Export Citations
Publication Archive
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-article
TCKT: Tree-Based Cross-domain Knowledge Transfer for Next POI Cold-Start Recommendation
ACM Transactions on Information Systems (TOIS), Just Accepted https://doi.org/10.1145/3709137The next point of interest (POI) recommendation task recommends POIs to users that they may be interested in next time based on their historical trajectories. This task holds value for both users and businesses. However, it has consistently faced the ...
- survey
Tool Learning with Foundation Models
- Yujia Qin,
- Shengding Hu,
- Yankai Lin,
- Weize Chen,
- Ning Ding,
- Ganqu Cui,
- Zheni Zeng,
- Xuanhe Zhou,
- Yufei Huang,
- Chaojun Xiao,
- Chi Han,
- Yi Ren Fung,
- Yusheng Su,
- Huadong Wang,
- Cheng Qian,
- Runchu Tian,
- Kunlun Zhu,
- Shihao Liang,
- Xingyu Shen,
- Bokai Xu,
- Zhen Zhang,
- Yining Ye,
- Bowen Li,
- Ziwei Tang,
- Jing Yi,
- Yuzhang Zhu,
- Zhenning Dai,
- Lan Yan,
- Xin Cong,
- Yaxi Lu,
- Weilin Zhao,
- Yuxiang Huang,
- Junxi Yan,
- Xu Han,
- Xian Sun,
- Dahai Li,
- Jason Phang,
- Cheng Yang,
- Tongshuang Wu,
- Heng Ji,
- Guoliang Li,
- Zhiyuan Liu,
- Maosong Sun
ACM Computing Surveys (CSUR), Volume 57, Issue 4Article No.: 101, Pages 1–40https://doi.org/10.1145/3704435Humans possess an extraordinary ability to create and utilize tools. With the advent of foundation models, artificial intelligence systems have the potential to be equally adept in tool use as humans. This paradigm, which is dubbed as tool learning with ...
- research-article
Variational Type Graph Autoencoder for Denoising on Event Recommendation
ACM Transactions on Information Systems (TOIS), Volume 43, Issue 1Article No.: 26, Pages 1–27https://doi.org/10.1145/3703156Recommendations for events play a pivotal role in facilitating the discovery of upcoming intriguing events within Event-Based Social Networks (EBSNs). Previous research has established the crucial significance of mining contextual features and implicit ...
- research-article
Detecting and Classifying Problematic Behavior: A Method Based on Multi-Dimensional Software Modeling Behavioral Characteristics
ACM Transactions on Computing Education (TOCE), Volume 25, Issue 1Article No.: 1, Pages 1–25https://doi.org/10.1145/3702331Understanding software modelers’ difficulties and evaluating their performance is crucial to Model-Driven Engineering (MDE) education. The software modeling process contains fine-grained information about the modelers’ analysis and thought processes. ...
- research-article
Beyond App Markets: Demystifying Underground Mobile App Distribution Via Telegram
Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), Volume 8, Issue 3Article No.: 33, Pages 1–25https://doi.org/10.1145/3700432The thriving mobile app ecosystem encompasses a wide range of functionalities. However, within this ecosystem, a subset of apps provides illicit services such as gambling and pornography to pursue economic gains, collectively referred to as "underground ...
- research-article
PTF-FSR: A Parameter Transmission-Free Federated Sequential Recommender System
ACM Transactions on Information Systems (TOIS), Just Accepted https://doi.org/10.1145/3708344Sequential recommender systems, as a specialized branch of recommender systems that can capture users’ dynamic preferences for more accurate and timely recommendations, have made significant progress. Recently, due to increasing concerns about user data ...
- research-article
Internet's Invisible Enemy: Detecting and Measuring Web Cache Poisoning in the Wild
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 452–466https://doi.org/10.1145/3658644.3690361Web cache poisoning (WCP) has posed significant threats to Internet security by causing the cache server to deliver malicious responses to innocent users. This results in widespread denial of access to website resources and potential injection of harmful ...
- research-article
Gopher: High-Precision and Deep-Dive Detection of Cryptographic API Misuse in the Go Ecosystem
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 2978–2992https://doi.org/10.1145/3658644.3690276The complexity of cryptographic APIs and developers' expertise gaps often leads to their improper use, seriously threatening information security. Existing cryptographic API misuse detection tools that rely on black/white-list methods require experts to ...
- research-article
Heterogeneous Graph Neural Networks using Self-supervised Reciprocally Contrastive Learning
ACM Transactions on Intelligent Systems and Technology (TIST), Just Accepted https://doi.org/10.1145/3706115Heterogeneous graph neural network (HGNN) is a popular technique for modeling and analyzing heterogeneous graphs. Most existing HGNN-based approaches are supervised or semi-supervised learning methods requiring graphs to be annotated, which is costly and ...
- research-article
IRS-aided bi-static ISAC system with security constraint
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and NetworkingPages 2222–2229https://doi.org/10.1145/3636534.3698233Integrated sensing and communication (ISAC), as a promising component in 6G, however, is faced with security challenges that the critical communication information will be leaked to the sensing targets. This paper investigates an intelligent reflecting ...
- research-article
Resilient Massive Access assisted ISAC in Space-Air-Ground Integrated Networks
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and NetworkingPages 2203–2208https://doi.org/10.1145/3636534.3698230Integrated sensing and communication (ISAC) and space-air-ground integrated networks (SAGIN) have been considered as key technologies of 6G. The challenge of achieving ISAC in uplink massive access scenarios within the SAGIN has become a major research ...
- research-article
A Robust Beamforming for Intergretd Sensing and Communications Systems
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and NetworkingPages 2155–2160https://doi.org/10.1145/3636534.3698222We propose a robust beamforming design methodology for integrated sensing and communications beamforms. The beamforming design aims to address channel uncertainties in the communication system by optimizing the sensing beamform. Assuming the Channel ...
- short-paper
QUIC-Enabled Framework for Alleviating Transient Congestion in Time-Critical IoT
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and NetworkingPages 1578–1580https://doi.org/10.1145/3636534.3697424The real-time control capability of IoT devices is contingent upon the transmission of packets. However, due to the influence of multiple devices accessing the network, the bandwidth available to IoT devices from access points may decline significantly, ...
- research-article
Plug-and-play Indoor GPS Positioning System with the Assistance of Optically Transparent Metasurfaces
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and NetworkingPages 875–889https://doi.org/10.1145/3636534.3690667Due to the poor indoor coverage and positioning accuracy, existing indoor GPS positioning systems leverages additional RF infrastructure as relay with known position. However, in practice, learning the relay position requires establishing an additional ...
- survey
Resource-efficient Algorithms and Systems of Foundation Models: A Survey
ACM Computing Surveys (CSUR), Just Accepted https://doi.org/10.1145/3706418Large foundation models, including large language models, vision transformers, diffusion, and LLM-based multimodal models, are revolutionizing the entire machine learning lifecycle, from training to deployment. However, the substantial advancements in ...
- research-article
Cloud‐Edge Collaboration‐Based Multi‐Cluster System for Space‐Ground Integrated Network
International Journal of Satellite Communications and Networking (WSAT), Volume 43, Issue 1Pages 40–60https://doi.org/10.1002/sat.1541ABSTRACTAs global informationization deepens, the importance of Space‐Ground Integrated Network (SGIN) as a new network architecture becomes increasingly prominent. SGIN combines the advantages of ground and space networks, enabling global information ...
- research-article
Real-World Scene Image Enhancement with Contrastive Domain Adaptation Learning
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 20, Issue 12Article No.: 371, Pages 1–23https://doi.org/10.1145/3694973Image enhancement methods leveraging learning-based approaches have demonstrated impressive results when trained on synthetic degraded-clear image pairs. However, when deployed in real-world scenarios, such models often suffer significant performance ...
- research-article
RECC: Joint Congestion Control Based on RTT and ECN for High-speed RDMA Networks
Proceedings of the ACM on Networking (PACMNET), Volume 2, Issue CoNEXT4Article No.: 31, Pages 1–18https://doi.org/10.1145/3696402Together with the construction of RDMA networks for data center applications, the RDMA-coupled DCQCN dominates the RDMA Congestion Control (CC). However, DCQCN suffers severe performance problems in high-speed RDMA networks with modern high-performance ...