Search

Your search keyword '"Niu, Wenjia"' showing total 321 results

Search Constraints

Start Over You searched for: Author "Niu, Wenjia" Remove constraint Author: "Niu, Wenjia"
321 results on '"Niu, Wenjia"'

Search Results

1. Visual Prompting in LLMs for Enhancing Emotion Recognition

2. Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models

3. Obfuscating IoT Device Scanning Activity via Adversarial Example Generation

4. A Large-scale Fine-grained Analysis of Packages in Open-Source Software Ecosystems

5. OSS Malicious Package Analysis in the Wild

6. Nightfall Deception: A Novel Backdoor Attack on Traffic Sign Recognition Models via Low-Light Data Manipulation

7. ECG Signal Classification with a Multi-stage Model Integrating CNN, SNN, and ResNet

8. Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning

9. Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks Against Lane Detection Models

10. Recognition of Signal Modulation Pattern Based on Multi-task Self-supervised Learning

11. Blind Motion Deblurring Super-Resolution: When Dynamic Spatio-Temporal Learning Meets Static Image Understanding

12. GERNS: A Graph Embedding with Repeat-Free Neighborhood Structure for Subgraph Matching Optimization

13. LNFGP: Local Node Fusion-Based Graph Partition by Greedy Clustering

14. Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack

15. Adapting on Road Traffic-Oriented Controlled Optimization of Phases to Heterogeneous Intersections

16. Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System

17. Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning

18. A Training-based Identification Approach to VIN Adversarial Examples

19. Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding

21. Collaborative Attack Sequence Generation Model Based on Multiagent Reinforcement Learning for Intelligent Traffic Signal System.

22. Reflective Adversarial Attacks against Pedestrian Detection Systems for Vehicles at Night.

23. Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning

24. Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack

27. Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control

28. A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection

31. Cross-Modal Similarity Learning : A Low Rank Bilinear Formulation

32. A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System

33. A Method to Effectively Detect Vulnerabilities on Path Planning of VIN

34. A Cross-Modal CCA-Based Astroturfing Detection Approach

37. Toward Learning Model-Agnostic Explanations for Deep Learning-Based Signal Modulation Classifiers

42. Beyond the Aggregation of Its Members—A Novel Group Recommender System from the Perspective of Preference Distribution

43. A Hidden Astroturfing Detection Approach Base on Emotion Analysis

44. You Can’t Hide: A Novel Methodology to Defend DDoS Attack Based on Botcloud

45. Structural Analysis of IWA Social Network

49. An Approach to Detect the Internet Water Army via Dirichlet Process Mixture Model Based GSP Algorithm

50. Two-Phased Event Causality Acquisition: Coupling the Boundary Identification and Argument Identification Approaches

Catalog

Books, media, physical & digital resources