Alert button
Picture for Chunming Wu

Chunming Wu

Alert button

Self-Supervised Interest Transfer Network via Prototypical Contrastive Learning for Recommendation

Add code
Bookmark button
Alert button
Feb 28, 2023
Guoqiang Sun, Yibin Shen, Sijin Zhou, Xiang Chen, Hongyan Liu, Chunming Wu, Chenyi Lei, Xianhui Wei, Fei Fang

Figure 1 for Self-Supervised Interest Transfer Network via Prototypical Contrastive Learning for Recommendation
Figure 2 for Self-Supervised Interest Transfer Network via Prototypical Contrastive Learning for Recommendation
Figure 3 for Self-Supervised Interest Transfer Network via Prototypical Contrastive Learning for Recommendation
Figure 4 for Self-Supervised Interest Transfer Network via Prototypical Contrastive Learning for Recommendation
Viaarxiv icon

Towards the Desirable Decision Boundary by Moderate-Margin Adversarial Training

Add code
Bookmark button
Alert button
Jul 16, 2022
Xiaoyu Liang, Yaguan Qian, Jianchang Huang, Xiang Ling, Bin Wang, Chunming Wu, Wassim Swaileh

Figure 1 for Towards the Desirable Decision Boundary by Moderate-Margin Adversarial Training
Figure 2 for Towards the Desirable Decision Boundary by Moderate-Margin Adversarial Training
Figure 3 for Towards the Desirable Decision Boundary by Moderate-Margin Adversarial Training
Figure 4 for Towards the Desirable Decision Boundary by Moderate-Margin Adversarial Training
Viaarxiv icon

Treating Crowdsourcing as Examination: How to Score Tasks and Online Workers?

Add code
Bookmark button
Alert button
Apr 26, 2022
Guangyang Han, Sufang Li, Runmin Wang, Chunming Wu

Figure 1 for Treating Crowdsourcing as Examination: How to Score Tasks and Online Workers?
Figure 2 for Treating Crowdsourcing as Examination: How to Score Tasks and Online Workers?
Figure 3 for Treating Crowdsourcing as Examination: How to Score Tasks and Online Workers?
Figure 4 for Treating Crowdsourcing as Examination: How to Score Tasks and Online Workers?
Viaarxiv icon

Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art

Add code
Bookmark button
Alert button
Dec 23, 2021
Xiang Ling, Lingfei Wu, Jiangyu Zhang, Zhenqing Qu, Wei Deng, Xiang Chen, Chunming Wu, Shouling Ji, Tianyue Luo, Jingzheng Wu, Yanjun Wu

Figure 1 for Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Figure 2 for Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Figure 3 for Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Figure 4 for Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Viaarxiv icon

Towards Imperceptible Adversarial Image Patches Based on Network Explanations

Add code
Bookmark button
Alert button
Dec 10, 2020
Yaguan Qian, Jiamin Wang, Bin Wang, Zhaoquan Gu, Xiang Ling, Chunming Wu

Figure 1 for Towards Imperceptible Adversarial Image Patches Based on Network Explanations
Figure 2 for Towards Imperceptible Adversarial Image Patches Based on Network Explanations
Figure 3 for Towards Imperceptible Adversarial Image Patches Based on Network Explanations
Figure 4 for Towards Imperceptible Adversarial Image Patches Based on Network Explanations
Viaarxiv icon

Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems

Add code
Bookmark button
Alert button
Dec 04, 2020
Mayra Macas, Chunming Wu

Figure 1 for Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems
Figure 2 for Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems
Figure 3 for Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems
Figure 4 for Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems
Viaarxiv icon

Deep Graph Matching and Searching for Semantic Code Retrieval

Add code
Bookmark button
Alert button
Oct 24, 2020
Xiang Ling, Lingfei Wu, Saizhuo Wang, Gaoning Pan, Tengfei Ma, Fangli Xu, Alex X. Liu, Chunming Wu, Shouling Ji

Figure 1 for Deep Graph Matching and Searching for Semantic Code Retrieval
Figure 2 for Deep Graph Matching and Searching for Semantic Code Retrieval
Figure 3 for Deep Graph Matching and Searching for Semantic Code Retrieval
Figure 4 for Deep Graph Matching and Searching for Semantic Code Retrieval
Viaarxiv icon

EI-MTD:Moving Target Defense for Edge Intelligence against Adversarial Attacks

Add code
Bookmark button
Alert button
Oct 11, 2020
Yaguan Qian, Qiqi Shao, Jiamin Wang, Xiang Lin, Yankai Guo, Zhaoquan Gu, Bin Wang, Chunming Wu

Figure 1 for EI-MTD:Moving Target Defense for Edge Intelligence against Adversarial Attacks
Figure 2 for EI-MTD:Moving Target Defense for Edge Intelligence against Adversarial Attacks
Figure 3 for EI-MTD:Moving Target Defense for Edge Intelligence against Adversarial Attacks
Figure 4 for EI-MTD:Moving Target Defense for Edge Intelligence against Adversarial Attacks
Viaarxiv icon