A recommendation model based on deep neural network L Zhang, T Luo, F Zhang, Y Wu IEEE Access 6, 9454-9463, 2018 | 125 | 2018 |
Attention convolutional binary neural tree for fine-grained visual categorization R Ji, L Wen, L Zhang, D Du, Y Wu, C Zhao, X Liu, F Huang Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020 | 122 | 2020 |
Artificial intelligence: A powerful paradigm for scientific research Y Xu, X Liu, X Cao, C Huang, E Liu, S Qian, X Liu, Y Wu, F Dong, CW Qiu, ... The Innovation 2 (4), 100179, 2021 | 108 | 2021 |
Deep reinforcement learning for extractive document summarization K Yao, L Zhang, T Luo, Y Wu Neurocomputing 284, 52-62, 2018 | 56 | 2018 |
Spatial attention pyramid network for unsupervised domain adaptation C Li, D Du, L Zhang, L Wen, T Luo, Y Wu, P Zhu Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23 …, 2020 | 52 | 2020 |
C2Detector: a covert channel detection framework in cloud computing J Wu, L Ding, Y Wu, N Min‐Allah, SU Khan, Y Wang Security and Communication Networks 7 (3), 544-557, 2014 | 50 | 2014 |
VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities. X Duan, J Wu, S Ji, Z Rui, T Luo, M Yang, Y Wu IJCAI, 4665-4671, 2019 | 49 | 2019 |
Dual encoding for abstractive text summarization K Yao, L Zhang, D Du, T Luo, L Tao, Y Wu IEEE transactions on cybernetics 50 (3), 985-996, 2018 | 46 | 2018 |
MrHeter: improving MapReduce performance in heterogeneous environments X Zhang, Y Wu, C Zhao Cluster Computing 19, 1691-1701, 2016 | 38 | 2016 |
Teaching Machines to Ask Questions. K Yao, L Zhang, T Luo, L Tao, Y Wu IJCAI, 4546-4552, 2018 | 37 | 2018 |
HyperVerify: A VM-assisted architecture for monitoring hypervisor non-control data B Ding, Y He, Y Wu, Y Lin 2013 IEEE Seventh International Conference on Software Security and …, 2013 | 29 | 2013 |
Learning semantic neural tree for human parsing R Ji, D Du, L Zhang, L Wen, Y Wu, C Zhao, F Huang, S Lyu Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23 …, 2020 | 27 | 2020 |
Guided attention network for object detection and counting on drones C YuanQiang, D Du, L Zhang, L Wen, W Wang, Y Wu, S Lyu Proceedings of the 28th ACM international conference on multimedia, 709-717, 2020 | 26 | 2020 |
Return-oriented programming attack on the xen hypervisor B Ding, Y Wu, Y He, S Tian, B Guan, G Wu 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 25 | 2012 |
Exception beyond Exception: Crashing Android System by Trapping in" Uncaught Exception" J Wu, S Liu, S Ji, M Yang, T Luo, Y Wu, Y Wang 2017 IEEE/ACM 39th International Conference on Software Engineering …, 2017 | 23 | 2017 |
Data priming network for automatic check-out C Li, D Du, L Zhang, T Luo, Y Wu, Q Tian, L Wen, S Lyu Proceedings of the 27th ACM international conference on multimedia, 2152-2160, 2019 | 22 | 2019 |
Guided attention network for object detection and counting on drones Y Cai, D Du, L Zhang, L Wen, W Wang, Y Wu, S Lyu arXiv preprint arXiv:1909.11307, 2019 | 19 | 2019 |
SiamCAN: Real-time visual tracking based on Siamese center-aware network W Zhou, L Wen, L Zhang, D Du, T Luo, Y Wu IEEE Transactions on Image Processing 30, 3597-3609, 2021 | 16 | 2021 |
Towards real-world prohibited item detection: A large-scale x-ray benchmark B Wang, L Zhang, L Wen, X Liu, Y Wu Proceedings of the IEEE/CVF international conference on computer vision …, 2021 | 16 | 2021 |
SiamMan: Siamese motion-aware network for visual tracking W Zhou, L Wen, L Zhang, D Du, T Luo, Y Wu arXiv preprint arXiv:1912.05515, 2019 | 16 | 2019 |