Generalized odin: Detecting out-of-distribution image without learning from out-of-distribution data YC Hsu, Y Shen, H Jin, Z Kira Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020 | 607 | 2020 |
Generalizing DTW to the multi-dimensional case requires an adaptive approach M Shokoohi-Yekta, B Hu, H Jin, J Wang, E Keogh Data mining and knowledge discovery 31, 1-31, 2017 | 314 | 2017 |
Taking a hint: Leveraging explanations to make vision and language models more grounded RR Selvaraju, S Lee, Y Shen, H Jin, S Ghosh, L Heck, D Batra, D Parikh Proceedings of the IEEE/CVF international conference on computer vision …, 2019 | 264 | 2019 |
A bi-model based RNN semantic frame parsing model for intent detection and slot filling Y Wang, Y Shen, H Jin arXiv preprint arXiv:1812.10235, 2018 | 237 | 2018 |
Computing system with privacy control mechanism and method of operation thereof D Kong, H Jin US Patent 10,127,403, 2018 | 207 | 2018 |
Private spatial data aggregation in the local setting R Chen, H Li, AK Qin, SP Kasiviswanathan, H Jin 2016 IEEE 32nd International Conference on Data Engineering (ICDE), 289-300, 2016 | 195 | 2016 |
Dimensionality of information disclosure behavior BP Knijnenburg, A Kobsa, H Jin International Journal of Human-Computer Studies 71 (12), 1144-1162, 2013 | 194 | 2013 |
Differentially private k-means clustering D Su, J Cao, N Li, E Bertino, H Jin Proceedings of the sixth ACM conference on data and application security and …, 2016 | 192 | 2016 |
Always be dreaming: A new approach for data-free class-incremental learning J Smith, YC Hsu, J Balloch, Y Shen, H Jin, Z Kira Proceedings of the IEEE/CVF international conference on computer vision …, 2021 | 181 | 2021 |
Efficient privilege de-escalation for ad libraries in mobile apps B Liu, B Liu, H Jin, R Govindan Proceedings of the 13th annual international conference on mobile systems …, 2015 | 146 | 2015 |
Text-based interactive recommendation via constraint-augmented reinforcement learning R Zhang, T Yu, Y Shen, H Jin, C Chen Advances in neural information processing systems 32, 2019 | 138 | 2019 |
Personalized mobile app recommendation: Reconciling app functionality and user privacy preference B Liu, D Kong, L Cen, NZ Gong, H Jin, H Xiong Proceedings of the eighth ACM international conference on web search and …, 2015 | 136 | 2015 |
Negative data augmentation A Sinha, K Ayush, J Song, B Uzkent, H Jin, S Ermon arXiv preprint arXiv:2102.05113, 2021 | 129 | 2021 |
Alpagasus: Training a better alpaca with fewer data L Chen, S Li, J Yan, H Wang, K Gunaratna, V Yadav, Z Tang, V Srinivasan, ... arXiv preprint arXiv:2307.08701, 2023 | 127 | 2023 |
A neural transition-based model for nested mention recognition B Wang, W Lu, Y Wang, H Jin arXiv preprint arXiv:1810.01808, 2018 | 121 | 2018 |
Tamper-resistant trusted java virtual machine and method of using the same H Jin, DE Leake, JB Lotspiech, SI Nin, WE Plouffe US Patent 7,516,331, 2009 | 105 | 2009 |
System, method, and service for detecting improper manipulation of an application H Jin, G Myles US Patent 8,056,138, 2011 | 102 | 2011 |
Quantified risk-adaptive access control for patient privacy protection in health information systems Q Wang, H Jin Proceedings of the 6th ACM symposium on information, computer and …, 2011 | 100 | 2011 |
Autoreb: Automatically understanding the review-to-behavior fidelity in android applications D Kong, L Cen, H Jin Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 89 | 2015 |
Privacy-preserving personalized recommendation: An instance-based approach via differential privacy Y Shen, H Jin 2014 IEEE international conference on data mining, 540-549, 2014 | 81 | 2014 |