{"id":318,"date":"2021-10-03T21:50:51","date_gmt":"2021-10-03T13:50:51","guid":{"rendered":"http:\/\/dspace.ustc.edu.cn\/wordpress\/?page_id=318"},"modified":"2026-02-05T13:00:15","modified_gmt":"2026-02-05T05:00:15","slug":"%e5%8f%91%e8%a1%a8%e8%ae%ba%e6%96%87","status":"publish","type":"page","link":"https:\/\/dspace.ustc.edu.cn\/?page_id=318","title":{"rendered":"\u53d1\u8868\u8bba\u6587"},"content":{"rendered":"\n<h3>2026\u5e74<\/h3>\n\n\n\n<ol><li>Rui Jin, Yong Liao, <em><strong>&#8220;<a href=\"https:\/\/www.mdpi.com\/2078-2489\/17\/1\/27\" target=\"_blank\" rel=\"noreferrer noopener\">Simulating Advanced Social Botnets: A Framework for Behavior Realism and Coordinated Stealth<\/a>\u201d,<\/strong> Information<\/em>. 2026; 17(1):27. https:\/\/doi.org\/10.3390\/info17010027.<\/li><li>Peirou Liang, Meng Yang, Zhiqian Wu, Peng Yuan Zhou, Yong Liao, <em><strong>&#8220;Disco:Disrupting Semantic Consistency for Transferable Cross-modal Adversarial Attacks\u201d,<\/strong>  <\/em>MMM 2026, 32nd International Conference on Multimedia Modeling, January 29-31, 2026, Prague, Czech Republic.<\/li><\/ol>\n\n\n\n<h3>2025\u5e74<\/h3>\n\n\n\n<ol><li>Lang Qin\u3001Xiaorui Jiang\u3001Yu Gao\u3001Yong Liao, <strong><em>&#8220;Federated Deep Incomplete Multi-View Clustering with Heterogeneity-Matching and Attention-Based Imputation&#8221;<\/em><\/strong>, ACM Multimedia Asia 2025, Kuala Lumpur, Malaysia, December 9 \u2013 12, 2025.<\/li><li>Haoran Li, Yuli Tian, Kun Lan, Yong Liao, Lin Wang, Pan Hui , Peng Yuan Zhou, <strong><em>&#8220;DreamScene: 3D Gaussian-based End-to-end Text-to-3D Scene Generation&#8221;<\/em><\/strong>, IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI).<\/li><li>Yifang Zhao, Weimin Fu, Yi-Xiang Hu, Shijie Li, Xiaolong Guo, Yier Jin, <strong><em>&#8220;Leveraging Large Language Models for Secure Hardware Verification and Analysis&#8221;<\/em><\/strong>, AsianHOST 2025.<\/li><li>Xiaorui Jiang, Buyun He, Peng Yuan Zhou, Xinyue Chen, Jingcai Guo, Jie Xu, Yong Liao, <strong><em>&#8220;A Unified Framework to BRIDGE Complete and Incomplete Deep Multi-View Clustering under Non-IID Missing Patterns&#8221;<\/em><\/strong>, International Conference on Computer Vision (ICCV) 2025, Honolulu, Hawaii, Oct 19 \u2013 23th, 2025.<\/li><li>Siqing Zhang, Yong Liao, Pengyuan Zhou, <strong><em>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/arxiv.org\/abs\/2312.04920\" target=\"_blank\">\u03bb-SecAgg: Partial Vector Freezing for Lightweight Secure Aggregation in Federated Learning<\/a>&#8220;<\/em><\/strong>, The 31st IEEE International Conference on Parallel and Distributed Systems (ICPADS 2025).<\/li><li>Cuifu Jin, Yao Tian and Yong Liao, &#8220;<strong><em>Research on Low-Cost Persona Construction Based on Prompt Fine-Tuning of Low-to-High Parameter Large Models and Machine Learning<\/em><\/strong>&#8220;, CSAI 2025, The 9th International Conference on Computer Science and Artificial Intelligence, December 12-15, 2025, Beijing, China.<\/li><li>Xiaolu Li, Yuxiang Shang, Xiaorui Jiang, Chi Zhang, and Yong Liao,  <em><strong>&#8220;Do the Instruction-fine-tuned Large Language Models Challenge Flawed Instructions? A Study on Over-Compliance and Hallucinations\u201d<\/strong><\/em>, the 22nd Pacific Rim International Conference on Artificial Intelligence (PRICAI 2025), November 17-21, 2025.<\/li><li>Jiamei Ren, Hang Yang, Yong Liao, <em>&#8220;<strong><a rel=\"noreferrer noopener\" href=\"http:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2025\/11\/BlazeVMM\uff1aFast-Startup-of-ARM-CCA-MicroVMs-for-Confidential-Serverless-Computing.pdf\" target=\"_blank\">BlazeVMM: Fast Startup of ARM CCA MicroVMs for Confidential Serverless Computing<\/a><\/strong>\u201d<\/em>, CAICE &#8217;25: Proceedings of the 4th International Conference on Computer, Artificial Intelligence and Control Engineering, Pages 859 &#8211; 863, June 2, 2025.<\/li><li>Rui Jin, Yong Liao, <strong><em>&#8220;<\/em><\/strong><em><a rel=\"noreferrer noopener\" href=\"http:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2025\/11\/CAPTCHA-farm-detection.pdf\" target=\"_blank\"><strong>CAPTCHA Farm Detection and User Authentication via Mouse-trajectory Similarity Measurement<\/strong><\/a><\/em><strong><em>\u201d<\/em><\/strong>, Multimedia Systems, 31(5): 323, 21 August 2025.<\/li><li>Renjie Zhou, Haoran Ye, Wan Jian, Yong Liao, <strong><em>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/dspace.ustc.edu.cn\/wp-admin\/Historical News Review Based Online Story Discovery\" target=\"_blank\">HRSTORY: Historical News Review Based Online Story Discovery<\/a>\u201d<\/em><\/strong>, ACM KDD 2025-The 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Toronto, ON, Canada, August 3~7, 2025.<\/li><li>Wei Tang, Yixin Cao, Yang Deng, Jiahao Ying, Bo Wang, Yizhe Yang, Yuyue Zhao, Qi Zhang, Xuanjing Huang, Yu-Gang Jiang, Yong Liao, <strong><em>&#8220;<\/em><\/strong><em><a rel=\"noreferrer noopener\" href=\"https:\/\/arxiv.org\/pdf\/2412.13582\" target=\"_blank\"><strong>EvoWiki: Evaluating LLMs on Evolving Knowledge<\/strong><\/a><\/em><strong><em><strong>\u201d<\/strong><\/em><\/strong>, Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics, ACL 2025.<\/li><li>Lin Huang, Yao Tian, Jikang Duan, Mengzhu Zhang, Nan Li, Rongrong Sheng, Zixu Wang, Yiming Liu, and Yong Liao, <strong><em>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-981-96-4245-8_19\" target=\"_blank\">Negative Sentiment Analysis on Chinese Social Media with LLMs<\/a>\u201d<\/em><\/strong>, the 14th International Conference on Computer Engineering and Networks, May 16, 2025.<\/li><li>Botao Xiong, Yong Liao, &#8220;Audio-driven Talking-face Synthesis based on 3D Gaussian&#8221;, 2nd International Conference on Generative Artificial Intelligence and Informat Securit (GAIIS 2025).<\/li><li>Rui Jin, Yong Liao, <strong><em>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.mdpi.com\/2076-3417\/15\/11\/6230\" target=\"_blank\">Prevention Is Better than Cure: Exposing the Vulnerabilities of Social Bot Detectors with Realistic Simulations<\/a><strong>\u201d<\/strong><\/em><\/strong>, Applied Sciences 15, no. 11: 6230, June 1, 2025.<\/li><li>Yue Liu, Qinglang Guo, Chunyao Yang, Yong Liao,  <strong>&#8220;<a href=\"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-2\/TSP_CMC_60318\/TSP_CMC_60318.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">TIPS: Tailored Information Extraction in Public Security Using Domain-Enhanced Large Language Model<\/a>\u201d<\/strong>, Computers, Materials and Continua, Volume 83, Issue 2, 16 April 2025, Pages 2555-2572.<\/li><li>Buyun He, Xiaorui Jiang, Qi Wu, Hao Liu, Yingguang Yang, Yong Liao, <strong><em>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/arxiv.org\/pdf\/2506.00989\" target=\"_blank\">Boosting Bot Detection via Heterophily-Aware Representation Learning and Prototype-Guided Cluster Discovery<\/a><strong>\u201d<\/strong><\/em><\/strong>, Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.2 (KDD &#8217;25), August 3&#8211;7, 2025, Toronto, ON, Canada.<\/li><li>Keyu Huang, Yong Liao, <strong><em>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1117\/12.3072439\" target=\"_blank\">Research on a mixed expert model capability enhancement method based on chain-of-thought reasoning and Prompt optimisation<\/a>\u201d<\/em><\/strong>, 2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025), April 25-27, 2025.<\/li><li>Xiujun Wang , Zhi Liu , Xiaokang Zhou , Yong Liao , Han Hu , Xiao Zheng , Jie Li, <strong>&#8220;<em><a rel=\"noreferrer noopener\" href=\"https:\/\/ieeexplore.ieee.org\/document\/10946863\" target=\"_blank\">A Near-Optimal Category Information Sampling in RFID Systems<\/a><\/em>\u201d<\/strong>, IEEE Transactions on Mobile Computing.<\/li><li>Long Ma, Zhiyuan Yan, Qinglang Guo, Yong Liao, Haiyang Yu, Pengyuan Zhou, <strong>&#8220;<em><a rel=\"noreferrer noopener\" href=\"https:\/\/arxiv.org\/abs\/2402.02085\" target=\"_blank\">Detecting AI-Generated Video via Frame Consistency<\/a><\/em>\u201d<\/strong>, IEEE International Conference on Multimedia &amp; Expo 2025, ICME 2025.<\/li><li>Shijia Chen, Yong Liao, <strong><em>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3744464.3744473\" target=\"_blank\">DMoLE: Dynamic Mixture of LoRA Experts for Spam Email Detection<\/a>&#8220;<\/em><\/strong>, 2nd International Conference on Machine Intelligence and Digital Applications(MIDA 2025).<\/li><li>Xiaorui Jiang, Yu Gao, Hengwei Xu, Qi Zhang, Yong Liao, Peng Yuan Zhou, <strong>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/arxiv.org\/pdf\/2312.10425.pdf\" target=\"_blank\"><em>Knowledge Rumination for Client Utility Evaluation in Heterogeneous Federated Learning<\/em><\/a>\u201d<\/strong>, IEEE International Conference on Multimedia &amp; Expo 2025, ICME 2025.<\/li><li>Haojie Wu, Yong Liao, Reza Hadi Mogavi, Pan Hui, Peng Yuan Zhou, <strong><em>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-92578-8_17\" target=\"_blank\">Deepfake In the Metaverse: An Outlook Survey<\/a>\u201d<\/em><\/strong>, in Proceedings of the 27<sup>th<\/sup>&nbsp;International Conference on Human-Computer Interaction (HCII 2025), Gothenburg, Sweden, June 22~27, 2025.<\/li><\/ol>\n\n\n\n<h3>2024\u5e74<\/h3>\n\n\n\n<ol><li>Buyun He, Yingguang Yang, Qi Wu, Hao Liu, Renyu Yang, Hao Peng, Xiang Wang, Yong Liao, Pengyuan Zhou, <strong>&#8220;<\/strong><a href=\"https:\/\/doi.org\/10.24963\/ijcai.2024\/64\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><em>Dynamicity-aware social bot detection with dynamic graph transformers<\/em><\/strong><\/a>\u201d, IJCAI &#8217;24: Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence.<\/li><li>Yue Liu, Qinglang Guo, Yong Liao, <strong>&#8220;<em><a href=\"https:\/\/doi.org\/10.32604\/cmc.2025.060318\">TIPS: Tailored Information Extraction in Public Security using Domain-Enhanced Large Language Model<\/a><\/em><\/strong>\u201d, In Proceedings of CENet 2024: International Conference on Computer Engineering and Networks. (Best Paper Award)<\/li><li>Meng Shen, Zhiheng Luo, Yong Liao, <strong>&#8220;<em><a rel=\"noreferrer noopener\" href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3712623.3712660\" target=\"_blank\">Comprehensive Out-of-context Misinformation Detection via Global Information Enhancement<\/a><\/em><\/strong>\u201d, In Proceedings of AAIA 2024: 2nd International Conference on Advances in Artificial Intelligence and Applications, Wuhan, China, Dec 22\u201322, 2024.<\/li><li>Mengzhuo Guo, Xiaorui Jiang, Yong Liao,<strong><a rel=\"noreferrer noopener\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-981-97-5618-6_11\" target=\"_blank\"> &#8220;<em>Improving Zero-Shot Stance Detection by Infusing Knowledge from Large Language Models<\/em>\u201d<\/a><\/strong>, Advanced Intelligent Computing Technology and Applications (ICIC 2024).<\/li><li>Juanming Shi, Qinglang Guo, Yong Liao, Shenglin Liang, <strong>&#8220;<em><a rel=\"noreferrer noopener\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-981-97-5678-0_3\" target=\"_blank\">LegalGPT: Legal Chain of Thought for the Legal Large Language Model Multi-agent Framework<\/a><\/em><\/strong>\u201d, in Proceedings of Advanced Intelligent Computing Technology and Applications: 20th International Conference, ICIC 2024, Tianjin, China, August 5\u20138, 2024. <a rel=\"noreferrer noopener\" href=\"http:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2025\/11\/LegalGPT.pdf\" target=\"_blank\"><strong>[pdf]<\/strong><\/a><\/li><li>Siqing Zhang, Yuchen Ding, Wei Tang, Wei Sun, Yong Liao, Peng Yuan Zhou, &#8220;<strong><em><a href=\"https:\/\/arxiv.org\/html\/2411.19678v1\">Privacy-Preserving Orthogonal Aggregation for Guaranteeing Gender Fairness in Federated Recommendation<\/a><\/em><\/strong>\u201d, The 18th ACM International Conference on Web Search and Data Mining (WSDM 2025).<\/li><li>Juanming Shi, Qinglang Guo, Yong Liao, Yuxing Wang, Shijia Chen &amp; Shenglin Liang,  <strong>&#8220;<em><a rel=\"noreferrer noopener\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-981-97-5672-8_15\" target=\"_blank\">Legal-LM: Knowledge Graph Enhanced Large Language Models for Law Consulting<\/a><\/em><\/strong>\u201d, in Proceedings of ICIC 2024, Advanced Intelligent Computing Technology and Applications.<\/li><li>Tong, Chengwei; Guo, Mengzhuo; Tian, Yao; Zhang, Mengzhu; Li, Yangyang; Zhu, Chunyan; Bao, Jie; Sheng, Rongrong; Li, Qianqian; Liao, Yong, &#8220;<strong><em><a rel=\"noreferrer noopener\" href=\"https:\/\/escholarship.org\/uc\/item\/5vt7x182\" target=\"_blank\">ADViRDS: Assessment of Domestic Violence Risk Dataset and Scale on Social Media<\/a><\/em><\/strong>\u201d, The 46th Annual Meeting of the Cognitive Science Society (CogSci 2024).<\/li><li>Zhen Chen, Yong Liao, Youpeng Zhao, Zipeng Dai, Jian Zhao, &#8220;<strong><em><a href=\"https:\/\/arxiv.org\/abs\/2406.17425\">CuDA2: An Approach for Incorporating Traitor Agents into Cooperative Multi-Agent Systems<\/a><\/em><\/strong>\u201d, IEEE Transactions on Games, June 25, 2024.<\/li><li>Di Cao, Yong Liao, Xiuwei Shang, &#8220;<em><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/aclanthology.org\/2024.emnlp-main.472.pdf\" target=\"_blank\">RealVul: Can We Detect Vulnerabilities in Web Applications with LLM<\/a><a rel=\"noreferrer noopener\" href=\"Can We Detect Vulnerabilities in Web Applications with LLM?\" target=\"_blank\">?<\/a><\/strong><\/em>\u201d, in Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024, Miami, Florida, USA.<\/li><li>Yingguang Yang, Qi Wu, Buyun He, Hao Peng, Renyu Yang, Zhifeng Hao, Yong Liao, &#8220;<strong><em><a rel=\"noreferrer noopener\" href=\"https:\/\/arxiv.org\/pdf\/2405.11225\" target=\"_blank\">SEBot: Structural Entropy Guided Multi-View Contrastive learning for Social Bot Detection<\/a><\/em><\/strong>\u201d, ACM KDD 2024-The 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Barcelona, Spain, August 25~29, 2024. <\/li><li>Haoran Li, Long Ma, Haolin Shi, Yanbin Hao, Lechao Cheng, Yong Liao, Pengyuan Zhou, \u201c<a href=\"https:\/\/arxiv.org\/abs\/2311.12050\"><em><strong>3D-GOI: 3D GAN Omni-Inversion for Multifaceted and Multi-object Editing<\/strong><\/em><\/a>\u201d, ECCV 2024 &#8211; Proceedings of European Conference on Computer Vision, Milano,\u00a0Italy, 2024.<\/li><li>Haoran Li, Haolin Shi, Wenli Zhang, Wenjun Wug, Yong Liao, Lin Wang, Lik-Hang LEE, Pengyuan Zhou, &#8220;<em><strong><a href=\"https:\/\/arxiv.org\/abs\/2404.03575\">DreamScene: 3D Gaussian-based Text-to-3D Scene Generation via Formation Pattern Sampling<\/a><\/strong><\/em>\u201d, ECCV 2024 &#8211; Proceedings of European Conference on Computer Vision, Milano,\u00a0Italy, 2024.<\/li><li>Qinglong Huang, Haoran Li, Yanbin Hao, Yong Liao, Pengyuan Zhou, &#8220;<em><strong><a href=\"https:\/\/arxiv.org\/abs\/2401.01216\">Noise-NeRF: Hide Information in Neural Radiance Fields using Trainable Noise<\/a><\/strong><\/em>\u201d, Proceedings of the 33rd International Conference on Artificial Neural Networks, Lugano, Switzerland, 2024.<\/li><li>Wei Tang, Yixin Cao, Jiahao Ying, Bo Wang, Yuyue Zhao, Yong Liao, Pengyuan Zhou, <strong>\u201c<\/strong><em><strong><a href=\"https:\/\/arxiv.org\/abs\/2406.03963\">A+B: A General Generator-Reader Framework for Optimizing LLMs to Unleash Synergy Potential<\/a><\/strong><\/em>\u201d, Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics, Bangkok, Thailand, 2024.<\/li><li>Botao Xiong, Nan Li, Yong Liao, Pengyuan Zhou.<strong> &#8220;<em><a rel=\"noreferrer noopener\" href=\"https:\/\/ieeexplore.ieee.org\/document\/10536321\" target=\"_blank\">Gamified Alzheimer&#8217;s Disease Diagnosis via Virtual Reality<\/a><\/em><\/strong>\u201d,\u00a02024 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, Mar 24, 2024, Orlando, Florida USA.<\/li><li>Jianjian Li, Shengwei Liang, Yong Liao, Hongping Deng, Haiyang Yu,  <strong>&#8220;<em><a rel=\"noreferrer noopener\" href=\"https:\/\/arxiv.org\/abs\/2411.18990\" target=\"_blank\">USTCCTSU at SemEval-2024 Task 1: Reducing Anisotropy for Cross-lingual Semantic Textual Relatedness<\/a><\/em><\/strong>\u201d, 2024 Annual Conference of the North American Chapter of the Association for Computational Linguistics, Mexico City, Mexico.<\/li><li>\u6797\u6021\u822a, \u5468\u9e4f\u8fdc, \u5434\u6cbb\u8c26, \u5ed6\u52c7, <strong>&#8220;<a href=\"http:\/\/netinfo-security.org\/CN\/10.3969\/j.issn.1671-1122.2024.02.009\"><em>\u57fa\u4e8e\u89e6\u53d1\u5668\u9006\u5411\u7684\u8054\u90a6\u5b66\u4e60\u540e\u95e8\u9632\u5fa1\u65b9\u6cd5<\/em><\/a><\/strong>\u201d, \u300a\u4fe1\u606f\u7f51\u7edc\u5b89\u5168\u300b, 2024\u5e74, \u7b2c24\u5377, \u7b2c2\u671f.<\/li><li>Yihang Lin, Yong Liao, Zhiqian Wu, Pengyuan Zhou, <strong>&#8220;<a href=\"https:\/\/arxiv.org\/abs\/2303.00302\"><em>Mitigating Backdoors in Federated Learning with FLD<\/em><\/a>\u201d<\/strong>, 2024 5th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT 2024), Nanjing,China.<\/li><li>Hao Liu, Yingguang Yang, Qi Wu, Buyun He, Yong Liao, Pengyuan Zhou, <strong>&#8220;<em><a rel=\"noreferrer noopener\" href=\"https:\/\/ieeexplore.ieee.org\/document\/10649939\" target=\"_blank\">FacGNN: Multi-Faceted Fairness Enhancement for GNN Through Adversarial and Contrastive Learning<\/a><\/em>\u201d<\/strong>, 2024 International Joint Conference on Neural Networks (IJCNN) &#8211; Machine Learning, Pacifico Yokohama, Yokohama, Japan. <\/li><\/ol>\n\n\n\n<h3>2023\u5e74<\/h3>\n\n\n\n<ol><li>Bingbing Chen and Yong Liao. <strong><em>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3583788.3583799\" target=\"_blank\">Spatio-Temporal Deep Fusion Graph Convolutional Networks for Crime Prediction<\/a><\/em><\/strong>&#8220;. The 7th International Conference on Machine Learning and Soft Computing (ICMLSC 2023)\uff0c January 5-7, 2023\uff0cChongqing, China.<\/li><li>Z. Li, S. Feng, J. Shi, Y. Zhou, Y. Liao., <strong><em>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.techscience.com\/csse\/v44n3\/49146\" target=\"_blank\">Future event prediction based on temporal knowledge graph embedding<\/a>,&#8221; <\/em><\/strong>Computer Systems Science and Engineering, vol. 44, no.3, pp. 2411\u20132423, 2023.<\/li><li>Yingguang Yang, Renyu Yang, Hao Peng, Yangyang Li, Tong Li, Yong Liao, Pengyuan Zhou, <strong>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3543507.3583500\" target=\"_blank\">FedACK: Federated Adversarial Contrastive Knowledge Distillation for Cross-Lingual and Cross-Model Social Bot Detection<\/a>,&#8221;<\/strong> WWW &#8217;23: Proceedings of the ACM Web Conference 2023, April 2023.<\/li><li>Yan Shi, Yao Tian, Chengwei Tong, Chunyan Zhu, Qianqian Li, Mengzhu Zhang, Wei Zhao, Yong Liao, Pengyuan Zhou,,<strong>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/arxiv.org\/abs\/2306.14903\" target=\"_blank\">Detect Depression from&nbsp;Social Networks with&nbsp;Sentiment Knowledge Sharing<\/a>,&#8221;<\/strong> &nbsp;Social Media Processing. SMP 2023. Communications in Computer and Information Science, vol 1945. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-99-7596-9_10.<\/li><li>Reza Hadi Mogavi, Chao Deng, Justin Juho Kim, Pengyuan Zhou, Young D. Kwon, Ahmed Hosny Saleh Metwally, Ahmed Tlili, Simone Bassanelli, Antonio Bucchiarone, Sujit Gujar, Lennart E. Nacke, Pan Hui,<strong> &#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2949882123000270\" target=\"_blank\">ChatGPT in education: A blessing or a curse? A qualitative study exploring early adopters\u2019 utilization and perceptions,<\/a>&#8220;<\/strong> Computers in Human Behavior: Artificial Humans, Volume 2, Issue 1, 2024, ISSN 2949-8821, https:\/\/doi.org\/10.1016\/j.chbah.2023.100027.<\/li><li>Q. Guo, X. Chen, P. Zhou and Y. Liao,<strong> <a rel=\"noreferrer noopener\" href=\"https:\/\/ieeexplore.ieee.org\/document\/10272517\" target=\"_blank\">&#8220;Cross-Domain Data Extraction and Knowledge Graph Construction for Dispute Analysis,&#8221;<\/a><\/strong>&nbsp;<em>2023 IEEE 43rd International Conference on Distributed Computing Systems (ICDCS)<\/em>, Hong Kong, Hong Kong, 2023, pp. 959-960, doi: 10.1109\/ICDCS57875.2023.00109.<\/li><li>X. Chen, J. Bao, P. Zhou and Y. Liao,<strong> &#8220;<em><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10272537\">Hierarchical Privacy-Preserved Knowledge Graph<\/a><\/em>,&#8221;<\/strong>&nbsp;<em>2023 IEEE 43rd International Conference on Distributed Computing Systems (ICDCS)<\/em>, Hong Kong, Hong Kong, 2023, pp. 1-2, doi: 10.1109\/ICDCS57875.2023.00097.<\/li><li>Pengyuan Zhou, Lik-Hang Lee, Zhi Liu, Hang Qiu, Tristan Braud, Yi (Aaron) Ding, Sasu Tarkoma, Pan Hui, <strong>&#8220;<em><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10375867\">Metaverse for Connected and Automated Vehicles and Intelligent Transportation Systems<\/a><\/em>,&#8221; <\/strong>in&nbsp;<em>IEEE Vehicular Technology Magazine<\/em>, vol. 18, no. 4, pp. 19-21, Dec. 2023, doi: 10.1109\/MVT.2023.3333444.&nbsp;<\/li><li>Hengwei Xu, Pengyuan Zhou, Haiyong Xie, Yong Liao,<strong> &#8220;<em><a rel=\"noreferrer noopener\" href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3605573.3605603\" target=\"_blank\">Mercury: Fast and Optimal Device Placement for Large Deep Learning Models<\/a><\/em>&#8220;<\/strong>, ICPP &#8217;23: Proceedings of the 52nd International Conference on Parallel Processing\uff0c August 2023\uff0c Pages 412\u2013422\uff0c https:\/\/doi.org\/10.1145\/3605573.3605603<\/li><li>Shuhao Fu, Yong Liao, Pengyuan Zhou, <strong>&#8220;<em><a rel=\"noreferrer noopener\" href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3600061.3603136\" target=\"_blank\">Training ChatGPT-like Models with In-network Computation<\/a><\/em>&#8220;,<\/strong> APNET &#8217;23: Proceedings of the 7th Asia-Pacific Workshop on Networking, June 2023, Pages 206\u2013207, https:\/\/doi.org\/10.1145\/3600061.3603136.<\/li><li>&nbsp;Xi Liu, Long Ma, Zhen Chen, Changgang Zheng, Ren Chen, Yong Liao, Shufan Yang, <strong>&#8220;<em><a rel=\"noreferrer noopener\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-47994-6_18\" target=\"_blank\">A Novel State Space Exploration Method for&nbsp;the&nbsp;Sparse-Reward Reinforcement Learning Environment<\/a><\/em>,&#8221;<\/strong> In: Bramer, M., Stahl, F. (eds) Artificial Intelligence XL. SGAI 2023. Lecture Notes in Computer Science(), vol 14381. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-47994-6_18<\/li><li>Qinglang Guo, Yong Liao, Zhe Li, Hui Lin, and Shenglin Liang, <strong>&#8220;<em><a rel=\"noreferrer noopener\" href=\"https:\/\/www.mdpi.com\/1099-4300\/25\/10\/1472\" target=\"_blank\">Convolutional Models with Multi-Feature Fusion for Effective Link Prediction in Knowledge Graph Embedding<\/a><\/em>,&#8221;&nbsp;<\/strong><em>Entropy<\/em>&nbsp;25, no. 10: 1472. https:\/\/doi.org\/10.3390\/e25101472<\/li><li>Qinglang Guo, Yong Liao, Zhe Li, and Shenglin Liang, <strong>&#8220;<em><a rel=\"noreferrer noopener\" href=\"https:\/\/www.mdpi.com\/1099-4300\/25\/10\/1421\" target=\"_blank\">Multi-Modal Representation via Contrastive Learning with Attention Bottleneck Fusion and Attentive Statistics Features<\/a><\/em>,&#8221;<\/strong>&nbsp;<em>Entropy<\/em>&nbsp;25, no. 10: 1421. https:\/\/doi.org\/10.3390\/e25101421<\/li><li>Xun Deng, Wenjie Wang, Fuli Feng, Hanwang Zhang, Xiangnan He, Yong Liao,<strong> &#8220;<em><a rel=\"noreferrer noopener\" href=\"https:\/\/aclanthology.org\/2023.acl-long.636.pdf\" target=\"_blank\">Counterfactual Active Learning for Out-of-Distribution Generalization<\/a><\/em>,&#8221;<\/strong> in Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics, July 2023, Toronto, Canada.<\/li><\/ol>\n\n\n\n<h3>2022\u5e74<\/h3>\n\n\n\n<ol><li>Renjie Zhou, Zhongyi Xie, Jian Wan, Jilin Zhang, Yong Liao and Qiang Liu. &#8220;<strong><em><a rel=\"noreferrer noopener\" href=\"https:\/\/aclanthology.org\/2022.emnlp-main.436.pdf\" target=\"_blank\">Attention and Edge-Label Guided Graph Convolutional Networks for Named Entity Recognition<\/a><\/em><\/strong>&#8221;. EMNLP 2022 &#8211; The 2022 Conference on Empirical Methods in Natural Language Processing. Abu Dhabi, The United Arab Emirates, December 7\u201311, 2022.<\/li><li>Wei Tang, Benfeng Xu, Yuyue Zhao, Zhendong Mao, Yifeng Liu, Yong Liao and Haiyong Xie. &#8220;<strong><em><a rel=\"noreferrer noopener\" href=\"https:\/\/aclanthology.org\/2022.emnlp-main.477\/\" target=\"_blank\">UniRel: Unified Representation and Interaction for Joint Relational Triple Extraction<\/a><\/em><\/strong>&#8221;<strong>.<\/strong> EMNLP 2022 &#8211; The 2022 Conference on Empirical Methods in Natural Language Processing. Abu Dhabi, The United Arab Emirates, December 7\u201311, 2022.<\/li><li>Mingjie Sun, Pengyuan Zhou, Hui Tian, Yong Liao, Haiyong Xie. &#8220;<strong><em>Spatial-Temporal Attention Network for Crime Prediction with Adaptive Graph Learning<\/em><\/strong>&#8221;. ICANN 2022-The 31st International Conference on Artificial Neural Networks, Bristol (UK), September 6-9, 2022.<\/li><li>Yingguang Yang, Renyu Yang, Yangyang Li, Kai Cui, Zhiqin Yang, Yue Wang, Jie Xu, Haiyong Xie, &#8220;<strong><em><a rel=\"noreferrer noopener\" href=\"https:\/\/arxiv.org\/abs\/2206.06757\" target=\"_blank\">RoSGAS: Adaptive Social Bot Detection with Reinforced Self-Supervised GNN Architecture Search<\/a><\/em><\/strong>&#8220;, ACM Transactions on the Web, Volume 17, Issue 3, Article No.: 15, Pages 1 &#8211; 31, https:\/\/doi.org\/10.1145\/3572403<\/li><li>Sihao Ding, Peng Wu, Fuli Feng, Yitong Wang, Xiangnan He, Yong Liao, Yongdong Zhang. &#8220;<strong><em><a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3534678.3539240\">Addressing Unmeasured Confounder for Recommendation with Sensitivity Analysis<\/a><\/em><\/strong>&#8221;. KDD 2022-The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington DC, USA, August 14-18, 2022.<\/li><li>Sihao Ding, Fuli Feng, Xiangnan He, Jinqiu Jin, Wenjie Wang, Yong Liao, Yongdong Zhang. &#8220;<strong><a rel=\"noreferrer noopener\" href=\"http:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2022\/05\/22SIGIR_Interpolative-Distillation-for-Unifying-Biased-and-Debiased-Recommendation.pdf\" target=\"_blank\"><em>Interpolative Distillation for Unifying Biased and Debiased Recommendation<\/em><\/a><\/strong>&#8221;. SIGIR 2022-The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11-15, 2022.<\/li><li>Pengyuan Zhou, Hengwei Xu, Lik Hang Lee, Pei Fang, Pan Hui. <strong><em>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3534585\" target=\"_blank\">Are You Left Out?: An Efficient and Fair Federated Learning for Personalized Profiles on Wearable Devices of Inferior Networking Conditions<\/a><\/em><\/strong>&#8221;. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies Volume 6, Issue 2, July 2022.<\/li><li>Pengyuan Zhou, Pranvera Kortoci, Yui-Pan Yau, Tristan Braud, Xiujun Wang, Benjamin Finley, Lik-Hang Lee, Sasu Tarkoma, Jussi Kangasharju, Pan Hui. &#8220;<strong><a rel=\"noreferrer noopener\" href=\"http:\/\/staff.ustc.edu.cn\/~pyzhou\/papers\/aicp.pdf\" target=\"_blank\"><em>Augmented Informative Cooperative Perception<\/em><\/a><\/strong>&#8221;<strong>. <\/strong>IEEE Transactions on Intelligent Transportation Systems, 2022.<\/li><li>Sihao Ding, Fuli Feng, Xiangnan He, Yong Liao, Shi Jun, Yongdong Zhang. &#8220;<strong><a rel=\"noreferrer noopener\" href=\"https:\/\/arxiv.org\/abs\/2108.06889\" target=\"_blank\"><em>Causal Incremental Graph Convolution for Recommender System Retraining<\/em><\/a><\/strong>&#8221;. Special Issue: Deep Neural Networks for Graphs: Theory, Models, Algorithms and Applications, IEEE Transactions on Neural Networks and Learning Systems, 2022.<\/li><li>Fangmin Shan, Jun Shi, Zhipeng Li, Yangzhao Yang, Yong Liao. &#8220;<strong><em>Research on the Application of EMD Decomposition-based AR Model in Popularity Prediction of Public Sentiment on Events<\/em><\/strong>&#8221;<strong>.<\/strong> In Proceedings of DSDE 2022: International Con-ference on Data Storage and Data Engineering. Sanya, China, Feb. 2022.<\/li><li>Zheng Ma, Zhiqiang Hu, Jun Shi, Zhipeng Li, Yang Zhou, Yong Liao, Yangzhao Yang, Zhenyuan Gao and Jie Zhang. &#8220;<strong><em>A module based full cycle construction method of domain-specific knowledge graph<\/em><\/strong>&#8221;<strong>.<\/strong> In Proceedings of the 8th international conference on artificial intelligence and security (ICAIS 2022). Qinghai, China, July 2022.<\/li><li>Zhiqiang Hu, Zheng Ma, Jun Shi, Zhipeng Li, Yangzhao Yang, Yong Liao, Zhenyuan Gao, Jie Zhang. &#8220;<strong><em><a rel=\"noreferrer noopener\" href=\"https:\/\/www.techscience.com\/jqc\/v4n1\/49284\/pdf\" target=\"_blank\">A top-down method of extraction Entity Relationship Triples and obtaining annotated data<\/a><\/em><\/strong>&#8221;<strong>.<\/strong> In Proceedings of the 8th international conference on artificial intelligence and security (ICAIS 2022). Qinghai, China, July 2022.<\/li><li>Yang Zhou, Jun Shi, Zhipeng Li, Yong Liao, Zheng MA, Xuejie Ye and Yang-zhao Yang. &#8220;<strong><em><a rel=\"noreferrer noopener\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-06767-9_41\" target=\"_blank\">Analysis and Architecture Design of a Large-scale Event-centric Knowledge Graph System for Dispute Resolution<\/a><\/em><\/strong>&#8221;<strong>.<\/strong> In Proceedings of the 8th international conference on artificial intelligence and security (ICAIS 2022). Qinghai, China, July 2022.<\/li><li>Zhipeng Li, Yan Shi, Shanshan Feng, Yong Liao, Jun Shi and Yangzhao Yang. &#8220;<strong><em><a rel=\"noreferrer noopener\" href=\"https:\/\/pdfs.semanticscholar.org\/4659\/54684040836dd317d429b72dbbd593648a7a.pdf\" target=\"_blank\">Future Event Prediction based on Temporal Knowledge Graph Embedding<\/a><\/em><\/strong>&#8221;<strong>.<\/strong> In Proceedings of the 8th international conference on artificial intelligence and secu-rity (ICAIS 2022). Qinghai, China, July 2022.<\/li><li>Wenxiao ZHANG, Sikun LIN, Farshid H. BIJARBOONEH, Hao-Fei CHENG, Tristan BRAUD, Pengyuan ZHOU, Lik-Hang LEE, and Pan HUI. &#8220;<a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3532202\"><strong><em>EdgeXAR: A 6-DoF Camera Multi-target Interaction Framework for MAR with User-friendly Latency Compensation<\/em><\/strong><\/a>&#8221;.  In Proceedings of the ACM on Human-Computer Interaction (PACM HCI) and the 14th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS), Sophia Antipolis, France, June 2022.<\/li><li>\u674e\u5fd7\u9e4f\uff0c\u6768\u9633\u671d\uff0c\u5ed6\u52c7\uff0c\u4fde\u80fd\u6d77\uff0c\u5434\u54f2\uff0c\u8c22\u6d77\u6c38\uff0c\u77f3\u73fa\u3002 &#8220;<strong><em>\u6570\u636e\u9a71\u52a8\u7684\u4e8b\u4ef6\u9884\u6d4b\u6280\u672f\u6700\u65b0\u7814\u7a76\u8fdb\u5c55<\/em><\/strong>&#8221;\u3002 \u300a\u4fe1\u606f\u5b89\u5168\u5b66\u62a5\u300b<\/li><\/ol>\n\n\n\n<h3>2021\u5e74<\/h3>\n\n\n\n<ol type=\"1\"><li>\u738b\u9759\uff0c\u949f\u7476\uff0c\u5362\u7476\uff0c\u9648\u51b0\u51b0\uff0c\u6613\u52c7\u3002 \u201c<strong><a rel=\"noreferrer noopener\" href=\"https:\/\/wenku.baidu.com\/view\/39d66e6f75a20029bd64783e0912a21615797f45.html\" target=\"_blank\"><em>\u7f8e\u519b\u901a\u4fe1\u7f51\u7edc\u4e0e\u4fe1\u606f\u7cfb\u7edf\u53d1\u5c55\u7814\u7a76\u7efc\u8ff0<\/em><\/a><\/strong>&#8221;\u3002 \u300a\u4e2d\u56fd\u7535\u5b50\u79d1\u5b66\u7814\u7a76\u9662\u5b66\u62a5\u300b\uff0cVol. 16\uff0cNo. 11\uff0c2021\u5e7411\u6708\uff0cdoi: 10.3969\/j.issn. 1673-5692.2021.11.004\u3002<\/li><li>Aleksandr Zavodovski, Lorenzo Corneo, Nitinder Mohan, Suzan Bayhan, Pengyuan Zhou, Walter Wong, Andreas Johnsson, Jussi Kangasharju, &#8220;<strong><em><a rel=\"noreferrer noopener\" href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3488663.3493689\" target=\"_blank\">Decentralizing Computation with Edge Computing: Potential and Challenges<\/a><\/em><\/strong>&#8221;<strong><em>,<\/em><\/strong> ACM CoNEXT 2021 Interdisciplinary Workshop on (de)Centralization in the Internet (ACM IWCI 2021).<\/li><li>Lik-Hang Lee, Tristan Braud, Pengyuan Zhou, Lin Wang, Dianlei Xu, Zijun Lin, Abhishek Kumar, CarlosBermejo, and Pan Hui, &#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.researchgate.net\/publication\/355172308_All_One_Needs_to_Know_about_Metaverse_A_Complete_Survey_on_Technological_Singularity_Virtual_Ecosystem_and_Research_Agenda?channel=doi&amp;linkId=616bd01a25467d2f0045bef2&amp;showFulltext=true\" target=\"_blank\"><em><strong>All One Needs to Know about Metaverse: A Complete Survey on Technological Singularity, Virtual Ecosystem, and Research Agenda<\/strong><\/em><\/a>&#8221;, <a href=\"https:\/\/www.researchgate.net\/publication\/355172308_All_One_Needs_to_Know_about_Metaverse_A_Complete_Survey_on_Technological_Singularity_Virtual_Ecosystem_and_Research_Agenda\/references\">http:\/\/dx.doi.org\/10.13140\/RG.2.2.11200.05124\/8<\/a>.<\/li><li>Hangjing Zhang, Yuejiang Li, Yan Chen, H. Vicky Zhao, &#8220;<em><strong>Smart Evolution for Information Diffusion Over Social Networks<\/strong><\/em>&#8221;, IEEE Transactions on Information Forensics and Security, vol.16, pp. 1203-1217, 2021.<\/li><li>Dongheng Zhang, Yang Hu, Yan Chen, &#8220;<em><strong>MTrack: Tracking Multi-Person Moving Trajectories and Vital Signs with Radio Signals<\/strong><\/em>&#8221;, IEEE Internet of Things Journal, vol. 8, no. 5, pp. 3904-3914, March 2021.<\/li><li>Yan Chen, Hongyu Deng, Dongheng Zhang, Yang Hu, &#8220;<strong><em>SpeedNet: Indoor Speed Estimation with Radio Signals<\/em><\/strong>&#8221;, IEEE Internet of Things Journal, vol. 8, no. 4, pp. 2762-2774, Feb. 2021.<\/li><li>Xueqi Zhang, Haiyong Xie, Hui Lin. <a rel=\"noreferrer noopener\" href=\"http:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/HOPE-L-A-Lossless-Database-Watermarking-Method-in-Homomorphic-Encryption-Domain.pdf\" target=\"_blank\">&nbsp;&#8220;<strong><em>HOPE-L: A Lossless Database Watermarking Method in Homomorphic Encryption Domain<\/em><\/strong>&#8221;. <\/a>International Conference on Smart City and Informatization. 2021.<\/li><li>Xueqi Zhang, Shuo Wang, Chenyu Liu, Min Zhang, Xiaohan Liu, Haiyong Xie. &#8220;<strong><em><a rel=\"noreferrer noopener\" href=\"http:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/Thinking-in-Patch-Towards-Generalizable-Forgery-Detection-with-Patch-Transformation.pdf\" target=\"_blank\">Thinking in Patch: Towards Generalizable Forgery Detection with Patch Transformation<\/a><\/em><\/strong>&#8221;. The Pacific Rim International Conferences on Artificial Intelligence (PRICAI). 2021. <\/li><\/ol>\n\n\n\n<h3>2020\u5e74<\/h3>\n\n\n\n<ol><li>Yan Chen, Xiang Su, Yang Hu, Bing Zeng, &#8220;<strong><em>Residual Carrier Frequency Offset Estimation and Compensation for Commodity WiFi<\/em><\/strong>&#8221;<strong><em>,<\/em><\/strong> IEEE Transactions on Mobile Computing, vol. 19, no. 12, pp. 2891-2902, Dec. 2020\u3002<\/li><li>Ying He, Yan Chen, Yang Hu, and Bing Zeng, &#8220;<strong><em>WiFi Vision: Sensing, Recognition, and Detection With Commodity MIMO-OFDM WiFi<\/em><\/strong>&#8221;<strong><em>,<\/em><\/strong> IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8296-8317, Sept 2020.<\/li><li>Yan Chen, Hangjing Zhang, Yang Hu, <strong><em><strong><em>&#8220;<\/em><\/strong>Optimal Power and Bandwidth Allocation for Multiuser Video Streaming in UAV Relay Networks<strong>\u201d<\/strong><\/em><\/strong>, IEEE Transactions on Vehicular Technology, vol. 69, no. 6, pp. 6644-6655, June 2020.<\/li><li>Chaofan He, Yang Hu, Yan Chen, Xiaopeng Fan, Houqiang Li, Bing Zeng,<strong><em> <strong><em><strong><em>&#8220;<\/em><\/strong><\/em><\/strong>MUcast: Linear Uncoded Multiuser Video Streaming with Channel Assignment and Power Allocation Optimization<strong><em><strong>\u201d<\/strong><\/em><\/strong>,<\/em><\/strong> IEEE Transactions on Circuits and Systems for Video Technology (CSVT), vol.30, no.4, pp.1136-1146, April 2020.<\/li><li>Dongheng Zhang, Yang Hu, Yan Chen, Bing Zeng, <strong><em><strong><em>&#8220;<\/em><\/strong>Calibrating Phase Offsets for Commodity WiFi<strong>\u201d<\/strong><\/em><\/strong>, IEEE Systems Journal, vol. 14, no.1, pp. 661-664, March 2020.<\/li><\/ol>\n\n\n\n<h3>2019\u5e74<\/h3>\n\n\n\n<ol type=\"1\"><li>Jian Ni, Shanghang Zhang, and Haiyong Xie. <strong><em>&#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/Dual-Adversarial-Semantics-Consistent-Network-for-Generalized-Zero-Shot-Learning.pdf\" target=\"_blank\">Dual adversarial semantics-consistent network for generalized zero-shot learning<\/a><strong>\u201d<\/strong><\/em><\/strong>, Advances in Neural Information Processing Systems 32, pp. 6146\u20136157. 2019.<\/li><li>Yan Chen, Xuanyu Cao, K. J. Ray Liu, <strong><em>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.researchgate.net\/publication\/337966442_Community_detection_in_networks_a_game-theoretic_framework\" target=\"_blank\">Community Detection in Networks: A Game-Theoretic Framework<\/a><strong>\u201d<\/strong><\/em><\/strong>, EURASIP Journal on Advances in Signal Processing (2019) 2019.<\/li><li>Wei Li, Meng-Lin Ku, Yan Chen, Yichen Wang, and Zhonghua Liang, <strong><em><strong><em>&#8220;<\/em><\/strong>Transmission Policy of Two-Way Relay Networks With Multiple Stochastic Energy Harvesting Nodes<strong>\u201d<\/strong><\/em><\/strong>, IEEE ACESS, vol. 7, no.1, pp. 76967-76984, Dec. 2019.<\/li><li>Xiang Wang, Xiangnan He, Meng Wang, Fuli Feng &amp; Tat-Seng Chua, <strong><em>&#8220;Neural Graph Collaborative Filtering<strong>\u201d<\/strong><\/em><\/strong>, SIGIR 2019.<\/li><li>Xin Xin, Xiangnan He, Yongfeng Zhang, Yongdong Zhang &amp; Joemon Jose, <strong><em>&#8220;Relational Collaborative Filtering: Modeling Multiple Item Relations for Recommendation<strong><em><strong>\u201d<\/strong><\/em><\/strong>,<\/em><\/strong>  SIGIR 2019.<\/li><\/ol>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2026\u5e74 Rui Jin, Yong Liao, &#8220;Simulating Advanc [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":645,"parent":86,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"page-templates\/template-fullwidth.php","meta":{"_themeisle_gutenberg_block_has_review":false},"featured_image_urls":{"full":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561.jpg",1695,566,false],"thumbnail":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561-150x150.jpg",150,150,true],"medium":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561-300x100.jpg",300,100,true],"medium_large":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561-768x256.jpg",750,250,true],"large":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561-1024x342.jpg",750,250,true],"1536x1536":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561-1536x513.jpg",1536,513,true],"2048x2048":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561.jpg",1695,566,false],"hestia-blog":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561-360x240.jpg",360,240,true]},"post_excerpt_stackable":"<p>2026\u5e74 Rui Jin, Yong Liao, &#8220;Simulating Advanced Social Botnets: A Framework for Behavior Realis&hellip;<\/p>\n","category_list":"","author_info":{"name":"\u7ba1\u7406\u5458","url":"https:\/\/dspace.ustc.edu.cn\/?author=1"},"comments_num":"0 comments","featured_image_urls_v2":{"full":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561.jpg",1695,566,false],"thumbnail":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561-150x150.jpg",150,150,true],"medium":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561-300x100.jpg",300,100,true],"medium_large":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561-768x256.jpg",750,250,true],"large":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561-1024x342.jpg",750,250,true],"1536x1536":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561-1536x513.jpg",1536,513,true],"2048x2048":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561.jpg",1695,566,false],"hestia-blog":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561-360x240.jpg",360,240,true]},"post_excerpt_stackable_v2":"<p>2026\u5e74 Rui Jin, Yong Liao, &#8220;Simulating Advanced Social Botnets: A Framework for Behavior Realis&hellip;<\/p>\n","category_list_v2":"","author_info_v2":{"name":"\u7ba1\u7406\u5458","url":"https:\/\/dspace.ustc.edu.cn\/?author=1"},"comments_num_v2":"0 comments","uagb_featured_image_src":{"full":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561.jpg",1695,566,false],"thumbnail":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561-150x150.jpg",150,150,true],"medium":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561-300x100.jpg",300,100,true],"medium_large":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561-768x256.jpg",750,250,true],"large":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561-1024x342.jpg",750,250,true],"1536x1536":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561-1536x513.jpg",1536,513,true],"2048x2048":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561.jpg",1695,566,false],"hestia-blog":["https:\/\/dspace.ustc.edu.cn\/wp-content\/uploads\/2021\/10\/wp2151561-360x240.jpg",360,240,true]},"uagb_author_info":{"display_name":"\u7ba1\u7406\u5458","author_link":"https:\/\/dspace.ustc.edu.cn\/?author=1"},"uagb_comment_info":0,"uagb_excerpt":"2026\u5e74 Rui Jin, Yong Liao, &#8220;Simulating Advanc [&he&hellip;","_links":{"self":[{"href":"https:\/\/dspace.ustc.edu.cn\/index.php?rest_route=\/wp\/v2\/pages\/318"}],"collection":[{"href":"https:\/\/dspace.ustc.edu.cn\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dspace.ustc.edu.cn\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dspace.ustc.edu.cn\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dspace.ustc.edu.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=318"}],"version-history":[{"count":153,"href":"https:\/\/dspace.ustc.edu.cn\/index.php?rest_route=\/wp\/v2\/pages\/318\/revisions"}],"predecessor-version":[{"id":2478,"href":"https:\/\/dspace.ustc.edu.cn\/index.php?rest_route=\/wp\/v2\/pages\/318\/revisions\/2478"}],"up":[{"embeddable":true,"href":"https:\/\/dspace.ustc.edu.cn\/index.php?rest_route=\/wp\/v2\/pages\/86"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dspace.ustc.edu.cn\/index.php?rest_route=\/wp\/v2\/media\/645"}],"wp:attachment":[{"href":"https:\/\/dspace.ustc.edu.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}