneous Encoding Ensemble.
29. Characterization of Charge-Trap-Transistor (CTT) Threshold Voltage Degradation and Differential-Pair-Based Memory Design.
30. Modeling of AMPK Regulatory Network in Alzheimer's Disease.
31. Multimodal-AIR-BERT: A Multimodal Pre-trained Model for Antigen Specificity Prediction in Adaptive Immune Receptors.
32. Conti Ransomware Development Evaluation.
33. UCBlocker: Unwanted Call Blocking Using Anonymous Authentication.
34. ARI: Attestation of Real-time Mission Execution Integrity.
35. Detecting API Post-Handling Bugs Using Code and Description in Patches.
36. LocalPose: Object Pose Estimation with Local Geometry Guidance.
37. Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation.
38. Deep Reinforcement Learning Based Dynamic Routing Optimization for Delay-Sensitive Applications.
39. A Decentralized Truth Discovery Approach to the Blockchain Oracle Problem.
40. Scoreformer: Score Fusion-Based Transformers for Weakly-Supervised Violence Detection.
41. Software Vulnerability Detection Using an Enhanced Generalization Strategy.
42. Deep Reinforcement Learning Based Probabilistic Cognitive Routing: An Empirical Study with OMNeT++ and P4.
43. ACETest: Automated Constraint Extraction for Testing Deep Learning Operators.
44. Enhancing OSS Patch Backporting with Semantics.
45. Rethinking Single Sign-On: A Reliable and Privacy-Preserving Alternative with Verifiable Credentials.
46. Tolerating Device-to-Device Variation for Memristive Crossbar-Based Neuromorphic Computing Systems: A New Bayesian Perspective.
47. A Cross-Chain System Supports Verifiable Complete Data Provenance Queries.
48. MS-PTP: Protecting Network Timing from Byzantine Attacks.
49. Bijack: Breaking Bitcoin Network with TCP Vulnerabilities.
50. A Simple and Powerful Global Optimization for Unsupervised Video Object Segmentation.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.