Search Results - "Tian, Zhiyi"
-
1
Comparing Models of Frailty: The Health and Retirement Study
Published in Journal of the American Geriatrics Society (JAGS) (01-05-2009)“…OBJECTIVES: To operationalize and compare three models of frailty, each representing a distinct theoretical view of frailty: as deficiencies in function…”
Get full text
Journal Article -
2
Geriatric conditions and disability : The health and retirement study
Published in Annals of internal medicine (07-08-2007)“…Geriatric conditions, such as incontinence and falling, are not part of the traditional disease model of medicine and may be overlooked in the care of older…”
Get full text
Journal Article -
3
A Distance-Based Method for Building an Encrypted Malware Traffic Identification Framework
Published in IEEE access (2019)“…The popularity of encryption method brings a great challenge to malware traffic identification. Traditional classes defined by expert experience are usually…”
Get full text
Journal Article -
4
Two-layer detection framework with a high accuracy and efficiency for a malware family over the TLS protocol
Published in PloS one (06-05-2020)“…The transport layer security (TLS) protocol is widely adopted by apps as well as malware. With the geometric growth of TLS traffic, accurate and efficient…”
Get full text
Journal Article -
5
Personalized Federated Learning for Heterogeneous Residential Load Forecasting
Published in Big Data Mining and Analytics (01-12-2023)“…Accurate load forecasting is critical for electricity production, transmission, and maintenance. Deep learning (DL) model has replaced other classical models…”
Get full text
Journal Article -
6
No-shows to primary care appointments: subsequent acute care utilization among diabetic patients
Published in BMC health services research (06-09-2012)“…Patients who no-show to primary care appointments interrupt clinicians' efforts to provide continuity of care. Prior literature reveals no-shows among diabetic…”
Get full text
Journal Article -
7
Geriatric Conditions Develop in Middle-Aged Adults with Diabetes
Published in Journal of general internal medicine : JGIM (01-03-2011)“…ABSTRACT BACKGROUND Geriatric conditions, collections of symptoms common in older adults and not necessarily associated with a specific disease, increase in…”
Get full text
Journal Article -
8
Cross-Sectional Survey of Factors Contributing to COVID-19 Testing Hesitancy Among US Adults at Risk of Severe Outcomes from COVID-19
Published in Infectious diseases and therapy (01-07-2024)“…Introduction The United States Centers for Disease Control and Prevention (CDC) advises testing individuals for COVID-19 after exposure or if they display…”
Get full text
Journal Article -
9
Clustering High-Dimensional Noisy Categorical Data
Published in Journal of the American Statistical Association (16-01-2024)Get full text
Journal Article -
10
CRCGAN: Toward robust feature extraction in finger vein recognition
Published in Pattern recognition (01-02-2025)“…Deep convolutional neural networks (CNNs) have produced remarkable outcomes in finger vein recognition. However, these networks often overfit label…”
Get full text
Journal Article -
11
Semantic Communications Toward Graph Data
Published in IEEE wireless communications (29-07-2024)“…In the development of communication systems, semantic communications (SemCom) represents a pivotal shift from conventional methods, underscoring the primacy of…”
Get full text
Journal Article -
12
An Asynchronous Multi-Task Semantic Communication Method
Published in IEEE network (01-07-2024)“…Semantic communication has sparked great interest, due to the rising demands of emerging applications on high communication capacity and low latency. The…”
Get full text
Journal Article -
13
ROSE: A Receiver-Oriented Semantic Communication Framework
Published in IEEE network (26-07-2024)“…Semantic communication (SemCom) is an emerging paradigm focusing on the meaning of transmitted symbols for effective communications. Existing SemCom methods…”
Get full text
Journal Article -
14
Machine Unlearning via Representation Forgetting With Parameter Self-Sharing
Published in IEEE transactions on information forensics and security (2024)“…Machine unlearning enables data owners to remove the contribution of their specified samples from trained models. However, existing methods fail to strike an…”
Get full text
Journal Article -
15
Forgetting and Remembering Are Both You Need: Balanced Graph Structure Unlearning
Published in IEEE transactions on information forensics and security (2024)“…In light of the growing emphasis on the right to be forgotten of graph data, machine unlearning has been extended to unlearn the graph structures' knowledge…”
Get full text
Journal Article -
16
Modeling and Analyzing the Spatial-Temporal Propagation of Malware in Mobile Wearable IoT Networks
Published in IEEE internet of things journal (15-01-2024)“…Wearable IoT devices are easily compromised by malware due to their security vulnerabilities. The bots infected by malware may continue to infect healthy…”
Get full text
Journal Article -
17
Sneaking Through Security: Mutating Live Network Traffic to Evade Learning-Based NIDS
Published in IEEE eTransactions on network and service management (01-09-2022)“…Machine learning based network intrusion system (NIDS) is known to be vulnerable to evasions. Attackers conceal intrusion activities to make them undetected…”
Get full text
Journal Article -
18
The Role of Class Information in Model Inversion Attacks Against Image Deep Learning Classifiers
Published in IEEE transactions on dependable and secure computing (01-07-2024)“…Model inversion attacks can reconstruct the training samples of victim deep learning models. The existing efforts heavily rely on auxiliary information of the…”
Get full text
Journal Article -
19
Cancelled Primary Care Appointments: A Prospective Cohort Study of Diabetic Patients
Published in Journal of medical systems (01-04-2017)“…Patients scheduled for primary care appointments often cancel or no show. For diabetic patients, nonattendance can affect continuity of care and result in…”
Get full text
Journal Article -
20
Construct New Graphs Using Information Bottleneck Against Property Inference Attacks
Published in ICC 2023 - IEEE International Conference on Communications (28-05-2023)“…Graphs provide a unique representation of real- world data. However, recent studies found that inference attacks can extract private property information of…”
Get full text
Conference Proceeding