Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2025
AdaWiFi, Collaborative WiFi Sensing for Cross-Environment Adaptation
- Naiyu Zheng,
- Yuanchun Li,
- Shiqi Jiang,
- Yuanzhe Li,
- Rongchun Yao,
- Chuchu Dong,
- Ting Chen,
- Yubo Yang,
- Zhimeng Yin,
- Yunxin Liu
IEEE Transactions on Mobile Computing (ITMV), Volume 24, Issue 2Pages 845–858https://doi.org/10.1109/TMC.2024.3474853Deep learning (DL) based Wi-Fi sensing has witnessed great development in recent years. Although decent results have been achieved in certain scenarios, Wi-Fi based activity recognition is still difficult to deploy in real smart homes due to the limited ...
- research-articleFebruary 2025
MSNet: Multi-Scale Network for Object Detection in Remote Sensing Images
AbstractRemote sensing object detection (RSOD) encounters challenges in effectively extracting features of small objects in remote sensing images (RSIs). To alleviate these problems, we proposed a Multi-Scale Network for Object Detection in Remote ...
Highlights- The parallel structure combining pointwise and partial convolution effectively reduce the number of parameters.
- The integration of context modeling and residual modules can effectively enhance small object features.
- The improved ...
- research-articleJanuary 2025
Adapting the segment anything model for multi-modal retinal anomaly detection and localization
Highlights- Segment anything model is applied for the multi-modal retinal disease diagnosis.
- A multi-modal dataset containing paired OCT and fundus images is constructed.
- Anomaly simulation and prompt-tuning strategies are used to fine-tune ...
The fusion of optical coherence tomography (OCT) and fundus modality information can provide a comprehensive diagnosis for retinal artery occlusion (RAO) disease, where OCT provides the cross-sectional examination of the fundus image. Given multi-...
- research-articleDecember 2024
Towards Automatic Discovery of Denial of Service Weaknesses in Blockchain Resource Models
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 1016–1030https://doi.org/10.1145/3658644.3690329nial-of-Service (DoS) attacks at the execution layer represent one of the most severe threats to blockchain systems, compromising availability by depleting the resources of victims. To counteract these attacks, many blockchains have implemented unique ...
- research-articleDecember 2024
fAmulet: Finding Finalization Failure Bugs in Polygon zkRollup
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 971–985https://doi.org/10.1145/3658644.3690243Zero-knowledge layer 2 protocols emerge as a compelling approach to overcoming blockchain scalability issues by processing transactions through the transaction finalization process. During this process, transactions are efficiently processed off the main ...
-
- research-articleDecember 2024
UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips
- Yuqiao Yang,
- Zhongjie Wu,
- Yongzhao Zhang,
- Ting Chen,
- Jun Li,
- Jie Yang,
- Wenhao Liu,
- Xiaosong Zhang,
- Ruicong Shi,
- Jingwei Li,
- Yu Jiang,
- Zhuo Su
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 3376–3390https://doi.org/10.1145/3658644.3670349UWB ranging systems have been adopted in many critical and security sensitive applications due to its precise positioning and secure ranging capabilities. We present a practical jamming attack, namely UWBAD, against commercial UWB ranging systems, which ...
- research-articleDecember 2024
REC-Fed: A Robust and Efficient Clustered Federated System for Dynamic Edge Networks
IEEE Transactions on Mobile Computing (ITMV), Volume 23, Issue 12Pages 15256–15273https://doi.org/10.1109/TMC.2024.3452312As a promising approach, Clustered Federated Learning (CFL) enables personalized model aggregation for heterogeneous clients. However, facing dynamic and open edge networks, previous CFL rarely considers the impact of dynamic client data on clustering ...
- research-articleDecember 2024
Restoring vision in rain-by-snow weather with simple attention-based sampling cross-hierarchy Transformer
AbstractAs an unnoticed specialized task in image restoration, rain-by-snow weather removal aims to eliminate the complicated coexisting rain streaks and snow particles. In this work, we propose a simple attention-based sampling cross-hierarchy ...
Highlights- We first focus on rain-by-snow weather-degraded image restoration.
- We propose a simple attention-based sampling cross-hierarchy Transformer.
- We demonstrate that cross-stage progression is crucial for performance improvement.
- ...
- research-articleNovember 2024JUST ACCEPTED
When ChatGPT Meets Smart Contract Vulnerability Detection: How Far Are We?
- Chong Chen,
- Jianzhong Su,
- Jiachi Chen,
- Yanlin Wang,
- Tingting Bi,
- Jianxing Yu,
- Yanli Wang,
- Xingwei Lin,
- Ting Chen,
- Zibin Zheng
ACM Transactions on Software Engineering and Methodology (TOSEM), Just Accepted https://doi.org/10.1145/3702973With the development of blockchain technology, smart contracts have become an important component of blockchain applications. Despite their crucial role, the development of smart contracts may introduce vulnerabilities and potentially lead to severe ...
- research-articleNovember 2024
Neural Schrödinger bridge for unpaired real-world image deraining
Information Sciences: an International Journal (ISCI), Volume 682, Issue Chttps://doi.org/10.1016/j.ins.2024.121199AbstractGiven the significant differences between domains, current unpaired learning methods struggle to accurately map the relationship between rainy and clear images. To this end, we introduce a neural Schrödinger bridge (NSB) for unpaired real-world ...
- research-articleOctober 2024
Unpaired Photo-realistic Image Deraining with Energy-informed Diffusion Model
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 360–369https://doi.org/10.1145/3664647.3680560Existing unpaired image deraining approaches face challenges in accurately capture the distinguishing characteristics between the rainy and clean domains, resulting in residual degradation and color distortion within the reconstructed images. To this end,...
- research-articleOctober 2024
RMCBench: Benchmarking Large Language Models' Resistance to Malicious Code
- Jiachi Chen,
- Qingyuan Zhong,
- Yanlin Wang,
- Kaiwen Ning,
- Yongkun Liu,
- Zenan Xu,
- Zhe Zhao,
- Ting Chen,
- Zibin Zheng
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 995–1006https://doi.org/10.1145/3691620.3695480Warning: Please note that this article contains potential harmful or offensive content. This content is only for the evaluating and analysis of LLMs and does not imply any intention to promote criminal activities.
The emergence of Large Language Models (...
- research-articleFebruary 2025
Egocentric Visual Locomotion in a Quadruped Robot
EITCE '24: Proceedings of the 2024 8th International Conference on Electronic Information Technology and Computer EngineeringPages 172–177https://doi.org/10.1145/3711129.3711160In recent years, with the rapid development of robotics and computer technology, more and more robots have been integrated into people's lives. In nature, quadrupeds use vision to perform precise and flexible movements. Imitating their vision-based motor ...
- research-articleOctober 2024
Accelerating optimization of terahertz metasurface design using principal component analysis in conjunction with deep learning networks
AbstractMetamaterials are a class of artificial materials that have exceptional physical properties that do not exist in nature. They are widely used in various fields, such as electromagnetics, optics, and acoustics. However, designing metamaterials can ...
- research-articleSeptember 2024
Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis
- Shuwei Song,
- Jiachi Chen,
- Ting Chen,
- Xiapu Luo,
- Teng Li,
- Wenwu Yang,
- Leqing Wang,
- Weijie Zhang,
- Feng Luo,
- Zheyuan He,
- Yi Lu,
- Pan Li
ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 1682–1694https://doi.org/10.1145/3650212.3680391Move, a programming language for smart contracts, stands out for its focus on security. However, the practical security efficacy of Move contracts remains an open question. This work conducts the first comprehensive empirical study on the security of ...
- research-articleSeptember 2024
CoSec: On-the-Fly Security Hardening of Code LLMs via Supervised Co-decoding
ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 1428–1439https://doi.org/10.1145/3650212.3680371Large Language Models (LLMs) specialized in code have shown exceptional proficiency across various programming-related tasks, particularly code generation. Nonetheless, due to its nature of pretraining on massive uncritically filtered data, prior studies ...
- research-articleSeptember 2024Distinguished Paper
Identifying Smart Contract Security Issues in Code Snippets from Stack Overflow
ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 1198–1210https://doi.org/10.1145/3650212.3680353Smart contract developers frequently seek solutions to developmental challenges on Q&A platforms such as Stack Overflow (SO). Although community responses often provide viable solutions, the embedded code snippets can also contain hidden vulnerabilities. ...
- research-articleSeptember 2024
LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart Contracts
ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 566–577https://doi.org/10.1145/3650212.3680303Symbolic execution has proven effective for code analytics in smart contracts. However, for smart contracts, existing symbolic tools use multiple-transaction symbolic execution, which differs from traditional symbolic tools and also exacerbates the path ...
- research-articleAugust 2024
RareBench: Can LLMs Serve as Rare Diseases Specialists?
KDD '24: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 4850–4861https://doi.org/10.1145/3637528.3671576Generalist Large Language Models (LLMs), such as GPT-4, have shown considerable promise in various domains, including medical diagnosis. Rare diseases, affecting approximately 300 million people worldwide, often have unsatisfactory clinical diagnosis ...
- research-articleAugust 2024
Leveraging MPPT capability for solar irradiance estimation: H-INC-IBS-based assessment of explicit models under real-world climatic conditions
Computers and Electrical Engineering (CENG), Volume 118, Issue PAhttps://doi.org/10.1016/j.compeleceng.2024.109366Highlight- Comprehensive review of non-driven irradiance estimation methods.
- Detail analysis of the of IV-G and I-G models.
- Assessment of estimation models using 37 climatic patterns.
- MPPT accuracry is proporionate to irradiance estimation ...
This research investigates a low-cost method for estimating irradiance. The approach uses maximum power point tracking (MPPT) to easily estimate irradiance in a Photovoltaic (PV) system. Two main explicit mathematical models "IV-G" and "I-G" are ...