Kun He
YOU?
Author Swipe
View article: Equipping future nurses: readiness of nursing students in addressing intimate partner violence in China
Equipping future nurses: readiness of nursing students in addressing intimate partner violence in China Open
Aim This study aimed to evaluate the readiness of nursing students in China to respond to patients experiencing intimate partner violence (IPV) and to identify key influencing factors. Background Nurses play a crucial role in providing car…
View article: Structure-Aware Spectral Sparsification via Uniform Edge Sampling
Structure-Aware Spectral Sparsification via Uniform Edge Sampling Open
Spectral clustering is a fundamental method for graph partitioning, but its reliance on eigenvector computation limits scalability to massive graphs. Classical sparsification methods preserve spectral properties by sampling edges proportio…
View article: Practical and Stealthy Touch-Guided Jailbreak Attacks on Deployed Mobile Vision-Language Agents
Practical and Stealthy Touch-Guided Jailbreak Attacks on Deployed Mobile Vision-Language Agents Open
Large vision-language models (LVLMs) enable autonomous mobile agents to operate smartphone user interfaces, yet vulnerabilities in their perception and interaction remain critically understudied. Existing research often relies on conspicuo…
View article: Recon-Act: A Self-Evolving Multi-Agent Browser-Use System via Web Reconnaissance, Tool Generation, and Task Execution
Recon-Act: A Self-Evolving Multi-Agent Browser-Use System via Web Reconnaissance, Tool Generation, and Task Execution Open
Recent years, multimodal models have made remarkable strides and pave the way for intelligent browser use agents. However, when solving tasks on real world webpages in multi-turn, long-horizon trajectories, current agents still suffer from…
View article: Neutrophil percentage-to-albumin ratio increases the risk of Parkinson’s disease and all-cause mortality in Parkinson’s disease patients: A population-based Study
Neutrophil percentage-to-albumin ratio increases the risk of Parkinson’s disease and all-cause mortality in Parkinson’s disease patients: A population-based Study Open
Background: This study aims to investigate the association of neutrophil percentage-to-albumin ratio (NPAR) with Parkinson’s disease (PD) prevalence and all-cause mortality risk in PD patients. Methods: Using NHANES 2001-2018 data (n=25,17…
View article: HT-Auth: Secure VR Headset Authentication via Subtle Head Tremors
HT-Auth: Secure VR Headset Authentication via Subtle Head Tremors Open
While Virtual Reality (VR) applications have gained popularity in recent years, efficiently identifying users on VR devices remains challenging. Current solutions, such as passwords and digital PINs, relying on handheld controllers or in-a…
View article: SmartShot: Hunt Hidden Vulnerabilities in Smart Contracts using Mutable Snapshots
SmartShot: Hunt Hidden Vulnerabilities in Smart Contracts using Mutable Snapshots Open
Smart contracts, as Turing-complete programs managing billions of assets in decentralized finance, are prime targets for attackers. While fuzz testing seems effective for detecting vulnerabilities in these programs, we identify several sig…
View article: Targeted control of fast prototyping through domain-specific interface
Targeted control of fast prototyping through domain-specific interface Open
Industrial designers have long sought a natural and intuitive way to achieve the targeted control of prototype models -- using simple natural language instructions to configure and adjust the models seamlessly according to their intentions…
View article: Dietary patterns and inflammatory bowel disease: a global assessment of eight nutrients by region, gender, and socioeconomic status
Dietary patterns and inflammatory bowel disease: a global assessment of eight nutrients by region, gender, and socioeconomic status Open
Background This study examines global intake patterns of eight dietary components associated with inflammatory bowel disease (IBD): fruits, non-starchy vegetables, processed meats, unprocessed red meats, saturated fats, monounsaturated fat…
View article: Deep Node Embeddings for the Graph Coloring Problem
Deep Node Embeddings for the Graph Coloring Problem Open
In recent years, there has been a growing trend in utilizing deep learning techniques to solve various NP-hard combinatorial optimization problems, mostly using deep neural networks to generate the solutions directly. In this work, we addr…
View article: Rethinking Tokenized Graph Transformers for Node Classification
Rethinking Tokenized Graph Transformers for Node Classification Open
Node tokenized graph Transformers (GTs) have shown promising performance in node classification. The generation of token sequences is the key module in existing tokenized GTs which transforms the input graph into token sequences, facilitat…
View article: Rethinking Membership Inference Attacks Against Transfer Learning
Rethinking Membership Inference Attacks Against Transfer Learning Open
View article: Rethinking Membership Inference Attacks Against Transfer Learning
Rethinking Membership Inference Attacks Against Transfer Learning Open
Transfer learning, successful in knowledge translation across related tasks, faces a substantial privacy threat from membership inference attacks (MIAs). These attacks, despite posing significant risk to ML model's training data, remain li…
View article: An Efficient Approach for the Partitioning Min-Max Weighted Matching Problem
An Efficient Approach for the Partitioning Min-Max Weighted Matching Problem Open
View article: Source Term Adaptive Update Method for Chemical Nonequilibrium Flows
Source Term Adaptive Update Method for Chemical Nonequilibrium Flows Open
View article: <scp>TokenScout:</scp> Early Detection of Ethereum Scam Tokens via Temporal Graph Learning
<span>TokenScout:</span> Early Detection of Ethereum Scam Tokens via Temporal Graph Learning Open
View article: HCR-Auth: Reliable Bone Conduction Earphone Authentication with Head Contact Response
HCR-Auth: Reliable Bone Conduction Earphone Authentication with Head Contact Response Open
Earables, or ear wearables, are increasingly being used for a variety of personal applications, prompting the development of authentication schemes to safeguard user privacy. Existing authentications are designed for traditional in-ear ear…
View article: DynaShard: Secure and Adaptive Blockchain Sharding Protocol with Hybrid Consensus and Dynamic Shard Management
DynaShard: Secure and Adaptive Blockchain Sharding Protocol with Hybrid Consensus and Dynamic Shard Management Open
Blockchain sharding has emerged as a promising solution to the scalability challenges in traditional blockchain systems by partitioning the network into smaller, manageable subsets called shards. Despite its potential, existing sharding so…
View article: Genomic and Transcriptomic Analyses Identify Two Key Glycosyltransferase Genes alhH and alhK of Exopolysaccharide Biosynthesis in Pantoea alhagi NX-11
Genomic and Transcriptomic Analyses Identify Two Key Glycosyltransferase Genes alhH and alhK of Exopolysaccharide Biosynthesis in Pantoea alhagi NX-11 Open
The exopolysaccharide (EPS) produced by Pantoea alhagi NX-11, referred to as alhagan, enhances plant stress resistance, improves soil properties, and exhibits notable rheological properties. Despite these benefits, the exact bio-synthetic …
View article: Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing
Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing Open
Smart contracts, the cornerstone of decentralized applications, have become increasingly prominent in revolutionizing the digital landscape. However, vulnerabilities in smart contracts pose great risks to user assets and undermine overall …
View article: Literacy Preservation of Qi Lin Lantern Dance in Chinese Schools
Literacy Preservation of Qi Lin Lantern Dance in Chinese Schools Open
Qi Lin Lantern Dance is a traditional Chinese cultural practice involving elaborate lantern displays and dance performances. The objective is to investigate the strategies used for literacy preservation of the Qi Lin Lantern Dance in Chine…
View article: NTFormer: A Composite Node Tokenized Graph Transformer for Node Classification
NTFormer: A Composite Node Tokenized Graph Transformer for Node Classification Open
Recently, the emerging graph Transformers have made significant advancements for node classification on graphs. In most graph Transformers, a crucial step involves transforming the input graph into token sequences as the model input, enabl…
View article: Leveraging Contrastive Learning for Enhanced Node Representations in Tokenized Graph Transformers
Leveraging Contrastive Learning for Enhanced Node Representations in Tokenized Graph Transformers Open
While tokenized graph Transformers have demonstrated strong performance in node classification tasks, their reliance on a limited subset of nodes with high similarity scores for constructing token sequences overlooks valuable information f…
View article: Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph
Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph Open
Ponzi schemes, a form of scam, have been discovered in Ethereum smart contracts in recent years, causing massive financial losses. Existing detection methods primarily focus on rule-based approaches and machine learning techniques that uti…
View article: A Method for Evaluating Systematic Risk in Dams with Random Field Theory
A Method for Evaluating Systematic Risk in Dams with Random Field Theory Open
The parameters of gravity dams and foundation materials objectively exhibit spatial variability due to environmental and load influences, which significantly affect the safety status of dam structures. Therefore, a safety risk analysis met…
View article: SCR-Auth: Secure Call Receiver Authentication on Smartphones Using Outer Ear Echoes
SCR-Auth: Secure Call Receiver Authentication on Smartphones Using Outer Ear Echoes Open
Receiving calls is one of the most universal functions of smartphones, involving sensitive information and critical operations. Unfortunately, to prioritize convenience, the current call receiving process bypasses smartphone authentication…
View article: Construction of street tree risk assessment system and empirical analysis based on non-destructive testing technologies
Construction of street tree risk assessment system and empirical analysis based on non-destructive testing technologies Open
The traditional visual tree assessment method is subjective in evaluating tree risks and therefore not effective in precisely detecting internal decay in tree trunk and root systems. To improve the accuracy of street tree risk assessment, …
View article: KD-Club: An Efficient Exact Algorithm with New Coloring-Based Upper Bound for the Maximum k-Defective Clique Problem
KD-Club: An Efficient Exact Algorithm with New Coloring-Based Upper Bound for the Maximum k-Defective Clique Problem Open
The Maximum k-Defective Clique Problem (MDCP) aims to find a maximum k-defective clique in a given graph, where a k-defective clique is a relaxation clique missing at most k edges. MDCP is NP-hard and finds many real-world applications in …
View article: CSIPose: Unveiling Body Pose Using Commodity WiFi Devices Through the Wall
CSIPose: Unveiling Body Pose Using Commodity WiFi Devices Through the Wall Open
The popularity of WiFi devices and the development of WiFi sensing have alerted people to the threat of WiFi sensingbased privacy leakage, especially the privacy of human poses. Existing work on human pose estimation is deployed in indoor …
View article: An Efficient Evolutionary Algorithm for Diversified Top-k (Weight) Clique Search Problems
An Efficient Evolutionary Algorithm for Diversified Top-k (Weight) Clique Search Problems Open
In many real-world problems and applications, finding only a single element, even though the best, among all possible candidates, cannot fully meet the requirements. We may wish to have a collection where each individual is not only outsta…