Hai Wan
YOU?
Author Swipe
View article: QCBench: Evaluating Large Language Models on Domain-Specific Quantitative Chemistry
QCBench: Evaluating Large Language Models on Domain-Specific Quantitative Chemistry Open
Quantitative chemistry is central to modern chemical research, yet the ability of large language models (LLMs) to perform its rigorous, step-by-step calculations remains underexplored. To fill this gap, we propose QCBench, a Quantit…
View article: FG-CIBGC: A Unified Framework for Fine-Grained and Class-Incremental Behavior Graph Classification
FG-CIBGC: A Unified Framework for Fine-Grained and Class-Incremental Behavior Graph Classification Open
View article: LESS: Efficient Log Storage System Based on Learned Model and Minimum Attribute Tree
LESS: Efficient Log Storage System Based on Learned Model and Minimum Attribute Tree Open
In recent years, cyber attacks have become increasingly sophisticated and persistent. Detection and investigation based on the provenance graph can effectively mitigate cyber intrusion. However, in the long time span of defenses, the sheer…
View article: Trident: Detecting SQL Injection Attacks via Abstract Syntax Tree-based Neural Network
Trident: Detecting SQL Injection Attacks via Abstract Syntax Tree-based Neural Network Open
View article: DSFM: Enhancing Functional Code Clone Detection with Deep Subtree Interactions
DSFM: Enhancing Functional Code Clone Detection with Deep Subtree Interactions Open
Functional code clone detection is important for software maintenance. In recent years, deep learning techniques are introduced to improve the performance of functional code clone detectors. By representing each code snippet as a vector co…
View article: Revisiting Graph-Based Fraud Detection in Sight of Heterophily and Spectrum
Revisiting Graph-Based Fraud Detection in Sight of Heterophily and Spectrum Open
Graph-based fraud detection (GFD) can be regarded as a challenging semi-supervised node binary classification task. In recent years, Graph Neural Networks (GNN) have been widely applied to GFD, characterizing the anomalous possibility of a…
View article: A Switch Architecture for Time-Triggered Transmission with Best-Effort Delivery
A Switch Architecture for Time-Triggered Transmission with Best-Effort Delivery Open
In Time-Triggered (TT) or time-sensitive networks, the transmission of a TT frame is required to be scheduled at a precise time instant for industrial distributed real-time control systems. Other (or {\em best-effort} (BE)) frames are forw…
View article: A Survey on Machine Learning-Based Technology for Static Timing Analysis in Agile Design
A Survey on Machine Learning-Based Technology for Static Timing Analysis in Agile Design Open
View article: View-Guided Point Cloud Completion
View-Guided Point Cloud Completion Open
This paper presents a view-guided solution for the task of point cloud completion. Unlike most existing methods directly inferring the missing points using shape priors, we address this task by introducing ViPC (view-guided point cloud com…
View article: Editorial of special issue on time-sensitive networking
Editorial of special issue on time-sensitive networking Open
View article: Speeding up Very Fast Decision Tree with Low Computational Cost
Speeding up Very Fast Decision Tree with Low Computational Cost Open
Very Fast Decision Tree (VFDT) is one of the most widely used online decision tree induction algorithms, and it provides high classification accuracy with theoretical guarantees. In VFDT, the split-attempt operation is essential for leaf-s…
View article: Hypergraph Label Propagation Network
Hypergraph Label Propagation Network Open
In recent years, with the explosion of information on the Internet, there has been a large amount of data produced, and analyzing these data is useful and has been widely employed in real world applications. Since data labeling is costly, …
View article: Application specified soft-error failure rate analysis using sequential equivalence checking techniques
Application specified soft-error failure rate analysis using sequential equivalence checking techniques Open
Soft errors have become a critical challenge as a result of technology scaling.Existing circuit-hardening techniques are commonly associated with prohibitive overhead of performance, area, and power.However, evaluating the influence of sof…
View article: Hypergraph Learning With Cost Interval Optimization
Hypergraph Learning With Cost Interval Optimization Open
In many classification tasks, the misclassification costs of different categories usually vary significantly. Under such circumstances, it is essential to identify the importance of different categories and thus assign different misclassif…
View article: Vertex-Weighted Hypergraph Learning for Multi-View Object Classification
Vertex-Weighted Hypergraph Learning for Multi-View Object Classification Open
3D object classification with multi-view representation has become very popular, thanks to the progress on computer techniques and graphic hardware, and attracted much research attention in recent years. Regarding this task, there are main…
View article: Probabilistic modeling and optimization of Real-Time Protocol for Multifunction Vehicle Bus
Probabilistic modeling and optimization of Real-Time Protocol for Multifunction Vehicle Bus Open
In this paper, we present the modeling and optimization of a Real-Time Protocol (RTP) used in Train Communication Networks (TCN). In the proposed RTP, message arbitration is represented by a probabilistic model and the number of arbitratio…
View article: An new method to collaborative filtering recommendation based on DBN and HMM
An new method to collaborative filtering recommendation based on DBN and HMM Open
\nThe main problems of collaborative filtering are initial rating, data sparsity and recommendation in time. A recommendation approach based on HMM model, which creates nearest neighbour set by simulating the user behaviours of web browsin…