default search action
Yujin Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Fucai Ke, Weiqing Wang, Weicong Tan, Lan Du, Yuan Jin, Yujin Huang, Hongzhi Yin:
HiTSKT: A hierarchical transformer model for session-aware knowledge tracing. Knowl. Based Syst. 284: 111300 (2024) - [j5]Han Hu, Yujin Huang, Qiuyuan Chen, Terry Yue Zhuo, Chunyang Chen:
A First Look at On-device Models in iOS Apps. ACM Trans. Softw. Eng. Methodol. 33(1): 26:1-26:30 (2024) - [c7]Yuncheng Hua, Yujin Huang, Shuo Huang, Tao Feng, Lizhen Qu, Christopher Bain, Richard Bassed, Reza Haf:
Causal Discovery Inspired Unsupervised Domain Adaptation for Emotion-Cause Pair Extraction. EMNLP (Findings) 2024: 8139-8156 - [i13]Yuncheng Hua, Yujin Huang, Shuo Huang, Tao Feng, Lizhen Qu, Chris Bain, Richard Bassed, Gholamreza Haffari:
Causal Discovery Inspired Unsupervised Domain Adaptation for Emotion-Cause Pair Extraction. CoRR abs/2406.15490 (2024) - 2023
- [c6]Terry Yue Zhuo, Zhuang Li, Yujin Huang, Fatemeh Shiri, Weiqing Wang, Gholamreza Haffari, Yuan-Fang Li:
On Robustness of Prompt-based Semantic Parsing with Large Pre-trained Language Model: An Empirical Study on Codex. EACL 2023: 1090-1102 - [c5]Han Hu, Haolan Zhan, Yujin Huang, Di Liu:
Pairwise GUI Dataset Construction Between Android Phones and Tablets. NeurIPS 2023 - [c4]Ye Sang, Yujin Huang, Shuo Huang, Helei Cui:
Beyond the Model: Data Pre-processing Attack to Deep Learning Models in Android Apps. SecTL@AsiaCCS 2023: 3:1-3:9 - [c3]Zijian Wang, Shuo Huang, Yujin Huang, Helei Cui:
Energy-Latency Attacks to On-Device Neural Networks via Sponge Poisoning. SecTL@AsiaCCS 2023: 4:1-4:11 - [c2]Yujin Huang, Terry Yue Zhuo, Qiongkai Xu, Han Hu, Xingliang Yuan, Chunyang Chen:
Training-free Lexical Backdoor Attacks on Language Models. WWW 2023: 2198-2208 - [i12]Terry Yue Zhuo, Yujin Huang, Chunyang Chen, Zhenchang Xing:
Exploring AI Ethics of ChatGPT: A Diagnostic Analysis. CoRR abs/2301.12867 (2023) - [i11]Terry Yue Zhuo, Zhuang Li, Yujin Huang, Yuan-Fang Li, Weiqing Wang, Gholamreza Haffari, Fatemeh Shiri:
On Robustness of Prompt-based Semantic Parsing with Large Pre-trained Language Model: An Empirical Study on Codex. CoRR abs/2301.12868 (2023) - [i10]Yujin Huang, Terry Yue Zhuo, Qiongkai Xu, Han Hu, Xingliang Yuan, Chunyang Chen:
Training-free Lexical Backdoor Attacks on Language Models. CoRR abs/2302.04116 (2023) - [i9]Zijian Wang, Shuo Huang, Yujin Huang, Helei Cui:
Energy-Latency Attacks to On-Device Neural Networks via Sponge Poisoning. CoRR abs/2305.03888 (2023) - [i8]Ye Sang, Yujin Huang, Shuo Huang, Helei Cui:
Beyond the Model: Data Pre-processing Attack to Deep Learning Models in Android Apps. CoRR abs/2305.03963 (2023) - [i7]Jason Ching Yuen Siu, Jieshan Chen, Yujin Huang, Zhenchang Xing, Chunyang Chen:
Towards Real Smart Apps: Investigating Human-AI Interactions in Smartphone On-Device AI Apps. CoRR abs/2307.00756 (2023) - [i6]Han Hu, Yujin Huang, Qiuyuan Chen, Terry Yue Zhuo, Chunyang Chen:
A First Look at On-device Models in iOS Apps. CoRR abs/2307.12328 (2023) - [i5]Han Hu, Haolan Zhan, Yujin Huang, Di Liu:
A Pairwise Dataset for GUI Conversion and Retrieval between Android Phones and Tablets. CoRR abs/2307.13225 (2023) - [i4]Han Hu, Haolan Zhan, Yujin Huang, Di Liu:
Pairwise GUI Dataset Construction Between Android Phones and Tablets. CoRR abs/2310.04755 (2023) - 2022
- [j4]Xuesong Liang, Yongpeng Wu, Yujin Huang, Derrick Wing Kwan Ng, Pei Li, Yingbiao Yao:
Performance Optimization and Analysis on P2P Mobile Communication Systems Accelerated by MEC Servers. KSII Trans. Internet Inf. Syst. 16(1): 188-210 (2022) - [j3]Yujin Huang, Chunyang Chen:
Smart App Attack: Hacking Deep Learning Models in Android Apps. IEEE Trans. Inf. Forensics Secur. 17: 1827-1840 (2022) - [i3]Yujin Huang, Chunyang Chen:
Smart App Attack: Hacking Deep Learning Models in Android Apps. CoRR abs/2204.11075 (2022) - [i2]Fucai Ke, Weiqing Wang, Weicong Tan, Lan Du, Yuan Jin, Yujin Huang, Hongzhi Yin:
HiTSKT: A Hierarchical Transformer Model for Session-Aware Knowledge Tracing. CoRR abs/2212.12139 (2022) - 2021
- [c1]Yujin Huang, Han Hu, Chunyang Chen:
Robustness of on-Device Models: Adversarial Attack to Deep Learning Models on Android Apps. ICSE (SEIP) 2021: 101-110 - [i1]Yujin Huang, Han Hu, Chunyang Chen:
Robustness of on-device Models: Adversarial Attack to Deep Learning Models on Android Apps. CoRR abs/2101.04401 (2021)
2010 – 2019
- 2019
- [j2]Hengli Song, Haobin Dong, Zhiwen Yuan, Jun Zhu, Haiyang Zhang, Yujin Huang:
An EEMD-Based Electromagnetic Induction Method for Nondestructive Testing of Buried Metal Conductors. IEEE Access 7: 142261-142271 (2019) - [j1]Wei Xue, Yan Luo, Yue Yang, Yujin Huang:
Noise Suppression for GPR Data Based on SVD of Window-Length-Optimized Hankel Matrix. Sensors 19(17): 3807 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint