default search action
Xuehai Tang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Xuehai Tang
, Wenjie Xiao
, Zhongjiang Yao
, Jizhong Han
:
SwordEcho: A LLM Jailbreaking Optimization Strategy Driven by Reinforcement Learning. CSAI 2024: 183-190 - [c23]Ziang Yang, Biyu Zhou, Xuehai Tang, Ruixuan Li, Songlin Hu:
Breaking the Weak Semantics Bottleneck of Transformers in Time Series Forecasting. ECAI 2024: 1430-1437 - [c22]Weigang Zhang, Biyu Zhou, Xing Wu, Chaochen Gao, Zhibing Liu, Xuehai Tang, Ruixuan Li, Jizhong Han, Songlin Hu:
Quartet: A Holistic Hybrid Parallel Framework for Training Large Language Models. Euro-Par (2) 2024: 424-438 - [c21]Huazhen Zhong, Jibin Wang, Xuejian Wang, Xin Wang, Wenjie Xiao, Xuehai Tang, Liangjun Zang:
DBPrompt: A Database Anomaly Operation Detection and Analysis via Prompt Learning. ICIC (8) 2024: 357-368 - [c20]Xuehai Tang, Zhongjiang Yao, Huazhen Zhong, Guan Wang, Yuanshu Zhao, Xiaodan Zhang, Jizhong Han:
EthGAN: Improving Ethereum Account Classification Accuracy via Data Augmentation. IJCNN 2024: 1-8 - [c19]Xuehai Tang, Zhongjiang Yao, Jie Wen, Yangchen Dong, Jizhong Han, Songlin Hu:
Reinforcement Learning-powered Effectiveness and Efficiency Few-shot Jailbreaking Attack LLMs. ISPA 2024: 1974-1981 - [i6]Xikang Yang, Xuehai Tang, Songlin Hu, Jizhong Han:
Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM. CoRR abs/2405.05610 (2024) - [i5]Xikang Yang, Xuehai Tang, Fuqing Zhu, Jizhong Han, Songlin Hu:
Enhancing Cross-Prompt Transferability in Vision-Language Models through Contextual Injection of Target Tokens. CoRR abs/2406.13294 (2024) - [i4]Lijia Lv, Weigang Zhang, Xuehai Tang, Jie Wen, Feng Liu, Jizhong Han, Songlin Hu:
AdaPPA: Adaptive Position Pre-Fill Jailbreak Attack Approach Targeting LLMs. CoRR abs/2409.07503 (2024) - [i3]Xikang Yang, Xuehai Tang, Jizhong Han, Songlin Hu:
The Dark Side of Trust: Authority Citation-Driven Jailbreak Attacks on Large Language Models. CoRR abs/2411.11407 (2024) - 2023
- [j4]Zhibin Sun
, Xinyue Jiang, Xuehai Tang, Lipeng Yan
, Fan Kuang, Xiaozhou Li, Min Dou, Bin Wang, Xiang Gao
:
Identifying Core Wavelengths of Oil Tree's Hyperspectral Data by Taylor Expansion. Remote. Sens. 15(12): 3137 (2023) - [c18]Weigang Zhang, Biyu Zhou, Xuehai Tang, Zhaoxing Wang, Songlin Hu:
MixPipe: Efficient Bidirectional Pipeline Parallelism for Training Large-Scale Models. DAC 2023: 1-6 - [c17]Ziang Yang, Biyu Zhou, Xuehai Tang, Ruixuan Li, Songlin Hu:
Orthrus: A Dual-Branch Model for Time Series Forecasting with Multiple Exogenous Series. DASFAA (1) 2023: 177-187 - [c16]Xikang Yang, Biyu Zhou, Xuehai Tang, Xiaodan Zhang, Jizhong Han, Songlin Hu:
Translets: Toward Explainable Phishing Fraud Detection in Ethereum. HPCC/DSS/SmartCity/DependSys 2023: 582-591 - [c15]Wang Wang, Xuehai Tang, Biyu Zhou, Yangchen Dong, Yuanhang Feng, Jizhong Han, Songlin Hu:
A Multi-source Domain Adaption Approach to Minority Disk Failure Prediction. ICA3PP (2) 2023: 53-72 - [c14]Huazhen Zhong, Fan Zhang, Yining Zhao, Weifang Zhang, Wenjie Xiao, Xuehai Tang, Liangjun Zang:
UDAD: An Accurate Unsupervised Database Anomaly Detection Method. IPCCC 2023: 109-115 - 2022
- [j3]Zhibin Sun
, Wenqi Qian, Qingfeng Huang, Haiyan Lv, Dagui Yu, Qiangxin Ou, Haomiao Lu, Xuehai Tang
:
Use Remote Sensing and Machine Learning to Study the Changes of Broad-Leaved Forest Biomass and Their Climate Driving Forces in Nature Reserves of Northern Subtropics. Remote. Sens. 14(5): 1066 (2022) - [c13]Wang Wang, Xuehai Tang, Biyu Zhou, Wenjie Xiao, Jizhong Han, Songlin Hu
:
Improving disk failure detection accuracy via data augmentation. IWQoS 2022: 1-10 - 2021
- [c12]Wenjie Xiao, Xuehai Tang, Biyu Zhou, Wang Wang, Yangchen Dong, Liangjun Zang, Jizhong Han, Songlin Hu:
Fed-Tra: Improving Accuracy of Deep Learning Model on Non-iid in Federated Learning. ICA3PP (1) 2021: 790-803 - [c11]Mengtian Gu, Biyu Zhou, Fengyang Du, Xuehai Tang, Wang Wang, Liangjun Zang, Jizhong Han, Songlin Hu:
Grasp the Key: Towards Fast and Accurate Host-Based Intrusion Detection in Data Centers. ICCS (2) 2021: 181-194 - 2020
- [c10]Chunyuan Yuan, Qianwen Ma, Junyang Chen, Wei Zhou, Xiaodan Zhang, Xuehai Tang, Jizhong Han, Songlin Hu
:
Exploiting Heterogeneous Artist and Listener Preference Graph for Music Genre Classification. ACM Multimedia 2020: 3532-3540 - [c9]Lingwei Wei, Dou Hu
, Wei Zhou, Xuehai Tang, Xiaodan Zhang, Xin Wang, Jizhong Han, Songlin Hu:
Hierarchical Interaction Networks with Rethinking Mechanism for Document-Level Sentiment Analysis. ECML/PKDD (3) 2020: 633-649 - [i2]Lingwei Wei, Dou Hu, Wei Zhou, Xuehai Tang, Xiaodan Zhang, Xin Wang, Jizhong Han, Songlin Hu:
Hierarchical Interaction Networks with Rethinking Mechanism for Document-level Sentiment Analysis. CoRR abs/2007.08445 (2020)
2010 – 2019
- 2019
- [c8]Xuehai Tang, Peng Wang
, Qiuyang Liu, Wang Wang, Jizhong Han:
Nanily: A QoS-Aware Scheduling for DNN Inference Workload in Clouds. HPCC/SmartCity/DSS 2019: 2395-2402 - [c7]Zhaoxing Wang, Xuehai Tang, Qiuyang Liu, Jizhong Han:
Jily: Cost-Aware AutoScaling of Heterogeneous GPU for DNN Inference in Public Cloud. IPCCC 2019: 1-8 - [c6]Yanwen Xie, Dan Feng, Fang Wang, Xuehai Tang, Jizhong Han, Xinyan Zhang
:
DFPE: Explaining Predictive Models for Disk Failure Prediction. MSST 2019: 193-204 - [c5]Fang Wang, Yingjie Tang, Yanwen Xie, Xuehai Tang:
XORInc: Optimizing Data Repair and Update for Erasure-Coded Systems with XOR-Based In-Network Computation. MSST 2019: 244-256 - 2018
- [c4]Zhiyuan Zhang, Xuehai Tang, Jizhong Han, Peng Wang
:
Sibyl: Host Load Prediction with an Efficient Deep Learning Model in Cloud Computing. ICA3PP (2) 2018: 226-237 - [c3]Yanwen Xie, Dan Feng, Fang Wang, Xinyan Zhang
, Jizhong Han, Xuehai Tang:
OME: An Optimized Modeling Engine for Disk Failure Prediction in Heterogeneous Datacenter. ICCD 2018: 561-564 - [c2]Xuehai Tang, Qiuyang Liu, Yangchen Dong, Jizhong Han, Zhiyuan Zhang:
Fisher: An Efficient Container Load Prediction Model with Deep Neural Network in Clouds. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 199-206 - 2014
- [c1]Xuehai Tang, Zhang Zhang, Min Wang, Yifang Wang, Qingqing Feng, Jizhong Han:
Performance Evaluation of Light-Weighted Virtualization for PaaS in Clouds. ICA3PP (1) 2014: 415-428 - 2011
- [j2]Xuehai Tang, Bing Sun, Ruilin Li, Chao Li:
Impossible differential cryptanalysis of 13-round CLEFIA-128. J. Syst. Softw. 84(7): 1191-1196 (2011) - [j1]Xuehai Tang, Bing Sun, Ruilin Li, Chao Li, Juhua Yin:
A meet-in-the-middle attack on reduced-round ARIA. J. Syst. Softw. 84(10): 1685-1692 (2011) - 2010
- [i1]Xuehai Tang, Bing Sun, Ruilin Li, Chao Li:
A Meet-in-the-Middle Attack on ARIA. IACR Cryptol. ePrint Arch. 2010: 168 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-27 18:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint