default search action
Jiadong Lou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Jie Lian, Changlai Du, Jiadong Lou, Li Chen, Xu Yuan:
EchoSensor: Fine-grained Ultrasonic Sensing for Smart Home Intrusion Detection. ACM Trans. Sens. Networks 20(1): 10:1-10:24 (2024) - [j4]Jie Lian, Xu Yuan, Jiadong Lou, Li Chen, Hao Wang, Nian-Feng Tzeng:
Room-scale Location Trace Tracking via Continuous Acoustic Waves. ACM Trans. Sens. Networks 20(3): 61:1-61:23 (2024) - [c8]Fudong Lin, Jiadong Lou, Xu Yuan, Nian-Feng Tzeng:
Towards Robust Vision Transformer via Masked Adaptive Ensemble. CIKM 2024: 1389-1399 - [i2]Fudong Lin, Jiadong Lou, Xu Yuan, Nian-Feng Tzeng:
Towards Robust Vision Transformer via Masked Adaptive Ensemble. CoRR abs/2407.15385 (2024) - 2023
- [j3]Jiadong Lou, Xu Yuan, Purushottam Sigdel, Xiaoqi Qin, Sastry Kompella, Nian-Feng Tzeng:
Age of Information Optimization in Multi-Channel Based Multi-Hop Wireless Networks. IEEE Trans. Mob. Comput. 22(10): 5719-5732 (2023) - [c7]Jiadong Lou, Xu Yuan, Miao Pan, Hao Wang, Nian-Feng Tzeng:
Data Privacy Examination against Semi-Supervised Learning. AsiaCCS 2023: 136-148 - [c6]Jiadong Lou, Xiaohan Zhang, Yihe Zhang, Xinghua Li, Xu Yuan, Ning Zhang:
Devils in Your Apps: Vulnerabilities and User Privacy Exposure in Mobile Notification Systems. DSN 2023: 28-41 - 2021
- [j2]Jie Lian, Jiadong Lou, Li Chen, Xu Yuan:
EchoSpot: Spotting Your Locations via Acoustic Sensing. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(3): 113:1-113:21 (2021) - [j1]Jiadong Lou, Xu Yuan, Sastry Kompella, Nian-Feng Tzeng:
Boosting or Hindering: AoI and Throughput Interrelation in Routing-Aware Multi-Hop Wireless Networks. IEEE/ACM Trans. Netw. 29(3): 1008-1021 (2021) - [c5]Yihe Zhang, Xu Yuan, Jin Li, Jiadong Lou, Li Chen, Nian-Feng Tzeng:
Reverse Attack: Black-box Attacks on Collaborative Recommendation. CCS 2021: 51-68 - [c4]Jiadong Lou, Xu Yuan, Ning Zhang:
Messy States of Wiring: Vulnerabilities in Emerging Personal Payment Systems. USENIX Security Symposium 2021: 3273-3289 - [i1]Yu Zhang, Guoming Tang, Qianyi Huang, Yi Wang, Xudong Wang, Jiadong Lou:
FedNILM: Applying Federated Learning to NILM Applications at the Edge. CoRR abs/2106.07751 (2021) - 2020
- [c3]Yihe Zhang, Jiadong Lou, Li Chen, Xu Yuan, Jin Li, Tom Johnsten, Nian-Feng Tzeng:
Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems. ESORICS (1) 2020: 461-479 - [c2]Jiadong Lou, Xu Yuan, Sastry Kompella, Nian-Feng Tzeng:
AoI and Throughput Tradeoffs in Routing-aware Multi-hop Wireless Networks. INFOCOM 2020: 476-485 - [c1]Jiadong Lou, Xu Yuan, Nian-Feng Tzeng:
Instant AoI Optimization in IoT Networks with Packet Combination. SECON 2020: 1-9
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint