Publications
Filters
761 result(s)
Global Regularizer and Temporal-Aware Cross-Entropy for Skeleton-Based Early Action Recognition
Qiuhong Ke, Jun Liu, Mohammed Bennamoun, Hossein Rahmani, Senjian An, Ferdous Sohel, Farid Boussaid, 2018, Asian Conference on Computer Vision (ACCV)
HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems
Yuan Zhang, Chunxiang Xu, Hongwei Li, Kan Yang, Jianying Zhou, Xiaodong Lin, 2018, IEEE Transactions on Industrial Informatics, IEEE Transactions on Industrial Informatics, IEEE Transactions on Industrial Informatics, IEEE Transactions on Industrial Informatics, IEEE Transactions on Industrial Informatics, IEEE Transactions on Industrial Informatics, https://ieeexplore.ieee.org/document/8353448
LAWN: boosting the performance of NVMM file system through reducing write amplification
Chundong Wang, Sudipta Chattopadhyay, 2018, Proceedings of the 55th Annual Design Automation Conference, {DAC} 2018, Proceedings of the 55th Annual Design Automation Conference, {DAC} 2018, San Francisco, CA, USA, https://dl.acm.org/doi/10.1145/3195970.3196066
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System
Y. Chen, C.M. Poskitt, J. Sun, 2018, In Proc. IEEE Symposium on Security & Privacy (S&P 2018). IEEE, 2018, In Proc. IEEE Symposium on Security & Privacy (S&P 2018). IEEE, 2018, In Proc. IEEE Symposium on Security & Privacy (S&P 2018). IEEE, 2018, https://arxiv.org/abs/1801.00903
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System
Yuqi Chen, Christopher M. Poskitt, Jun Sun, 2018, IEEE Symposium on Security and Privacy 2018: 648-660, IEEE Symposium on Security and Privacy 2018: 648-660, IEEE Symposium on Security and Privacy 2018: 648-660, https://ieeexplore.ieee.org/document/8418629
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage
Anjia Yang, Jia Xu, Jian Weng, Jianying Zhou, Duncan Wong, 2018, IEEE Transactions on Cloud Computing, IEEE Transactions on Cloud Computing, IEEE Transactions on Cloud Computing, IEEE Transactions on Cloud Computing, IEEE Transactions on Cloud Computing, https://ieeexplore.ieee.org/document/8399549
Magic Train: Design of Measurement Methods against Bandwidth Inflation Attacks
Peng Zhou, Rocky Chang, Xiaojing Gu, Minrui Fei, Jianying Zhou, 2018, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Dependable and Secure Computing, https://www.computer.org/csdl/journal/tq/2018/01/07360157/13rRUwwslu3
Minimally Simple Binaural Room Modelling Using a Single Feedback Delay Network
Agus, N, Anderson, H, Chen, JM, Lui, S, Herremans, D, 2018, Journal of the Audio Engineering Society. 2018. 66(10):791-807, Journal of the Audio Engineering Society. 2018. 66(10):791-807, Journal of the Audio Engineering Society. 2018. 66(10):791-807, Journal of the Audio Engineering Society. 2018. 66(10):791-807, Journal of the Audio Engineering Society. 2018. 66(10):791-807, https://dorienherremans.com/sites/default/files/angus_jaes_preprint_1.pdf
Modeling temporal tonal relations in polyphonic music through deep networks with a novel image-based representation
Chuan C.H., Herremans D., 2018, Proceedings of the 32th AAAI Conference on Artificial Intelligence. New Orleans, US. 2018. pp. 2159-2166, Proceedings of the 32th AAAI Conference on Artificial Intelligence. New Orleans, US. 2018. pp. 2159-2166, New Orleans, US., https://dorienherremans.com/sites/default/files/preprint_lstm.pdf
Mouse Authentication without the Temporal Aspect – What does a 2D-CNN learn?
P Chong, YXM Tan, J Guarnizo, Y Elovici, A Binder, 2018, IEEE S&P 2018 workshop, IEEE S&P 2018 workshop, IEEE S&P 2018 workshop, IEEE S&P 2018 workshop, IEEE S&P 2018 workshop, https://ieeexplore.ieee.org/abstract/document/8424627