Zobrazeno 1 - 10
of 300
pro vyhledávání: '"Ma, Wenrui"'
Autor:
Liu, Ran, Ma, Wenrui, Zippi, Ellen, Pouransari, Hadi, Xiao, Jingyun, Sandino, Chris, Mahasseni, Behrooz, Minxha, Juri, Azemi, Erdrin, Dyer, Eva L., Moin, Ali
Time series data are inherently functions of time, yet current transformers often learn time series by modeling them as mere concatenations of time periods, overlooking their functional properties. In this work, we propose a novel objective for trans
Externí odkaz:
http://arxiv.org/abs/2410.08421
Currently, deep learning successfully applies to code vulnerability detection by learning from code sequences or property graphs. However, sequence-based methods often overlook essential code attributes such as syntax, control flow, and data dependen
Externí odkaz:
http://arxiv.org/abs/2404.14719
Adversarial attacks induce misclassification by introducing subtle perturbations. Recently, diffusion models are applied to the image classifiers to improve adversarial robustness through adversarial training or by purifying adversarial noise. Howeve
Externí odkaz:
http://arxiv.org/abs/2404.08273
Autor:
Kaushik, Chiraag, Liu, Ran, Lin, Chi-Heng, Khera, Amrit, Jin, Matthew Y, Ma, Wenrui, Muthukumar, Vidya, Dyer, Eva L
Classification models are expected to perform equally well for different classes, yet in practice, there are often large gaps in their performance. This issue of class bias is widely studied in cases of datasets with sample imbalance, but is relative
Externí odkaz:
http://arxiv.org/abs/2402.11742
In evolving cyber landscapes, the detection of malicious URLs calls for cooperation and knowledge sharing across domains. However, collaboration is often hindered by concerns over privacy and business sensitivities. Federated learning addresses these
Externí odkaz:
http://arxiv.org/abs/2312.03636
Although advancements in machine learning have driven the development of malicious URL detection technology, current techniques still face significant challenges in their capacity to generalize and their resilience against evolving threats. In this p
Externí odkaz:
http://arxiv.org/abs/2312.00508
Autor:
Zhangsun, Xuanzi, Guo, Honghong, Du, Quanjie, Li, Na, Xue, Shuhong, Li, Rong, Ma, Wenrui, Liu, Xiang, Zhang, Haihan, Huang, Tinglin
Publikováno v:
In Journal of Hazardous Materials 5 November 2024 479
Publikováno v:
In Computer Networks November 2024 253
Autor:
Zhou, Shenghui, Ma, Wenrui, Kosari, Mohammadreza, Lim, Alvin M.H., Kozlov, Sergey M., Zeng, Hua Chun
Publikováno v:
In Applied Catalysis B: Environment and Energy 15 July 2024 349
Autor:
Ma, Wenrui, Liu, Lulu, Jiang, Zhuoya, Zhao, Chaoshan, Lv, Zilan, Yang, Yuping, Xu, Yi, Wang, Li, Chen, Li, Li, Shunbo
Publikováno v:
In Analytica Chimica Acta 8 June 2024 1307