[HTML][HTML] Feasibility Study of Edge Computing Empowered by Artificial Intelligence—A Quantitative Analysis Based on Large Models
Y Chen, C Wu, R Sui, J Zhang - Big Data and Cognitive Computing, 2024 - mdpi.com
The advancement of artificial intelligence (AI) demands significant data and computational
resources that have an adverse impact on the environment. To address this issue, a novel …
resources that have an adverse impact on the environment. To address this issue, a novel …
Deep neural network pruning method based on sensitive layers and reinforcement learning
W Yang, H Yu, B Cui, R Sui, T Gu - Artificial Intelligence Review, 2023 - Springer
It is of great significance to compress neural network models so that they can be deployed
on resource-constrained embedded mobile devices. However, due to the lack of theoretical …
on resource-constrained embedded mobile devices. However, due to the lack of theoretical …
Renyi entropy-driven network traffic anomaly detection with dynamic threshold
H Yu, W Yang, B Cui, R Sui, X Wu - Cybersecurity, 2024 - Springer
Network traffic anomaly detection is a critical issue in network security. Existing Abnormal
traffic detection methods rely on statistical-based or anomaly-based approaches, and these …
traffic detection methods rely on statistical-based or anomaly-based approaches, and these …
Intriguing Properties of Universal Adversarial Triggers for Text Classification
K Zhao, R Sui, X Wu, W Yang - 2024 5th International …, 2024 - ieeexplore.ieee.org
The universal adversarial trigger (UniTrigger) is an extremely destructive attack method,
posing significant threats particularly in the domain of text classification. However, our …
posing significant threats particularly in the domain of text classification. However, our …
EvilPromptFuzzer: generating inappropriate content based on text-to-image models
Text-to-image (TTI) models provide huge innovation ability for many industries, while the
content security triggered by them has also attracted wide attention. Considerable research has …
content security triggered by them has also attracted wide attention. Considerable research has …
CtrlRAG: Black-box Adversarial Attacks Based on Masked Language Models in Retrieval-Augmented Language Generation
R Sui - arXiv preprint arXiv:2503.06950, 2025 - arxiv.org
Retrieval-Augmented Generation (RAG) systems enhance Large Language Models (LLMs)
by integrating external knowledge bases. However, this integration introduces a new …
by integrating external knowledge bases. However, this integration introduces a new …
Enhanced anomaly traffic detection framework using BiGAN and contrastive learning
H Yu, W Yang, B Cui, R Sui, X Wu - Cybersecurity, 2024 - Springer
Abnormal traffic detection is a crucial topic in the field of network security. However, existing
methods face many challenges when processing complex high-dimensional traffic data. …
methods face many challenges when processing complex high-dimensional traffic data. …
Classification and Implementation of Relevance Data Based on Address Text
W Yang, T Gu, R Sui - 2021 China Automation Congress (CAC), 2021 - ieeexplore.ieee.org
Tasks based on address text are commonly seen in real life, such as location-based services
based on geographic information systems, rapid localization and positioning systems for …
based on geographic information systems, rapid localization and positioning systems for …
A Faster Method For Generating Chinese Text Summaries-Combining Extractive Summarization And Abstractive Summarization
W Yang, T Gu, R Sui - Proceedings of the 2022 5th International …, 2022 - dl.acm.org
Extractive summarization and generative summarization are the two main ways to generate
summarization.However,previous work treats both of them as two independent subtasks.In …
summarization.However,previous work treats both of them as two independent subtasks.In …
The Security of RIP and IS-IS Routing Protocols: Research on Routing Attack Experiment
…, W Yang, B Cui, H Yu, R Sui - 2024 2nd International …, 2024 - ieeexplore.ieee.org
This paper aims to analyze the security of RIP and IS-IS routing protocols and compare their
performance in the face of common routing attacks. First, this paper introduces the basic …
performance in the face of common routing attacks. First, this paper introduces the basic …