Shuo Wang

ORCID: 0000-0001-8938-2364
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Adversarial Robustness in Machine Learning
  • Natural Language Processing Techniques
  • Topic Modeling
  • Anomaly Detection Techniques and Applications
  • Privacy-Preserving Technologies in Data
  • Advanced Malware Detection Techniques
  • Multimodal Machine Learning Applications
  • Domain Adaptation and Few-Shot Learning
  • Advanced Graph Neural Networks
  • Advanced Neural Network Applications
  • Privacy, Security, and Data Protection
  • Network Security and Intrusion Detection
  • Reinforcement Learning in Robotics
  • Imbalanced Data Classification Techniques
  • Financial Distress and Bankruptcy Prediction
  • Speech and dialogue systems
  • Cryptography and Data Security
  • Human Mobility and Location-Based Analysis
  • AI-based Problem Solving and Planning
  • Digital Media Forensic Detection
  • Security and Verification in Computing
  • Text and Document Classification Technologies
  • Robot Manipulation and Learning
  • Data Stream Mining Techniques
  • Technology Use by Older Adults

China Agricultural University
2025

Xi'an Jiaotong University
2023-2024

Data61
2020-2024

Commonwealth Scientific and Industrial Research Organisation
1999-2024

Indiana University – Purdue University Indianapolis
2024

Shanghai Jiao Tong University
2020-2024

University of Birmingham
2009-2024

University of Indianapolis
2024

Hebei University
2021-2024

Washington University in St. Louis
2024

Recently, significant accuracy improvement has been achieved for acoustic recognition systems by increasing the model size of Long Short-Term Memory (LSTM) networks. Unfortunately, ever-increasing LSTM leads to inefficient designs on FPGAs due limited on-chip resources. The previous work proposes use a pruning based compression technique reduce and thus speedups inference FPGAs. However, random nature transforms dense matrices highly unstructured sparse ones, which unbalanced computation...

10.1145/3174243.3174253 article EN 2018-02-15

Transfer learning provides an effective solution for feasibly and fast customize accurate <i>Student</i> models, by transferring the learned knowledge of pre-trained <i>Teacher</i> models over large datasets via fine-tuning. Many Teacher used in transfer are publicly available maintained public platforms, increasing their vulnerability to backdoor attacks. In this article, we demonstrate a threat tasks on both image time-series data leveraging accessible aimed at defeating three commonly...

10.1109/tsc.2020.3000900 article EN IEEE Transactions on Services Computing 2020-06-09

The AI City Challenge was created with two goals in mind: (1) pushing the boundaries of research and development intelligent video analysis for smarter cities use cases, (2) assessing tasks where level performance is enough to cause real-world adoption. Transportation a segment ripe such fifth attracted 305 participating teams across 38 countries, who leveraged city-scale real traffic data high-quality synthetic compete five challenge tracks. Track 1 addressed video-based automatic vehicle...

10.1109/cvprw53098.2021.00482 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2021-06-01

Confidence calibration, which aims to make model predictions equal the true correctness measures, is important for neural machine translation (NMT) because it able offer useful indicators of errors in generated output. While prior studies have shown that NMT models trained with label smoothing are well-calibrated on ground-truth training data, we find miscalibration still remains a severe challenge during inference due discrepancy between and inference. By carefully designing experiments...

10.18653/v1/2020.acl-main.278 article EN 2020-01-01

As data continue to grow in complexity and size, there is an imperative need for more efficient robust storage solutions. DNA has emerged as a promising avenue solve this problem, but existing approaches do not perform efficiently enough on video data, particularly information density time efficiency. This paper introduces VSD, pioneering encoding method segmentation DNA, leveraging the Reed–Solomon (RS) error correction code. addresses these limitations through innovative combination of...

10.3390/math12081235 article EN cc-by Mathematics 2024-04-19

Deep-learning-based identity management systems, such as face authentication are vulnerable to adversarial attacks. However, existing attacks typically designed for single-task purposes, which means they tailored exploit vulnerabilities unique the individual target rather than being adaptable multiple users or systems. This limitation makes them unsuitable certain attack scenarios, morphing, universal, transferable, and counter In this paper, we propose a multi-task algorithm called MTADV...

10.1145/3665496 article EN ACM Transactions on Multimedia Computing Communications and Applications 2024-05-21

De novo peptide sequencing directly identifies peptides from mass spectrometry data, playing a critical role in discovering novel proteins and analyzing complex biological samples without reliance on existing databases. To address challenges both speed accuracy, transformer-based model, TSARseqNovo, incorporates two key innovations: Semi-Autoregressive decoder for parallel prediction of multiple amino acids Masking Refinement refining low-confidence predictions. These features significantly...

10.1038/s42003-025-07584-0 article EN cc-by-nc-nd Communications Biology 2025-02-14

This research introduces a novel text generation model that combines BERT's semantic interpretation strengths with GPT-4's generative capabilities, establishing high standard in generating coherent, contextually accurate language. Through the combined architecture, enhances depth and maintains smooth, human-like flow, overcoming limitations seen prior models. Experimental benchmarks reveal BERT-GPT-4 surpasses traditional models, including GPT-3, T5, BART, Transformer-XL, CTRL, key metrics...

10.48550/arxiv.2411.12157 preprint EN arXiv (Cornell University) 2024-11-18

Abstract Background In this study, we examined psychometric properties of the Chinese version Resilience Scale (RS) and parenting-related factors associated with resilience among disaster-exposed adolescents. Methods Eighteen months after earthquake, a total 1266 adolescents (43.4% male, mean age = 15.98; SD 1.28) were assessed using RS, Post-traumatic Stress Disorder Self-Rating Scale, Depression Self-rating for Children, Screen Child Anxiety Related Emotional Disorders, Parental Bonding...

10.1186/s12888-021-03153-x article EN cc-by BMC Psychiatry 2021-03-10

Graph Neural Networks (GNNs) have emerged as a series of effective learning methods for graph-related tasks. However, GNNs are shown vulnerable to adversarial attacks, where attackers can fool into making wrong predictions on samples with well-designed perturbations. Specifically, we observe that the current evasion attacks suffer from two limitations: (1) attack strategy based reinforcement method might not be transferable when budget changes; (2) greedy mechanism in vanilla gradient-based...

10.1145/3459637.3482161 article EN 2021-10-26

The futures market's forecasts are significant to investors and policymakers, where the application of deep learning approaches finance has received a great deal attention. In this study, we propose multivariate financial time-series forecasting method. Our model addresses long- short-term features, multimodal non-stationarity nature by incorporating improved neural networks certified noise injection. Specifically, variational autoencoder is used extract high-level features time-series,...

10.1109/access.2020.3001287 article EN cc-by IEEE Access 2020-01-01

In Federated Learning (FL), blockchain has been extensively used to achieve distributed and tamper-resistant data processing. However, typical Blockchain-based (BFL) rarely considers clients' resource computing limits. High-capacity clients may be sacrificed when all train on the same neural network. This paper proposes a Heterogeneous (BlocFL) model address challenges above. BlocFL replaces central server with consortium blockchain, several networks are employed for local training....

10.1109/blockchain60715.2023.00053 article EN 2023-12-17

Deep learning models with backdoors act maliciously when triggered but seem normal otherwise. This risk, often increased by model outsourcing, challenges their secure use. Although countermeasures exist, defense against adaptive attacks is under-examined, possibly leading to security misjudgments. study the first intricate examination illustrating difficulty of detecting in outsourced models, especially attackers adjust strategies, even if capabilities are significantly limited. It...

10.1109/tifs.2024.3349869 article EN IEEE Transactions on Information Forensics and Security 2024-01-01

Detection-based defense approaches are effective against adversarial attacks without compromising the structure of protected model. However, they could be bypassed by stronger and limited in their ability to handle high-fidelity images. In this paper, we explore an detection-based on images (including high-resolution images) extending investigation beyond a single-instance perspective incorporate its transformations as well. Our intuition is that essential characteristics valid image...

10.1109/tifs.2022.3155975 article EN IEEE Transactions on Information Forensics and Security 2022-01-01
Coming Soon ...