Read more
List of contents
.- Complex Data Management.
.- LSM-Cache:An Efficient Log-Structured Merge Hybrid Key-Value Cache for Massive Small Objects.
.- Monkey: Segmentation-based Lossless Floating-Point Compression.
.- DataAugmentation based Federated Client Selection with Bandit Approach.
.- Text-to-Image Person Re-Identification via Optimal Transport-based Priority Distribution.
.- GRAY: Enhancing Few-Shot NL2SQLTranslation through Incremental SQL Log-Based Demonstration Expansion.
.- RS-Stega: AToken-Level Quality-Control Framework for Generative Text Steganography.
.- TrustGenTable: ATrusted Method for Generating Tabular Data.
.- Enhancing Merge-Based PLA∞ Compression under Higher Requirement for Data Precision.
.- High-Performance Complex Event Matching over Out-of-Order Event Streams.
.- Enhancing Data Compression through Vertical Distance-Based Piecewise LinearApproximation.
.- Spatialand Temporal Data Management.
.- PTP-PGAT: Partition Transition Probability and Pretraining Graph Attention Networks for Trajectory
Representation.
.- Efficient Processing of Dynamic Rank-happiness Maximization Queries.
.- Aparameter efficient short-term metro inter-station flow forecasting model with MMoE.
.- Encoder-Decoder Driven Adaptive Multiscale-CNN Based Indoor Localization with WiFi Fingerprinting.
.- HELM:Hybrid Spatial Index of Moving Objects at Large Scales Tuned with Multi-Agent Reinforcement Learning.
.- Data Privacy and Trusted AI.
.- PriTree: Accurate Range Queries via Hierarchical Prefix-sum under Local Differential Privacy.
.- ASFRA-DP: Learning-Based Federated Spatial Query Processing with Density-Aware Privacy.
.- SVD-based Trajectory Data Synthesis under Local Differential Privacy.
.- An Efficient Federated Learning Privacy Preservation Method with Differential Privacy against Model
Inversion Attack.
.- Improve Visual Grounding with Dynamic Gating and Dual StreamAttention.
.- Counterfactual Adversarial Examples for Mitigating Privacy Risk inAdversarially Robust Models.
.- Data Management on New Hardwares.
.- NALI: NUMA-awareAdaptive Learned Index for In-Memory Multi-core Databases.
.- SAHSCM:Self-Activating and High-Speed Cryptographic Module for SATABridge Systems.
.- UltraZenFS: AUser-Space File System for LSM-tree based Key-Value Stores on Small-Zone ZNS
SSDs.
.- WROTree: Write and Range query Optimal Tree in Persistent Memory.
.- Reducing Write Stall and WriteAmplification for LSM-tree based Key-Value Stores Using a Hybrid
Compression Strategy.
.- Balance Performance and Cost:ACold/Hot Data ClassificationAlgorithm for NVM-SSD hybrid.
.- Query Processing and Optimization.
.- Towards Efficient Graph Similarity Search in Cloud Environments.
.- APO:Adaptive Pathway Optimization for Complex Query Tasks Based on KV-stores.
.- LH-DPT:An Update Efficient Index for High-DimensionalApproximate Nearest Neighbor Search.
.- LSTM-based Query Performance Optimization in LSM-trees.
.- Secure Location-Based Continuous Range Queries in Fog-based Cloud Computing.
.- RLGCNt: Cardinality Estimation based on Rank Gauss Transform Coding andAttention.
.- Continuous Top-k Skyline Pairs Query Over Data Stream.
.- Probabilistic Optimization of Top-k Aggregation in Distributed Environments.
.- ClassiCard: A Classifier Based Approach for Cardinality Estimation in Normalized Tables.
.- Meta-Transfer Routing in Dynamic Road Networks via Hierarchical Graph Embedding.
.- AData OrganizationArchitecture for Efficient Transaction Processing and Approximate AP Query in
HTAPSystems.
.- Data Mining II.
.- Quadruple Modeling Network for Temporal Knowledge Graph Completion.
.- Causal Inference forAlleviating Sequence Mutation in Sequential Recommendation.
.- GraphADQ:Graph-Attentive Dual Deep Q-Network forAdaptive Community Detection.
.- A Novel Temporal Heterogeneous Graph Learning-BasedAnomaly Detection Method for Industrial
Chain Evolution.
.- Contrastive Learning of Graph Transformer on Heterogeneous Information Networks.