Majority of work done by MAIL/SAIL members!
Submission History shows the venues where the work has been submitted (🙃 including rejections 🙃). I hope some of my poor rejection/failure histories (record now is 10 rejections 😅) give you some encouragement to try again when things don't work out (don't give up -- good work doesn't need to be rushed)!
publications by categories in reversed chronological order. An up-to-date list is available on Google Scholar.
- CODS-COMAD Class-Aware Contrastive Optimization for Imbalanced Text ClassificationIn 8th International Conference on Data Science and Management of Data 2024
- ECCV Data Poisoning Quantization Backdoor AttackIn European Conference on Computer Vision 2024
- ICPR Composite Concept Extraction through BackdooringIn 27th International Conference on Pattern Recognition 2024
- ACL-Findings Fooling the Textual Fooler via Randomizing Latent RepresentationsIn Findings of the Association for Computational Linguistics 2024
- ICLR Understanding the Robustness of Randomized Feature Defense Against Query-Based Adversarial AttacksIn The Twelfth International Conference on Learning Representations 2024
- NeurIPS Iba: Towards irreversible backdoor attacks in federated learningAdvances in Neural Information Processing Systems 2024
- EAAI Backdoor attacks and defenses in federated learning: Survey, challenges and future research directionsEngineering Applications of Artificial Intelligence 2024
- UAI Cold-start Recommendation by Personalized Embedding Region ElicitationIn The Conference on Uncertainty in Artificial Intelligence 2023
- ACML Empirical Study of Federated Unlearning: Efficiency and EffectivenessIn Asian Conference on Machine Learning 2023
- SIGIR Asymmetric Hashing for Fast Ranking via Neural Network MeasuresIn 46th International ACM SIGIR Conference on Research and Development in Information Retrieval 2023
- AAAI Defending backdoor attacks on vision transformer via patch processingIn AAAI Conference on Artificial Intelligence 2023
- ACCV Unified Learning of Multipurpose Energy Based Generative Hashing NetworkIn Sixteenth Asian Conference on Computer Vision 2022
- arXiv Image Generation Via Minimizing Fréchet Distance in Discriminator Feature SpacearXiv preprint arXiv:2003.11774 2020
- arXiv Image Hashing by Minimizing Discrete Component-wise Wasserstein DistancearXiv preprint arXiv:2003.00134 2020
- arXiv Regression via implicit models and optimal transport cost minimizationarXiv preprint arXiv:2003.01296 2020
- BigData Targeted display advertising: the case of preferential attachmentIn Proceedings of the 2019 IEEE International Conference on Big Data 2019
- PAKDD An Attentive Spatio-Temporal Neural Model for Successive Point of Interest Recommendation.In Proceedings of the 2019 Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) 2019
- BigData Evaluating the impact of data placement to spark and SciDB with an Earth Science use caseIn Proceedings of the 2016 IEEE International Conference on Big Data 2016
- IGARSS Implications of data placement strategy to Big Data technologies based on shared-nothing architecture for geosciencesIn 2016 IEEE International Geoscience and Remote Sensing Symposium (IGARSS) 2016
- AGU SciDB versus Spark: A preliminary comparison based on an Earth science use caseIn AGU Fall Meeting Abstracts 2015
- BigData Performance comparison of big-data technologies in locating intersections in satellite ground tracksIn Proceedings of the 2014 ASE BigData/SocialInformatics/PASSAT/BioMedCom Conference 2014
- AGU A Demonstration of Big Data Technology for Data Intensive Earth ScienceIn AGU Fall Meeting Abstracts 2013