Search

Your search keyword '"Zhang, Xuyun"' showing total 570 results

Search Constraints

Start Over You searched for: Author "Zhang, Xuyun" Remove constraint Author: "Zhang, Xuyun"
570 results on '"Zhang, Xuyun"'

Search Results

1. Looking From the Future: Multi-order Iterations Can Enhance Adversarial Attack Transferability

2. Shadow-Free Membership Inference Attacks: Recommender Systems Are More Vulnerable Than You Thought

3. FedLPS: Heterogeneous Federated Learning for Multiple Tasks with Local Parameter Sharing

4. Adaptive Hypergraph Network for Trust Prediction

5. CETN: Contrast-enhanced Through Network for CTR Prediction

6. Source Inference Attacks: Beyond Membership Inference Attacks in Federated Learning

7. OptIForest: Optimal Isolation Forest for Anomaly Detection

9. ProcessGPT: Transforming Business Process Management with Generative Artificial Intelligence

10. Watermarking Text Data on Large Language Models for Dataset Copyright

11. RePreM: Representation Pre-training with Masked Model for Reinforcement Learning

12. A Transformer-Based User Satisfaction Prediction for Proactive Interaction Mechanism in DuerOS

13. TD3 with Reverse KL Regularizer for Offline Reinforcement Learning from Mixed Datasets

14. Spatio-Temporal Aware Next Point-of-Interest Recommendation with Privacy Preserving

15. Cascading Graph Convolution Contrastive Learning Networks for Multi-behavior Recommendation

16. Membership Inference via Backdooring

19. Crowdsourcing-based Multi-Device Communication Cooperation for Mobile High-Quality Video Enhancement

20. Source Inference Attacks in Federated Learning

22. Diversity-aware Web APIs Recommendation with Compatibility Guarantee

23. Diversified and Compatible Web APIs Recommendation in IoT

25. Membership Inference Attacks on Machine Learning: A Survey

26. A Preference-Based Indicator Selection Hyper-Heuristic for Optimization Problems

27. Noise-Augmented Contrastive Learning for Sequential Recommendation

28. A Comprehensive Survey of Explainable Artificial Intelligence (XAI) Methods: Exploring Transparency and Interpretability

34. A Cricket-Based Selection Hyper-Heuristic for Many-Objective Optimization Problems

35. Bridging the Gap Between Domain Models and Computational Models: A Case Study of COVID-19

36. An Optimized Greedy-Based Task Offloading Method for Mobile Edge Computing

37. Deep Reinforcement Learning Based Iterative Participant Selection Method for Industrial IoT Big Data Mobile Crowdsourcing

38. An Empirical Study on Human Flying Imagery Using EEG

39. Time-Aware Missing Traffic Flow Prediction for Sensors with Privacy-Preservation

41. CycleSafe: Safe Route Planning for Urban Cyclists

42. Anomalous Taxi Route Detection System Based on Cloud Services

45. EdgeAuth: An intelligent token‐based collaborative authentication scheme.

46. A cloud‐edge service offloading method for the metaverse in smart manufacturing.

47. A Low-Latency Metadata Service for Geo-Distributed File Systems

48. Computation Offloading and Resource Management for Energy and Cost Trade-Offs with Deep Reinforcement Learning in Mobile Edge Computing

49. Data Privacy Protection of Industrial Blockchain

Catalog

Books, media, physical & digital resources