Alert button
Picture for Shiyi Yang

Shiyi Yang

Alert button

Review-Incorporated Model-Agnostic Profile Injection Attacks on Recommender Systems

Add code
Bookmark button
Alert button
Feb 14, 2024
Shiyi Yang, Lina Yao, Chen Wang, Xiwei Xu, Liming Zhu

Viaarxiv icon

Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector

Add code
Bookmark button
Alert button
May 12, 2021
Peilun Wu, Shiyi Yang, Hui Guo

Figure 1 for Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector
Figure 2 for Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector
Figure 3 for Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector
Figure 4 for Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector
Viaarxiv icon

End-Effector Stabilization of a 10-DOF Mobile Manipulator using Nonlinear Model Predictive Control

Add code
Bookmark button
Alert button
Mar 24, 2021
Mostafa Osman, Mohamed W. Mehrez, Shiyi Yang, Soo Jeon, William Melek

Figure 1 for End-Effector Stabilization of a 10-DOF Mobile Manipulator using Nonlinear Model Predictive Control
Figure 2 for End-Effector Stabilization of a 10-DOF Mobile Manipulator using Nonlinear Model Predictive Control
Figure 3 for End-Effector Stabilization of a 10-DOF Mobile Manipulator using Nonlinear Model Predictive Control
Figure 4 for End-Effector Stabilization of a 10-DOF Mobile Manipulator using Nonlinear Model Predictive Control
Viaarxiv icon

DualNet: Locate Then Detect Effective Payload with Deep Attention Network

Add code
Bookmark button
Alert button
Oct 23, 2020
Shiyi Yang, Peilun Wu, Hui Guo

Figure 1 for DualNet: Locate Then Detect Effective Payload with Deep Attention Network
Figure 2 for DualNet: Locate Then Detect Effective Payload with Deep Attention Network
Figure 3 for DualNet: Locate Then Detect Effective Payload with Deep Attention Network
Figure 4 for DualNet: Locate Then Detect Effective Payload with Deep Attention Network
Viaarxiv icon

Densely Connected Residual Network for Attack Recognition

Add code
Bookmark button
Alert button
Aug 05, 2020
Peilun Wu, Nour Moustafa, Shiyi Yang, Hui Guo

Figure 1 for Densely Connected Residual Network for Attack Recognition
Figure 2 for Densely Connected Residual Network for Attack Recognition
Figure 3 for Densely Connected Residual Network for Attack Recognition
Figure 4 for Densely Connected Residual Network for Attack Recognition
Viaarxiv icon