发表论文
(1) Learning to Select Prototypical Parts for Interpretable Sequential Data Modeling, AAAI 2023, 2023, 第 2 作者(2) BiGNN: A Bilateral-Branch Graph Neural Network to Solve Popularity Bias in Recommendation, ICTAI 2022, 2022, 第 2 作者(3) 融合时序和逻辑关系的日志异常检测系统设计, Design of Log-Based Anomaly Detection System Based on Temporal and Logical Relationship, 信息网络安全, 2022, 第 3 作者(4) Incorporating Common Knowledge and Specific Entity Linking Knowledge for Machine Reading Comprehension, The 14th International Conference on Knowledge Science, Engineering and Management (KSEM 2021), 2021, 第 2 作者(5) CMVCG: Non-autoregressive Conditional Masked Live Video Comments Generation Model, The annual International Joint Conference on Neural Networks, 2021, 第 3 作者(6) Protecting Data Privacy in Federated Learning Combining Differential Privacy and Weak Encryption, International Conference on Science of Cyber Security, 2021, 第 4 作者(7) Learning from Audience Interaction: Multi-Instance Multi-Label Topic Model for Video Shots Annotating, PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, 通讯作者(8) PLVCG: A Pretraining Based Model for Live Video Comment Generation, ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2021, PT II, 2021, 第 2 作者(9) Incorporating Attributes Semantics into Knowledge Graph Embeddings, PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, 通讯作者(10) Image-Enhanced Multi-Modal Representation for Local Topic Detection from Social Media, 26th International Conference on Database Systems for Advanced Applications, 2021, 第 2 作者(11) TEA-RNN: Topic-Enhanced Attentive RNN for Attribute Inference Attacks via User Behaviors, PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, 通讯作者(12) PrivRec: User-centric Differentially Private Collaborative Filtering using LSH and KD, The 27th International Conference on Neural Information Processing, 2020, 通讯作者(13) Knowledge Graph Embedding Based on Relevance and Inner Sequence of Relations, The 27th International Conference on Neural Information Processing, 2020, 第 2 作者(14) FGCRec: Fine-Grained Geographical Characteristics Modeling for Point-of-Interest Recommendation, ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020, 第 7 作者(15) SECL: Separated Embedding and Correlation Learning for Demographic Prediction in Ubiquitous Sensor Scenario, 2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2020, 通讯作者(16) TransMVG: Knowledge Graph Embedding based on Multiple-Valued Gates, 21st International Conference on Web Information Systems Engineering (WISE 2020), 2020, 第 1 作者(17) Leveraging Knowledge Context Information to Enhance Personalized Recommendation, The 27th International Conference on Neural Information Processing, 2020, 通讯作者(18) A Practical Defense against Attribute Inference Attacks in Session-based Recommendations, 2020 IEEE International Conference on Web Services, 2020, 第 1 作者(19) Binarized Attributed Network Embedding via Neural Networks, 2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2020, 通讯作者(20) MACM: How to Reduce the Multi-Round SCA to the Single-Round Attack on the Feistel-SP Networks, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 第 3 作者(21) Flush-Detector: More Secure API Resistant to Flush-Based Spectre Attacks on ARM Cortex-A9, ISCC, 2020, 第 4 作者(22) Multiple Demographic Attribute Prediction in Mobile and Sensor devices, Pacific-Asia Conference on Knowledge Discovery and Data Mining, 2020, 第 1 作者(23) Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation, IEEE TRANSACTIONS ON MOBILE COMPUTING, 2020, 第 7 作者(24) TransBidiFilter: Knowledge Embedding Based On A Bidirectional Filter, The 9th CCF International Conference on Natural Language Processing and Chinese Computing(NLPCC 2020), 2020, 第 1 作者(25) FGRec: A Fine-Grained Point-of-Interest Recommendation Framework by Capturing Intrinsic Influences, 2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2020, 第 7 作者(26) A Hardware/Software Collaborative SM4 Implementation Resistant to Side-channel Attacks on ARM-FPGA Embedded SoC, ISCC, 2020, 第 4 作者(27) User Alignment with Jumping Seed Alignment Information Propagation, 2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2020, 第 3 作者(28) User Preference Excitation Network for Sequential Recommendation, 18th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2020, 通讯作者(29) Personalized Point-of-Interest Recommendation on Ranking with Poisson Factorization, 2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019, 第 6 作者(30) 事件库构建技术综述, Event Database Construction Techniques, 信息安全学报, 2019, 第 2 作者(31) TransGate: Knowledge Graph Embedding with Shared Gate Structure, THIRTY-THIRD AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FIRST INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / NINTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2019, 第 2 作者(32) HRec: Heterogeneous Graph Embedding-Based Personalized Point-of-Interest Recommendation, NEURAL INFORMATION PROCESSING (ICONIP 2019), PT III, 2019, 第 7 作者(33) HidingGAN: High Capacity Information Hiding with Generative Adversarial Network, COMPUTER GRAPHICS FORUM, 2019, 第 2 作者(34) Your Pedometer tells you: Attribute Inference via Daily Walking Step Count, The 16th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC 2019), 2019, 第 1 作者(35) The Application of Network based Embedding in Local Topic Detection from Social Media, 2019 IEEE 31ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2019), 2019, 第 2 作者(36) Node-Edge Bilateral Attributed Network Embedding, the 26th International Conference on Neural Information Processing, 2019, 第 1 作者(37) Dynamic Graph Link Prediction by Semantic Evolution, ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019, 第 6 作者(38) STNet: A Style Transformation Network for Deep Image Steganography, NEURAL INFORMATION PROCESSING (ICONIP 2019), PT II, 2019, 第 2 作者(39) 针对增强型旋转S盒掩码方案的侧信道安全漏洞系统研究, Systematic Research on the Side Channel Vulnerabilities of Improved Rotating S-box Masking Scheme, 信息安全学报, 2019, 第 4 作者(40) Demographic Prediction from Purchase Data based on Knowledge-Aware Embedding, the 26th International Conference on Neural Information Processing, 2019, 第 1 作者(41) Knowledge Graph Embedding with Order Information of Triplets, ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2019, PT III, 2019, 第 2 作者(42) TransI: Translating Infinite Dimensional Embeddings based on Trend Smooth Distance., The 12th International Conference on Knowledge Science, Engineering and Management, KSEM2019, 2019, 第 2 作者(43) Local Topic Detection Using Word Embedding from Spatio-Temporal Social Media, the 26th International Conference on Neural Information Processing, 2019, 通讯作者(44) Aligning Users Across Social Networks by Joint User and Label Consistence Representation, NEURAL INFORMATION PROCESSING (ICONIP 2019), PT II, 2019, 第 3 作者(45) Perceiving Topic Bubbles: Local Topic Detection in Spatio-Temporal Tweet Stream, DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2019), PT II, 2019, 第 2 作者(46) MultNet: An Efficient Network Representation Learning for Large-scale Social Relation Extraction, In 25th International Conference on Neural Information Processing(ICONIP), 2018, 第 1 作者(47) A MIML-LSTM Neural Network for Integrated Fine-Grained Event Forecasting, In 2018 International Conferenceon Big Data Technologies ICBDT 2018, 2018, 第 5 作者(48) CNN-Based Chinese Character Recognition with Skeleton Feature, NEURAL INFORMATION PROCESSING (ICONIP 2018), PT V, 2018, 第 6 作者(49) SSteGAN: Self-learning Steganography Based on Generative Adversarial Networks, NEURAL INFORMATION PROCESSING (ICONIP 2018), PT II, 2018, 第 2 作者(50) Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-channel Attacks on All Programmable SoC, In 23rd European Symposium on Research in Computer Security (ESORICS 2018), 2018, 第 2 作者(51) NANE: Attributed Network Embedding with Local and Global Information, WEB INFORMATION SYSTEMS ENGINEERING, WISE 2018, PT I, 2018, 通讯作者(52) Learning from Audience Intelligence: Dynamic Labeled LDA Model for Time-Sync Commented Video Tagging, In 25th International Conference on Neural Information Processing(ICONIP), 2018, 第 1 作者(53) Translation-Based Attributed Network Embedding, 2018 IEEE 30TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI), 2018, 第 2 作者(54) 网络基因图谱—网络安全新领域, 信息安全研究期刊, 2017, 第 1 作者(55) A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers, 15th International Conference on Applied Cryptography and Network Security (ACNS2017), 2017, 第 4 作者(56) System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation, MOBISYS'17: PROCEEDINGS OF THE 15TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2017, 第 7 作者(57) 网络基因图谱研究, Research on Network Genetic Map, 信息安全研究, 2016, 第 4 作者(58) Novel MITM Attacks on Security Protocols in SDN: A Feasibility Study, 18th International Conference on Information and Communication Security, 2016, 第 2 作者(59) Detecting Side Channel Vulnerabilities in Improved Rotating S-box Masking Scheme: Presenting Four Non-profiled Attacks, SAC 2016, 2016, 第 2 作者(60) Leakage Fingerprints - A Non-negligible Vulnerability in Side-Channel Analysis, ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, 第 2 作者(61) 基于RFID智能卡的Android移动终端数据保护方案, RFID smartcard-based data protection scheme for Android mobile terminal, 计算机工程与应用, 2016, 第 3 作者(62) 安卓系统服务中输入验证型漏洞的初步分析, Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services, 信息安全学报, 2016, 第 2 作者(63) 安全的Android移动终端内容保护方案, Project for protecting security of content on Android, 计算机工程与设计, 2016, 第 4 作者(64) Android数据安全存储平台的设计与实现, Design and Implementation of Android Security Data Storage Platform, 信息网络安全, 2015, 第 2 作者(65) 基于Shadow DOM和改进PBE的安全口令管理器, Secure Password Manager Based on Shadow DOM and Improved PBE, 信息网络安全, 2015, 第 2 作者(66) Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services, ACSAC, 2015, 第 1 作者(67) QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations, Information and Communications Security. ICICS 2015, 2015, 第 3 作者(68) Input Validation Vulnerabilities in Android System Services: A First Analysis, Annual Computer Security Applications Conference 2015, 2015, 第 1 作者(69) 基于模拟器的沙箱系统研究, Research on Emulator-Based Sandbox Systems, 信息网络安全, 2015, 第 3 作者(70) RIKE plus : using revocable identities to support key escrow in public key infrastructures with flexibility, IET INFORMATION SECURITY, 2015, 第 6 作者(71) 分布式SDN控制器的规则冲突解决方案, Solution for Rule Conlfict under Distributed SDN Controller System, 信息网络安全, 2014, 第 2 作者(72) A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm, Information security practice and experience :, 2014, 第 3 作者(73) 对SIP认证协议的安全性分析与改进, Security Analysis and Improvement of an Authentication Protocol for SIP, 信息网络安全, 2013, 第 3 作者(74) 基于SM3算法的动态口令卡的设计与实现, DESIGN AND IMPLEMENTATION OF DYNAMIC PASSWORD CARD BASED ON SM3 ALGORITHM, 计算机应用与软件, 2013, 第 2 作者(75) An Efficient Reconfigurable II-ONB Modular Multiplier, SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 第 4 作者(76) 云计算中的认证机制研究, Research on Authentication Mechanisms in Cloud Computing, 信息网络安全, 2013, 第 2 作者(77) RIKE: Using Revocable Identities to Support Key Escrow in PKIs, 10th International Conference on Applied Cryptography and Network Security (ACNS), 2012, (78) 一种云计算中的多重身份认证与授权方案, A Multi-identities Authentication and Authorization Schema in Cloud Computing, 信息网络安全, 2012, 第 2 作者(79) Towards attack resilient social network based threshold signing, Information Security and Cryptology. Springer Berlin Heidelberg, 2012, 2012, 第 1 作者(80) 云计算中的身份认证技术研究, Research on the Authentication in Cloud Computing, 信息网络安全, 2012, 第 2 作者(81) 基于NFS协议的存储加密代理设计与实现, Design and Implementation of NFS-based Storage Encryption Agent, 信息网络安全, 2011, 第 4 作者(82) 基于GPGPU和CUDA的高速AES算法的实现和优化, Implementation and optimization of high speed AES algorithm based on GPGPU and CUDA, 中国科学院研究生院学报, 2011, 第 2 作者(83) 基于Parameter-free 聚类新闻Web网页中的话题发现, ICEBI 2010, 2010, 第 1 作者(84) 高效的验证码识别技术与验证码分类思想, Efficient CAPTCHA Recognition Technology and CAPTCHA Classification Idea, 计算机工程, 2009, 第 1 作者(85) 一种基于门限签名的可靠蠕虫特征产生系统, A Dependable Worm Signature Generation System Based on Threshold Signature, 计算机学报, 2009, 第 2 作者(86) 面向电子文档的协作式访问控制模型, Coordinate access control model for electronic documents, 计算机工程与设计, 2008, 第 3 作者(87) 基于RFC2025的PKI内部通信安全实现, Implementation of Communication Security in PKI System Based on RFC2025, 计算机工程, 2007, 第 2 作者(88) 一种基于数据挖掘的拒绝服务攻击检测技术, A Data-Mining Based DoS Detection Technique, 计算机学报, 2006, 第 1 作者(89) OCTAVE风险评估方法在电子政务中的应用, 信息网络安全, 2006, 第 3 作者(90) 美国信息安全发展策略导向评述, Comment on New Strategies of Information Security Development in USA, 计算机应用研究, 2006, 第 2 作者(91) 网站欺骗攻击技术及其防范, 信息网络安全, 2005, 第 2 作者(92) 一种基于数字证书的网络设备身份认证机制, Mechanism of Authenticating the Identity of Network Devices Based on Digital Certificates, 计算机工程, 2004, 第 1 作者(93) 聚类算法在网络入侵检测中的应用, Application of Cluster Algorithm in Network Intrusion Detection, 计算机工程, 2003, 第 2 作者