default search action
Yi Tu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Yixiu Liu, Yuxiang Zheng, Shijie Xia, Jiajun Li, Yi Tu, Chaoling Song, Pengfei Liu:
SAFETY-J: Evaluating Safety with Critique. EMNLP (Findings) 2024: 1170-1192 - [c18]Chong Zhang, Yi Tu, Yixi Zhao, Chenshu Yuan, Huan Chen, Yue Zhang, Mingxu Chai, Ya Guo, Huijia Zhu, Qi Zhang, Tao Gui:
Modeling Layout Reading Order as Ordering Relations for Visually-rich Document Understanding. EMNLP 2024: 9658-9678 - [c17]Yi Tu, Chong Zhang, Ya Guo, Huan Chen, Jinyang Tang, Huijia Zhu, Qi Zhang:
UNER: A Unified Prediction Head for Named Entity Recognition in Visually-rich Documents. ACM Multimedia 2024: 4890-4898 - [i12]Chong Zhang, Yixi Zhao, Chenshu Yuan, Yi Tu, Ya Guo, Qi Zhang:
Rethinking the Evaluation of Pre-trained Text-and-Layout Models from an Entity-Centric Perspective. CoRR abs/2402.02379 (2024) - [i11]Yixiu Liu, Yuxiang Zheng, Shijie Xia, Yuan Guo, Jiajun Li, Yi Tu, Chaoling Song, Pengfei Liu:
SAFETY-J: Evaluating Safety with Critique. CoRR abs/2407.17075 (2024) - [i10]Yi Tu, Chong Zhang, Ya Guo, Huan Chen, Jinyang Tang, Huijia Zhu, Qi Zhang:
UNER: A Unified Prediction Head for Named Entity Recognition in Visually-rich Documents. CoRR abs/2408.01038 (2024) - [i9]Chong Zhang, Yi Tu, Yixi Zhao, Chenshu Yuan, Huan Chen, Yue Zhang, Mingxu Chai, Ya Guo, Huijia Zhu, Qi Zhang, Tao Gui:
Modeling Layout Reading Order as Ordering Relations for Visually-rich Document Understanding. CoRR abs/2409.19672 (2024) - 2023
- [c16]Yi Tu, Ya Guo, Huan Chen, Jinyang Tang:
LayoutMask: Enhance Text-Layout Interaction in Multi-modal Pre-training for Document Understanding. ACL (1) 2023: 15200-15212 - [c15]Chong Zhang, Ya Guo, Yi Tu, Huan Chen, Jinyang Tang, Huijia Zhu, Qi Zhang, Tao Gui:
Reading Order Matters: Information Extraction from Visually-rich Documents by Token Path Prediction. EMNLP 2023: 13716-13730 - [i8]Yi Tu, Ya Guo, Huan Chen, Jinyang Tang:
LayoutMask: Enhance Text-Layout Interaction in Multi-modal Pre-training for Document Understanding. CoRR abs/2305.18721 (2023) - [i7]Chong Zhang, Ya Guo, Yi Tu, Huan Chen, Jinyang Tang, Huijia Zhu, Qi Zhang, Tao Gui:
Reading Order Matters: Information Extraction from Visually-rich Documents by Token Path Prediction. CoRR abs/2310.11016 (2023) - 2022
- [j6]Yi Tu, Yu Zeng:
Comparative Study of the Thermal and Hydraulic Performance of Supercritical CO2 and Water in Microchannels Based on Entropy Generation. Entropy 24(9): 1312 (2022) - [j5]Chenyu Wang, Ding Wang, Yi Tu, Guoai Xu, Huaxiong Wang:
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 19(1): 507-523 (2022) - [c14]Zhenzhen Bao, Jian Guo, Meicheng Liu, Li Ma, Yi Tu:
Enhancing Differential-Neural Cryptanalysis. ASIACRYPT (1) 2022: 318-347 - [c13]Jian Guo, Guozhen Liu, Ling Song, Yi Tu:
Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3. ASIACRYPT (3) 2022: 645-674 - [c12]Zhenzhen Bao, Jian Guo, Danping Shi, Yi Tu:
Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing. CRYPTO (1) 2022: 64-93 - [c11]Lijun Lyu, Yi Tu, Yingjie Zhang:
Improving the Deep-Learning-Based Differential Distinguisher and Applications to Simeck. CSCWD 2022: 465-470 - [c10]Lijun Lyu, Yi Tu, Yingjie Zhang:
Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64. ISC 2022: 443-463 - [i6]Jian Guo, Guozhen Liu, Ling Song, Yi Tu:
Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks against 6-Round SHA-3. IACR Cryptol. ePrint Arch. 2022: 184 (2022) - 2021
- [j4]Ling Song, Yi Tu, Danping Shi, Lei Hu:
Security analysis of Subterranean 2.0. Des. Codes Cryptogr. 89(8): 1875-1905 (2021) - [i5]Zhenzhen Bao, Jian Guo, Danping Shi, Yi Tu:
MITM Meets Guess-and-Determine: Further Improved Preimage Attacks against AES-like Hashing. IACR Cryptol. ePrint Arch. 2021: 575 (2021) - [i4]Zhenzhen Bao, Jian Guo, Meicheng Liu, Li Ma, Yi Tu:
Conditional Differential-Neural Cryptanalysis. IACR Cryptol. ePrint Arch. 2021: 719 (2021) - 2020
- [j3]Tianqi Gu, Yi Tu, Dawei Tang, Tianzhi Luo:
A Robust Moving Total Least-Squares Fitting Method for Measurement Data. IEEE Trans. Instrum. Meas. 69(10): 7566-7573 (2020) - [c9]Yi Tu, Li Niu, Weijie Zhao, Dawei Cheng, Liqing Zhang:
Image Cropping with Composition and Saliency Aware Aesthetic Score Map. AAAI 2020: 12104-12111 - [c8]Yi Tu, Li Niu, Junjie Chen, Dawei Cheng, Liqing Zhang:
Learning From Web Data With Self-Organizing Memory Module. CVPR 2020: 12843-12852 - [i3]Ling Song, Yi Tu, Danping Shi, Lei Hu:
Security Analysis of Subterranean 2.0. IACR Cryptol. ePrint Arch. 2020: 1133 (2020)
2010 – 2019
- 2019
- [j2]Dawei Cheng, Yi Tu, Zhen-Wei Ma, Zhibin Niu, Liqing Zhang:
BHONEM: Binary High-Order Network Embedding Methods for Networked-Guarantee Loans. J. Comput. Sci. Technol. 34(3): 657-669 (2019) - [j1]Guozhen Liu, Weidong Qiu, Yi Tu:
New Techniques for Searching Differential Trails in Keccak. IACR Trans. Symmetric Cryptol. 2019(4): 407-437 (2019) - [c7]Dawei Cheng, Yiyi Zhang, Fangzhou Yang, Yi Tu, Zhibin Niu, Liqing Zhang:
A Dynamic Default Prediction Framework for Networked-guarantee Loans. CIKM 2019: 2547-2555 - [c6]Dawei Cheng, Yi Tu, Zhen-Wei Ma, Zhibin Niu, Liqing Zhang:
Risk Assessment for Networked-guarantee Loans Using High-order Graph Attention Representation. IJCAI 2019: 5822-5828 - [i2]Yi Tu, Li Niu, Dawei Cheng, Liqing Zhang:
ProtoNet: Learning from Web Data with Memory. CoRR abs/1906.12028 (2019) - [i1]Yi Tu, Li Niu, Weijie Zhao, Dawei Cheng, Liqing Zhang:
Image Cropping with Composition and Saliency Aware Aesthetic Score Map. CoRR abs/1911.10492 (2019) - 2018
- [c5]Dawei Cheng, Yi Tu, Zhibin Niu, Liqing Zhang:
Learning Temporal Relationships Between Financial Signals. ICASSP 2018: 2641-2645 - [c4]Dawei Cheng, Zhibin Niu, Yi Tu, Liqing Zhang:
Prediction Defaults for Networked-guarantee Loans. ICPR 2018: 361-366 - [c3]Peizhi Wu, Yi Tu, Xiaojie Yuan, Adam Jatowt, Zhenglu Yang:
Neural Framework for Joint Evolution Modeling of User Feedback and Social Links in Dynamic Social Networks. IJCAI 2018: 1632-1638 - [c2]Peizhi Wu, Yi Tu, Zhenglu Yang, Adam Jatowt, Masato Odagaki:
Deep Modeling of the Evolution of User Preferences and Item Attributes in Dynamic Social Networks. WWW (Companion Volume) 2018: 115-116 - 2016
- [c1]Kang Fu, Dawei Cheng, Yi Tu, Liqing Zhang:
Credit Card Fraud Detection Using Convolutional Neural Networks. ICONIP (3) 2016: 483-490
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint