AI has provided us with the ability to automate tasks, extract information from vast amounts of data, and synthesize media that is nearly indistinguishable from the real thing. However …
J Lan, X Liu, B Li, J Sun, B Li, J Zhao - Computers & Security, 2022 - Elsevier
With the continuous occurrence of cybersecurity incidents, network intrusion detection has become one of the most critical issues in cyber ecosystems. Although previous machine …
J Liu - Information Processing & Management, 2021 - Elsevier
Increasingly, users are interacting with information retrieval (IR) systems with the goal of addressing complex, ill-defined search tasks. As a result, the interest in deconstructing and …
G Dupuis, P Al-Khoury, J Nieuwerf, C Favero - IOR 2021, 2021 - earthdoc.org
Reducing the carbon footprint during crude oil extraction is a growing challenge among operators and regulatory institutions. Sustainable solutions need to be implemented for …
J Liang, S Wang, S Zhao, S Chen - Computers & Security, 2023 - Elsevier
As the basic service of the network, the Domain Name System (DNS) is almost never blocked by the firewall. DNS tunnel takes advantage of this feature of DNS service to …
J Liu - Information Processing & Management, 2022 - Elsevier
Re-using research resources is essential for advancing knowledge and developing repeatable, empirically solid experiments in scientific fields, including interactive information …
J Liu, B Li, M Lei, Y Shi - Neural Networks, 2022 - Elsevier
In this paper, we tackle a new learning paradigm called learning from complementary labels, where the training data specifies classes that instances do not belong to, instead of the …
Abstract Knowledge distillation (KD) has been widely used in model compression. But, in the current multi-teacher KD algorithms, the student can only passively acquire the knowledge …
Abstract Information need is one of the most fundamental aspects of information seeking, which traditionally conceptualizes as the initiation phase of an individual's information …