
A Reversible Data hiding Scheme in Encrypted Domain for Secret Image Sharing based on Chinese Remainder Theorem
Reversible data hiding in encrypted domain (RDHED) schemes based on sym...
read it

The Sample Complexity of Bestk Items Selection from Pairwise Comparisons
This paper studies the sample complexity (aka number of comparisons) bou...
read it

MultiArmed Bandits with Local Differential Privacy
This paper investigates the problem of regret minimization for multiarm...
read it

Transformation Importance with Applications to Cosmology
Machine learning lies at the heart of new possibilities for scientific d...
read it

Toward LowCost and Stable Blockchain Networks
Envisioned to be the future of distributed systems, blockchain networks ...
read it

Influence Function based Data Poisoning Attacks to TopN Recommender Systems
Recommender system is an essential component of web services to engage u...
read it

Overfitting Can Be Harmless for Basis Pursuit: Only to a Degree
Recently, there have been significant interests in studying the generali...
read it

Randomized Bregman Coordinate Descent Methods for NonLipschitz Optimization
We propose a new randomized Bregman (block) coordinate descent (RBCD) me...
read it

Private and CommunicationEfficient Edge Learning: A Sparse Differential GaussianMasking Distributed SGD Approach
With rise of machine learning (ML) and the proliferation of smart mobile...
read it

Leveraging Two Reference Functions in Block Bregman Proximal Gradient Descent for Nonconvex and NonLipschitz Problems
In the applications of signal processing and data analytics, there is a ...
read it

Detecting Cyberattacks in Industrial Control Systems Using Online Learning Algorithms
Industrial control systems are critical to the operation of industrial f...
read it

CommunicationEfficient NetworkDistributed Optimization with DifferentialCoded Compressors
Networkdistributed optimization has attracted significant attention in ...
read it

FDDWNet: A Lightweight Convolutional Neural Network for Realtime Sementic Segmentation
This paper introduces a lightweight convolutional neural network, called...
read it

Hierarchical FeatureAware Correlation Filter for Efficient Visual Tracking
In this paper, we propose a featureaware correlation filter (FACF) for ...
read it

Hierarchical FeatureAware Tracking
In this paper, we propose a hierarchical featureaware tracking framewor...
read it

ByzantineResilient Stochastic Gradient Descent for Distributed Learning: A LipschitzInspired Coordinatewise Median Approach
In this work, we consider the resilience of distributed algorithms based...
read it

On Sample Complexity Upper and Lower Bounds for Exact Ranking from Noisy Comparisons
This paper studies the problem of finding the exact ranking from noisy c...
read it

Urban flows prediction from spatialtemporal data using machine learning: A survey
Urban spatialtemporal flows prediction is of great importance to traffi...
read it

Enabling security and High Energy Efficiency in the Internet of Things with Massive MIMO Hybrid Precoding
Recently, the security of Internet of Things (IoT) has been an issue of ...
read it

Recent Advances of Image Steganography with Generative Adversarial Networks
In the past few years, the Generative Adversarial Network (GAN) which pr...
read it

Efficient Parallel Simulation of Blood Flows in Abdominal Aorta
It is known that the maximum diameter for the rupturerisk assessment of...
read it

NeuralVis: Visualizing and Interpreting Deep Learning Models
Deep Neural Network(DNN) techniques have been prevalent in software engi...
read it

Distributed Linear Model Clustering over Networks: A TreeBased FusedLasso ADMM Approach
In this work, we consider to improve the model estimation efficiency by ...
read it

Generative Reversible Data Hiding by Image to Image Translation via GANs
The traditional reversible data hiding technique is based on cover image...
read it

Somewhat Reversible Data Hiding by Image to Image Translation
The traditional reversible data hiding technique is based on image modif...
read it

LEDNet: A Lightweight EncoderDecoder Network for RealTime Semantic Segmentation
The extensive computational burden limits the usage of CNNs in mobile de...
read it

Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data hiding in Encrypted Domain
This paper proposes a fully homomorphic encryption encapsulated differen...
read it

SelfOrganizing Quantum Networks
As the inevitable development trend of quantum key distribution, quantum...
read it

Nucleus Neural Network: A Datadriven Selforganized Architecture
Artificial neural networks which are inspired from the learning mechanis...
read it

Nucleus Neural Network for Super Robust Learning
Artificial neural networks which model the neurons and connecting archit...
read it

Large Margin Softmax Loss for Speaker Verification
In neural network based speaker verification, speaker embedding is expec...
read it

Habitat: A Platform for Embodied AI Research
We present Habitat, a new platform for research in embodied artificial i...
read it

Combinatorial Sleeping Bandits with Fairness Constraints
The multiarmed bandit (MAB) model has been widely adopted for studying ...
read it

Compressed Distributed Gradient Descent: CommunicationEfficient Consensus over Networks
Network consensus optimization has received increasing attention in rece...
read it

Exploring k out of Top ρ Fraction of Arms in Stochastic Bandits
This paper studies the problem of identifying any k distinct arms among ...
read it

Poisoning Attacks to GraphBased Recommender Systems
Recommender system is an important component of many web services to hel...
read it

Bayesian modelbased spatiotemporal survey design for logGaussian Cox process
In geostatistics, the design for data collection is central for accurate...
read it

Multiobjective Optimization Training of PLDA for Speaker Verification
Most current stateoftheart textindependent speaker verification syst...
read it

Exploring a Unified AttentionBased Pooling Framework for Speaker Verification
The pooling layer is an essential component in the neural network based ...
read it

Steganography Security: Principle and Practice
This paper focuses on several theoretical issues and principles in stega...
read it

PAC Ranking from Pairwise and Listwise Queries: Lower Bounds and Upper Bounds
This paper explores the adaptively (active) PAC (probably approximately ...
read it

Taming Convergence for Asynchronous Stochastic Gradient Descent with Unbounded Delay in NonConvex Learning
Understanding the convergence performance of asynchronous stochastic gra...
read it

Adaptive Stochastic Gradient Langevin Dynamics: Taming Convergence and Saddle Point Escape Time
In this paper, we propose a new adaptive stochastic gradient Langevin dy...
read it

Generative Steganography by Sampling
In this paper, a new datadriven information hiding scheme called genera...
read it

The Reincarnation of Grille Cipher: A Generative Approach
In order to keep the data secret, various techniques have been implement...
read it

The Reincarnation of Grille Cipher
In order to keep the data secret, various techniques have been implement...
read it

Speaker Embedding Extraction with Phonetic Information
Speaker embeddings achieve promising results on many speaker verificatio...
read it

Digital Cardan Grille: A Modern Approach for Information Hiding
In this paper, a new framework for construction of Cardan grille for inf...
read it

Link Selection for Secure Cooperative Networks with BufferAided Relaying
This paper investigates the secure communication in a twohop cooperativ...
read it

Dynamic Interference Steering in Heterogeneous Cellular Networks
With the development of diverse wireless communication technologies, int...
read it
Jia Liu
is this you? claim profile
Researcher at VASCO Data Security since 2018, Research Fellow at Institute for Communication Systems (ICS), 5G Innovation Centre (5GIC), University of Surrey since 2016, Research Assistant in the Cryptography and Information Security Group at Department of Computer Science, University of Bristol from 20152016, Research Fellow in Computer Security Group at School of Computer Science, University of Birmingham from 20122015, Laboratory of Computer Science, PhD Computer Science and Technology at Institute of Software Chinese Academy of Sciences 20052010.