Search Results for author: Yulei Wu

Found 5 papers, 3 papers with code

Federated Analytics for 6G Networks: Applications, Challenges, and Opportunities

no code implementations8 Jan 2024 Juan Marcelo Parra-Ullauri, Xunzheng Zhang, Anderson Bravalheri, Yulei Wu, Reza Nejabati, Dimitra Simeonidou

Extensive research is underway to meet the hyper-connectivity demands of 6G networks, driven by applications like XR/VR and holographic communications, which generate substantial data requiring network-based processing, transmission, and analysis.

Distributed Computing Federated Learning

General Phrase Debiaser: Debiasing Masked Language Models at a Multi-Token Level

1 code implementation23 Nov 2023 Bingkang Shi, Xiaodan Zhang, Dehan Kong, Yulei Wu, Zongzhen Liu, Honglei Lyu, Longtao Huang

The social biases and unwelcome stereotypes revealed by pretrained language models are becoming obstacles to their application.

LiPar: A Lightweight Parallel Learning Model for Practical In-Vehicle Network Intrusion Detection

1 code implementation14 Nov 2023 Aiheng Zhang, Kai Wang, Bailing Wang, Yulei Wu

Through experiments, we prove that LiPar has great detection performance, running efficiency, and lightweight model size, which can be well adapted to the in-vehicle environment practically and protect the in-vehicle CAN bus security.

Cloud Computing Network Intrusion Detection

Effective In-vehicle Intrusion Detection via Multi-view Statistical Graph Learning on CAN Messages

1 code implementation13 Nov 2023 Kai Wang, Qiguang Jiang, Bailing Wang, Yongzheng Zhang, Yulei Wu

In this paper, we propose StatGraph: an Effective Multi-view Statistical Graph Learning Intrusion Detection to implement the fine-grained intrusion detection.

Graph Learning Intrusion Detection

Towards Experienced Anomaly Detector through Reinforcement Learning

no code implementations Thirty-Second AAAI Conference on Artificial Intelligence 2018 Chengqiang Huang, Yulei Wu, Yuan Zuo, Ke Pei, Geyong Min

This abstract proposes a time series anomaly detector which 1) makes no assumption about the underlying mechanism of anomaly patterns, 2) refrains from the cumbersome work of threshold setting for good anomaly detection performance under specific scenarios, and 3) keeps evolving with the growth of anomaly detection experience.

Anomaly Detection reinforcement-learning +4

Cannot find the paper you are looking for? You can Submit a new open access paper.