Zobrazeno 1 - 10
of 219
pro vyhledávání: '"LU, Jialiang"'
Two near-threshold peaking structures with spin-parities $J^{PC}=0^{++}$ were recently discovered by the LHCb Collaboration in the $D_s^+D_s^-$ invariant mass distribution of the decay process $B^+\to D_s^+D_s^-K^+$. In our study, we employed a coupl
Externí odkaz:
http://arxiv.org/abs/2312.02454
The classification of fifth-generation New-Radio (5G-NR) mobile network traffic is an emerging topic in the field of telecommunications. It can be utilized for quality of service (QoS) management and dynamic resource allocation. However, traditional
Externí odkaz:
http://arxiv.org/abs/2307.07756
The role of the triangle mechanism in the decay process $B_0\to J/\psi K^0f_0 \to J/\psi K^0\pi^+\pi^-$ and $B_0\to J\psi K^0a_0\to J/\psi K^0 \pi^0\eta$ is probed. In these process, the triangle singularity appears from the decay of $B^0$ into $J/\p
Externí odkaz:
http://arxiv.org/abs/2212.13008
Learning-based Network Intrusion Detection Systems (NIDSs) are widely deployed for defending various cyberattacks. Existing learning-based NIDS mainly uses Neural Network (NN) as a classifier that relies on the quality and quantity of cyberattack dat
Externí odkaz:
http://arxiv.org/abs/2201.03134
Transforming large deep neural network (DNN) models into the multi-exit architectures can overcome the overthinking issue and distribute a large DNN model on resource-constrained scenarios (e.g. IoT frontend devices and backend servers) for inference
Externí odkaz:
http://arxiv.org/abs/2110.03175
Autor:
Lu, Jialiang, Wu, Yirong, Zhan, Siyao, Zhong, Yigang, Guo, Yu, Gao, Jian, Zhang, Bo, Dong, Xiaowu, Che, Jinxin, Xu, Yizhou
Publikováno v:
In Talanta 1 April 2024 270
Autor:
Zou, Xu, Zheng, Qinkai, Dong, Yuxiao, Guan, Xinyu, Kharlamov, Evgeny, Lu, Jialiang, Tang, Jie
Graph Neural Networks (GNNs) have achieved promising performance in various real-world applications. However, recent studies have shown that GNNs are vulnerable to adversarial attacks. In this paper, we study a recently-introduced realistic attack sc
Externí odkaz:
http://arxiv.org/abs/2106.06663
Autor:
Li, Shaofeng, Liu, Hui, Dong, Tian, Zhao, Benjamin Zi Hao, Xue, Minhui, Zhu, Haojin, Lu, Jialiang
Natural language processing (NLP) systems have been proven to be vulnerable to backdoor attacks, whereby hidden features (backdoors) are trained into a language model and may only be activated by specific inputs (called triggers), to trick the model
Externí odkaz:
http://arxiv.org/abs/2105.00164
Autor:
Niu, Wente, Lu, Jialiang, Sun, Yuping, Zhang, Xiaowei, Li, Qiaojing, Cao, Xu, Liang, Pingping, Zhan, Hongming
Publikováno v:
In Applied Energy 1 March 2024 357
Publikováno v:
In Journal of Retailing and Consumer Services March 2024 77