default search action
Mohan Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Lingfeng Qu, Mohan Li, Peng Chen:
Reversible data hiding in encrypted image with secure multi-party for telemedicine applications. Biomed. Signal Process. Control. 93: 106209 (2024) - [j14]Jingpei Wang, Ming Zhu, Mohan Li, Yanbin Sun, Zhihong Tian:
An Access Control Method Against Unauthorized and Noncompliant Behaviors of Real-Time Data in Industrial IoT. IEEE Internet Things J. 11(1): 708-727 (2024) - [j13]Lingfeng Qu, Mohan Li, Yanbin Sun, Shen Su, Yuan Liu, Lejun Zhang:
Security analysis of a reversible data hiding scheme in encrypted images by redundant space transfer. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101914 (2024) - [c41]Xiaowei Xu, Yixiao Xu, Xiong Chen, Peng Chen, Mohan Li, Yanbin Sun:
Watch Your Words: Successfully Jailbreak LLM by Mitigating the "Prompt Malice". APWeb/WAIM (1) 2024: 295-309 - [c40]Chao Zhang, Mohan Li, Ignas Budvytis, Stephan Liwicki:
DiaLoc: An Iterative Approach to Embodied Dialog Localization. CVPR 2024: 12585-12593 - [c39]Dario Fenoglio, Mohan Li, Davide Casnici, Matías Laporte, Shkurta Gashi, Silvia Santini, Martin Gjoreski, Marc Langheinrich:
Multi-Frequency Federated Learning for Human Activity Recognition Using Head-Worn Sensors. IE 2024: 17-24 - [i7]Chao Zhang, Mohan Li, Ignas Budvytis, Stephan Liwicki:
DiaLoc: An Iterative Approach to Embodied Dialog Localization. CoRR abs/2403.06846 (2024) - [i6]Mohan Li, Cong-Thanh Do, Simon Keizer, Youmna Farag, Svetlana Stoyanchev, Rama Doddipatla:
WHISMA: A Speech-LLM to Perform Zero-shot Spoken Language Understanding. CoRR abs/2408.16423 (2024) - 2023
- [j12]Haifeng Zhou, Mohan Li, Yanbin Sun, Lei Yun, Zhihong Tian:
Digital Twin-Based Cyber Range for Industrial Internet of Things. IEEE Consumer Electron. Mag. 12(6): 66-77 (2023) - [j11]Xiaoxiao Xie, Shengfei Shi, Hongzhi Wang, Mohan Li:
SAT: sampling acceleration tree for adaptive database repartition. World Wide Web (WWW) 26(5): 3503-3533 (2023) - [c38]Jin Jiang, Mohan Li:
Entity Alignment Based on Multi-view Interaction Model in Vulnerability Knowledge Graphs. APWeb-WAIM (2) 2023: 501-516 - [c37]Mohan Li, Catalin Zorila, Cong-Thanh Do, Rama Doddipatla:
Towards a Unified End-to-End Language Understanding System for Speech and Text Inputs. ASRU 2023: 1-8 - [c36]Mohan Li, Cong-Thanh Do, Rama Doddipatla:
Cumulative Attention Based Streaming Transformer ASR with Internal Language Model Joint Training and Rescoring. ICASSP 2023: 1-5 - [c35]Cong-Thanh Do, Rama Doddipatla, Mohan Li, Thomas Hain:
Domain Adaptive Self-supervised Training of Automatic Speech Recognition. INTERSPEECH 2023: 4389-4393 - [c34]Yanbin Sun, Jianxun Zhou, Bo Hu, Xiaoming Zhou, Wei Song, Mohan Li, Zhihong Tian:
Hierarchical Name-based Routing for Content Provider Mobility in ICN. IWCMC 2023: 941-946 - [c33]Qi Yan, Mohan Li, Yanbin Sun:
Neighborhood Matching Entity Alignment Model for Vulnerability Knowledge Graphs. TrustCom 2023: 38-45 - [i5]Mohan Li, Rama Doddipatla:
Non-autoregressive End-to-end Approaches for Joint Automatic Speech Recognition and Spoken Language Understanding. CoRR abs/2304.10869 (2023) - [i4]Mohan Li, Rama Doddipatla, Catalin Zorila:
Self-regularised Minimum Latency Training for Streaming Transformer-based Speech Recognition. CoRR abs/2304.11985 (2023) - 2022
- [c32]Jiaxin Fan, Qi Yan, Mohan Li, Guanqun Qu, Yang Xiao:
A Survey on Data Poisoning Attacks and Defenses. DSC 2022: 48-55 - [c31]Qi Yan, Jiaxin Fan, Mohan Li, Guanqun Qu, Yang Xiao:
A Survey on Knowledge Graph Embedding. DSC 2022: 576-583 - [c30]Mohan Li, Shucong Zhang, Catalin Zorila, Rama Doddipatla:
Transformer-Based Streaming ASR with Cumulative Attention. ICASSP 2022: 8272-8276 - [c29]Mohan Li, Rama Sanand Doddipatla, Catalin Zorila:
Self-regularised Minimum Latency Training for Streaming Transformer-based Speech Recognition. INTERSPEECH 2022: 2088-2092 - [c28]Cong-Thanh Do, Mohan Li, Rama Doddipatla:
Multiple-hypothesis RNN-T Loss for Unsupervised Fine-tuning and Self-training of Neural Transducer. INTERSPEECH 2022: 4446-4450 - [c27]Hongniu Zhang, Mohan Li:
Multi-round Data Poisoning Attack and Defense against Truth Discovery in Crowdsensing Systems. MDM 2022: 109-118 - [c26]Mohan Li, Rama Doddipatla:
Non-Autoregressive End-to-End Approaches for Joint Automatic Speech Recognition and Spoken Language Understanding. SLT 2022: 390-397 - [c25]Hongniu Zhang, Mohan Li, Yanbin Sun, Guanqun Qu:
Robust Truth Discovery Against Multi-round Data Poisoning Attacks. WASA (1) 2022: 258-270 - [i3]Mohan Li, Shucong Zhang, Catalin Zorila, Rama Doddipatla:
Transformer-based Streaming ASR with Cumulative Attention. CoRR abs/2203.05736 (2022) - [i2]Cong-Thanh Do, Mohan Li, Rama Doddipatla:
Multiple-hypothesis RNN-T Loss for Unsupervised Fine-tuning and Self-training of Neural Transducer. CoRR abs/2207.14736 (2022) - 2021
- [j10]Yanbin Sun, Mohan Li, Shen Su, Zhihong Tian, Wei Shi, Meng Han:
Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets. Mob. Networks Appl. 26(2): 940-948 (2021) - [j9]Yanbin Sun, Zhihong Tian, Mohan Li, Shen Su, Xiaojiang Du, Mohsen Guizani:
Honeypot Identification in Softwarized Industrial Cyber-Physical Systems. IEEE Trans. Ind. Informatics 17(8): 5542-5551 (2021) - [c24]Mohan Li, Rama Doddipatla:
Improving HS-DACS Based Streaming Transformer ASR with Deep Reinforcement Learning. ASRU 2021: 154-161 - [c23]Zeshi Wang, Mohan Li, Zhaoquan Gu:
A Review of Entity Alignment based on Graph Convolutional Neural Network. DSC 2021: 144-151 - [c22]Jin Jiang, Mohan Li, Zhaoquan Gu:
A Survey on Translating Embedding based Entity Alignment in Knowledge Graphs. DSC 2021: 187-194 - [c21]Mohan Li, Catalin Zorila, Rama Doddipatla:
Head-Synchronous Decoding for Transformer-Based Streaming ASR. ICASSP 2021: 5909-5913 - [c20]Mohan Li, Catalin Zorila, Rama Doddipatla:
Transformer-Based Online Speech Recognition with Decoder-end Adaptive Computation Steps. SLT 2021: 1-7 - [c19]Catalin Zorila, Mohan Li, Rama Doddipatla:
An Investigation into the Multi-channel Time Domain Speaker Extraction Network. SLT 2021: 793-800 - [p1]Huchen Zhou, Mohan Li, Zhaoquan Gu, Zhihong Tian:
Spatiotemporal Data Cleaning and Knowledge Fusion. MDATA: A New Knowledge Representation Model 2021: 32-50 - 2020
- [j8]Mohan Li, Yanbin Sun, Hui Lu, Sabita Maharjan, Zhihong Tian:
Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems. IEEE Internet Things J. 7(7): 6266-6278 (2020) - [j7]Yanbin Sun, Zhihong Tian, Mohan Li, Chunsheng Zhu, Nadra Guizani:
Automated Attack and Defense Framework toward 5G Security. IEEE Netw. 34(5): 247-253 (2020) - [c18]Huchen Zhou, Mohan Li, Zhaoquan Gu:
Knowledge Fusion and Spatiotemporal Data Cleaning: A Review. DSC 2020: 295-301
2010 – 2019
- 2019
- [j6]Yanbin Sun, Zhihong Tian, Yuhang Wang, Mohan Li, Shen Su, Xianzhi Wang, Dunqiu Fan:
Lightweight Anonymous Geometric Routing for Internet of Things. IEEE Access 7: 29754-29762 (2019) - [j5]Zhihong Tian, Mohan Li, Meikang Qiu, Yanbin Sun, Shen Su:
Block-DEF: A secure digital evidence framework using blockchain. Inf. Sci. 491: 151-165 (2019) - [c17]Mohan Li, Min Liu, Masanori Hattori:
End-to-end Speech Recognition with Adaptive Computation Steps. ICASSP 2019: 6246-6250 - [c16]Zongshi Chen, Mohan Li, Xiang Cui, Yanbin Sun:
Research on SQL Injection and Defense Technology. ICAIS (4) 2019: 191-201 - [c15]Xinguo Zhang, Mohan Li, Yu Jiang, Yanbin Sun:
A Review of the Factorization Problem of Large Integers. ICAIS (4) 2019: 202-213 - [c14]XiaoLong Chen, Mohan Li, Yu Jiang, Yanbin Sun:
A Comparison of Machine Learning Algorithms for Detecting XSS Attacks. ICAIS (4) 2019: 214-224 - [c13]Hangfeng Yang, Hui Lu, Shudong Li, Mohan Li, Yanbin Sun:
Research on Content Extraction of Rich Text Web Pages. ICAIS (4) 2019: 279-287 - [c12]Weixiang Chen, Hui Lu, Mohan Li, Yanbin Sun:
Network Protocol Analysis Base on WeChat PC Version. ICAIS (4) 2019: 288-297 - [c11]Runnan Tan, Xiangyi Kong, Yu Zhang, Qingfeng Tan, Hui Lu, Mohan Li, Yanbin Sun:
Bitcoin Network Size Estimation Based on Coupon Collection Model. ICAIS (4) 2019: 298-307 - [c10]Chaobin Wang, Le Wang, Mohan Li, Yu Jiang, Hui Lu:
A Distributed Cryptanalysis Framework Based on Mobile Phones. ICAIS (4) 2019: 318-331 - [c9]Yuying Li, Xiaohan Helu, Mohan Li, Yanbin Sun, Le Wang:
Implementation of MD5 Collision Attack in Program. ICAIS (1) 2019: 595-604 - [c8]Liwen Zheng, Xiaohan Helu, Mohan Li, Hui Lu:
Automatic Discovery Mechanism of Blockchain Nodes Based on the Kademlia Algorithm. ICAIS (1) 2019: 605-616 - [c7]Mohan Li, Yuanjiang Cao, Weicong Zhou, Min Liu:
Framewise Supervised Training Towards End-to-End Speech Recognition Models: First Results. INTERSPEECH 2019: 1641-1645 - [c6]Zhaoquan Gu, Yuexuan Wang, Keke Tang, Chao Li, Mohan Li, Lihua Yin:
A General Framework for Adjustable Neighbor Discovery in Wireless Sensor Networks. iThings/GreenCom/CPSCom/SmartData 2019: 129-134 - [i1]Zhihong Tian, Yanbin Sun, Shen Su, Mohan Li, Xiaojiang Du, Mohsen Guizani:
Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers. CoRR abs/1902.04009 (2019) - 2018
- [j4]Mohan Li, Jianzhong Li, Siyao Cheng, Yanbin Sun:
Uncertain Rule Based Method for Determining Data Currency. IEICE Trans. Inf. Syst. 101-D(10): 2447-2457 (2018) - [j3]Mohan Li, Yanbin Sun:
Currency Preserving Query: Selecting the Newest Values from Multiple Tables. IEICE Trans. Inf. Syst. 101-D(12): 3059-3072 (2018) - [j2]Mohan Li, Yanbin Sun, Yu Jiang, Zhihong Tian:
Answering the Min-Cost Quality-Aware Query on Multi-Sources in Sensor-Cloud Systems. Sensors 18(12): 4486 (2018) - [c5]Mohan Li, Yanbin Sun, Le Wang, Hui Lu:
Quality-Aware Query Based on Relative Source Quality. ICCCS (2) 2018: 3-8 - [c4]Yanbin Sun, Mohan Li, Le Wang, Hui Lu:
Greedy Embedding Strategy for Dynamic Graphs Based on Spanning Tree. ICCCS (1) 2018: 525-530 - [c3]Mohan Li, Yu Jiang, Yanbin Sun, Zhihong Tian:
Answering the Min-Cost Quality-Aware Query on Multi-sources in Sensor-Cloud Systems. SpaCCS 2018: 156-165 - 2017
- [c2]Meng Han, Lei Li, Xiaoqing Peng, Zhen Hong, Mohan Li:
Information Privacy of Cyber Transportation System: Opportunities and Challenges. RITT 2017: 23-28 - 2016
- [j1]Mohan Li, Jianzhong Li:
A minimized-rule based approach for improving data currency. J. Comb. Optim. 32(3): 812-841 (2016) - 2010
- [c1]Mohan Li, Hongzhi Wang, Jianzhong Li, Hong Gao:
Efficient Duplicate Record Detection Based on Similarity Estimation. WAIM 2010: 595-607
Coauthor Index
aka: Rama Doddipatla
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint