Follow
Hongxia Jin
Title
Cited by
Cited by
Year
Generalized odin: Detecting out-of-distribution image without learning from out-of-distribution data
YC Hsu, Y Shen, H Jin, Z Kira
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020
6512020
Generalizing DTW to the multi-dimensional case requires an adaptive approach
M Shokoohi-Yekta, B Hu, H Jin, J Wang, E Keogh
Data mining and knowledge discovery 31, 1-31, 2017
3282017
Taking a hint: Leveraging explanations to make vision and language models more grounded
RR Selvaraju, S Lee, Y Shen, H Jin, S Ghosh, L Heck, D Batra, D Parikh
Proceedings of the IEEE/CVF international conference on computer vision …, 2019
2862019
A bi-model based RNN semantic frame parsing model for intent detection and slot filling
Y Wang, Y Shen, H Jin
arXiv preprint arXiv:1812.10235, 2018
2442018
Computing system with privacy control mechanism and method of operation thereof
D Kong, H Jin
US Patent 10,127,403, 2018
2102018
Private spatial data aggregation in the local setting
R Chen, H Li, AK Qin, SP Kasiviswanathan, H Jin
2016 IEEE 32nd International Conference on Data Engineering (ICDE), 289-300, 2016
2042016
Dimensionality of information disclosure behavior
BP Knijnenburg, A Kobsa, H Jin
International Journal of Human-Computer Studies 71 (12), 1144-1162, 2013
1982013
Differentially private k-means clustering
D Su, J Cao, N Li, E Bertino, H Jin
Proceedings of the sixth ACM conference on data and application security and …, 2016
1952016
Always be dreaming: A new approach for data-free class-incremental learning
J Smith, YC Hsu, J Balloch, Y Shen, H Jin, Z Kira
Proceedings of the IEEE/CVF international conference on computer vision …, 2021
1932021
Alpagasus: Training a better alpaca with fewer data
L Chen, S Li, J Yan, H Wang, K Gunaratna, V Yadav, Z Tang, V Srinivasan, ...
arXiv preprint arXiv:2307.08701, 2023
1752023
Efficient privilege de-escalation for ad libraries in mobile apps
B Liu, B Liu, H Jin, R Govindan
Proceedings of the 13th annual international conference on mobile systems …, 2015
1502015
Text-based interactive recommendation via constraint-augmented reinforcement learning
R Zhang, T Yu, Y Shen, H Jin, C Chen
Advances in neural information processing systems 32, 2019
1442019
Personalized mobile app recommendation: Reconciling app functionality and user privacy preference
B Liu, D Kong, L Cen, NZ Gong, H Jin, H Xiong
Proceedings of the eighth ACM international conference on web search and …, 2015
1362015
Negative data augmentation
A Sinha, K Ayush, J Song, B Uzkent, H Jin, S Ermon
arXiv preprint arXiv:2102.05113, 2021
1342021
A neural transition-based model for nested mention recognition
B Wang, W Lu, Y Wang, H Jin
arXiv preprint arXiv:1810.01808, 2018
1222018
Tamper-resistant trusted java virtual machine and method of using the same
H Jin, DE Leake, JB Lotspiech, SI Nin, WE Plouffe
US Patent 7,516,331, 2009
1052009
System, method, and service for detecting improper manipulation of an application
H Jin, G Myles
US Patent 8,056,138, 2011
1022011
Quantified risk-adaptive access control for patient privacy protection in health information systems
Q Wang, H Jin
Proceedings of the 6th ACM symposium on information, computer and …, 2011
1002011
Esc: Exploration with soft commonsense constraints for zero-shot object navigation
K Zhou, K Zheng, C Pryor, Y Shen, H Jin, L Getoor, XE Wang
International Conference on Machine Learning, 42829-42842, 2023
902023
Continual diffusion: Continual customization of text-to-image diffusion with c-lora
JS Smith, YC Hsu, L Zhang, T Hua, Z Kira, Y Shen, H Jin
arXiv preprint arXiv:2304.06027, 2023
902023
The system can't perform the operation now. Try again later.
Articles 1–20