default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2024
- Xuanang Yang, Jing Chen, Yuqing Li, Kun He, Xiaojie Huang, Zikuan Jiang, Hao Bai, Ruiying Du:
Fregata: Fast Private Inference With Unified Secure Two-Party Protocols. IEEE Trans. Inf. Forensics Secur. 19: 8472-8484 (2024) - Xiping Sun, Jing Chen, Cong Wu, Kun He, Haozhe Xu, Yebo Feng, Ruiying Du, Xianhao Chen:
MagLive: Near-Field Magnetic Sensing-Based Voice Liveness Detection on Smartphones. CoRR abs/2404.01106 (2024) - Haolin Wu, Jing Chen, Ruiying Du, Cong Wu, Kun He, Xingcan Shang, Hao Ren, Guowen Xu:
CLAD: Robust Audio Deepfake Detection Against Manipulation Attacks with Contrastive Learning. CoRR abs/2404.15854 (2024) - Haozhe Xu, Cong Wu, Yangyang Gu, Xingcan Shang, Jing Chen, Kun He, Ruiying Du:
Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems. CoRR abs/2405.17100 (2024) - Ao Liu, Jing Chen, Kun He, Ruiying Du, Jiahua Xu, Cong Wu, Yebo Feng, Teng Li, Jian-Feng Ma:
DynaShard: Secure and Adaptive Blockchain Sharding Protocol with Hybrid Consensus and Dynamic Shard Management. CoRR abs/2411.06895 (2024) - 2023
- Ruiying Li, Bin Pan, Xia Xu, Tao Li, Zhenwei Shi:
Toward Convergence: A Gradient-Based Multiobjective Method With Greedy Hash for Hyperspectral Unmixing. IEEE Trans. Geosci. Remote. Sens. 61: 1-14 (2023) - Xuanang Yang, Jing Chen, Kun He, Hao Bai, Cong Wu, Ruiying Du:
Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks. IEEE Trans. Inf. Forensics Secur. 18: 4815-4829 (2023) - Jinshan Zeng, Ruiying Xu, Yu Wu, Hongwei Li, Jiaxing Lu:
Zero-Shot Chinese Character Recognition with Stroke- and Radical-Level Decompositions. IJCNN 2023: 1-9 - Jinyang Li, Binyuan Hui, Ge Qu, Jiaxi Yang, Binhua Li, Bowen Li, Bailin Wang, Bowen Qin, Ruiying Geng, Nan Huo, Xuanhe Zhou, Chenhao Ma, Guoliang Li, Kevin Chen-Chuan Chang, Fei Huang, Reynold Cheng, Yongbin Li:
Can LLM Already Serve as A Database Interface? A BIg Bench for Large-Scale Database Grounded Text-to-SQLs. NeurIPS 2023 - Jinyang Li, Binyuan Hui, Ge Qu, Binhua Li, Jiaxi Yang, Bowen Li, Bailin Wang, Bowen Qin, Rongyu Cao, Ruiying Geng, Nan Huo, Xuanhe Zhou, Chenhao Ma, Guoliang Li, Kevin Chen-Chuan Chang, Fei Huang, Reynold Cheng, Yongbin Li:
Can LLM Already Serve as A Database Interface? A BIg Bench for Large-Scale Database Grounded Text-to-SQLs. CoRR abs/2305.03111 (2023) - 2022
- Ji Ma, Rui Kang, Ruiying Li, Qingyuan Zhang, Liang Liu, Xuewang Wang:
Uncertainty Theory-Based Resilience Analysis for LEO Satellite Communication Systems. Symmetry 14(8): 1568 (2022) - Zeling Deng, Ruiying Lyu, Xin Yang, Xue Zhao, Hao Tan:
Effects of Multi-sensory Channel Materials and Emotional Situations in Emotion Induction for Affective Driving Studies. HCI (13) 2022: 141-153 - Yishi Xu, Dongsheng Wang, Bo Chen, Ruiying Lu, Zhibin Duan, Mingyuan Zhou:
HyperMiner: Topic Taxonomy Mining with Hyperbolic Embedding. NeurIPS 2022 - Jinshan Zeng, Ruiying Xu, Yu Wu, Hongwei Li, Jiaxing Lu:
STAR: Zero-Shot Chinese Character Recognition with Stroke- and Radical-Level Decompositions. CoRR abs/2210.08490 (2022) - Yishi Xu, Dongsheng Wang, Bo Chen, Ruiying Lu, Zhibin Duan, Mingyuan Zhou:
HyperMiner: Topic Taxonomy Mining with Hyperbolic Embedding. CoRR abs/2210.10625 (2022) - 2021
- Junzheng Liu, Xinhua Zhang, Zengpei Xu, Jia Wang, Bing Ma, Ruiying Xue, Qian Li:
Evaluation of the impact of urban river bends on the enhancement of aquatic habitats using a two-dimensional habitat suitability model. Ecol. Informatics 65: 101428 (2021) - Jiang Xie, Ruiying Wu, Haitao Wang, Haibing Chen, Xiaochun Xu, Yanyan Kong, Wu Zhang:
Prediction of cardiovascular diseases using weight learning based on density information. Neurocomputing 452: 566-575 (2021) - Ruiying Cheng, Pan Zhang, Lei Xie, Yongqi Ai, Peng Xu:
ACTS: An Ant Colony Based Transmission Scheduling Approach for Cloud Network Collaboration Environment. Symmetry 13(11): 2109 (2021) - Fenggang Lai, Pan Zhang, Ruiying Cheng, Peng Xu:
Distributed Systems Anomaly Detection Based on Log. ICT-DM 2021: 72-79 - 2019
- Ruiying Xu:
Methods for evaluating the development potential of digital media technology with fuzzy number intuitionistic fuzzy information. Int. J. Knowl. Based Intell. Eng. Syst. 23(3): 203-209 (2019) - Junyu Dong, Ruiying Yin, Xin Sun, Qiong Li, Yuting Yang, Xukun Qin:
Inpainting of Remote Sensing SST Images With Deep Convolutional Generative Adversarial Network. IEEE Geosci. Remote. Sens. Lett. 16(2): 173-177 (2019) - Jie Hu, Jie Peng, Yin Zhou, Dongyun Xu, Ruiying Zhao, Qingsong Jiang, Tingting Fu, Fei Wang, Zhou Shi:
Quantitative Estimation of Soil Salinity Using UAV-Borne Hyperspectral and Satellite Multispectral Images. Remote. Sens. 11(7): 736 (2019) - 2018
- Kang He, Ziqiang Ma, Ruiying Zhao, Asim Biswas, Hongfen Teng, Junfeng Xu, Wu Yu, Zhou Shi:
A Methodological Framework to Retrospectively Obtain Downscaled Precipitation Estimates over the Tibetan Plateau. Remote. Sens. 10(12): 1974 (2018) - 2017
- Jing Chen, Kun He, Quan Yuan, Guoliang Xue, Ruiying Du, Lina Wang:
Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks. IEEE Trans. Mob. Comput. 16(6): 1530-1543 (2017) - Jing Chen, Shixiong Yao, Quan Yuan, Ruiying Du, Guoliang Xue:
Checks and balances: A tripartite public key infrastructure for secure web-based connections. INFOCOM 2017: 1-9 - 2016
- Ruiying Liu, Lijun Wang, Xueyan Guo, Huanyu Zhao:
An extensive experimental study on segmenting online time series with error bound guarantee. Int. J. Mach. Learn. Cybern. 7(6): 1053-1056 (2016) - Kun He, Jing Chen, Ruiying Du, Qianhong Wu, Guoliang Xue, Xiang Zhang:
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments. IEEE Trans. Computers 65(12): 3631-3645 (2016) - 2015
- Jing Chen, Quan Yuan, Guoliang Xue, Ruiying Du:
Game-theory-based batch identification of invalid signatures in wireless mobile networks. INFOCOM 2015: 262-270 - 2010
- Yan-Fang Fan, Xue-Jie Bai, Rui-Ying Liu, Sheng Xing:
The research of Chinese chess based on database with self learning. ICMLC 2010: 319-322 - 2004
- Ruiying Shi, Min Gong, Xunchun Liu, Haifen Sun, Zhipeng Yuan:
Self-aligned In0.49Ga0.51P/GaAs HBT DC and RF characteristics related with orientations. Microelectron. J. 35(11): 923-925 (2004)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-11 05:08 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint