科研成果 by Type: Conference Paper

研究手稿
Ai, Meitong; Gao M; JR. Health Cost Risk, Informal Insurance, and Annuitization Decisions, in 2023 American Risk and Insurance Association (ARIA) Annual Meeting. Washington DC; 研究手稿. 全文链接 SSRN: abstract=4567635Abstract
This paper provides the first piece of empirical evidence regarding the impact of health cost risk on individuals' annuitization decisions. We find that health cost risk increases the probability of individuals' pension participation but decreases the amount of pension contributions. We show that the substitution effect of informal insurance on pensions leads to these seemingly contradictory results. The impact of health cost risk on pension participation and contributions is negative and consistent with the mainstream theory after accounting for the effect of informal insurance. The substitution effect of informal insurance on pensions is stronger, and thus mitigates the impact of health cost risk more pronounced for households that have better-educated children, lower incomes, and more informal social networks and in regions that have a higher male–female ratio, that have higher mobility, or are less developed; but this substitution effect does not differ depending on their children's gender. This study improves our understanding of the relationship between health cost risk and individuals' annuitization decisions as well as the role of informal insurance in this relationship.
Forthcoming
Zhu Q, Luo H, Yang C, Ding M, Yin W, Yuan X. Enabling and Scaling the HPCG Benchmark on the Newest Generation Sunway Supercomputer, in SC21 (Best Paper Finalist, Best Student Paper Finalist).; Forthcoming.
2025
Zhou Y, Zhu R, Luo W, Xu X, Qi S, Ning Z, Chen L, Shao H, Tang K, HUANG R. 3D NOR-Type FeFETs with Record Endurance of 1011, Fast Erase of 50 ns, and Immediate Read-After-Write for In-Memory Learning, in 2025 Symposium on VLSI Technology and Circuits (VLSI Technology and Circuits).; 2025:1-3.
Liang J, Zhang Z, Zhang X, Shen Q, Gao Y, Yuan X, Xue H, Wu P, Wu Z. Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer, in 34th USENIX SECURITY SYMPOSIUM. SEATTLE, WA, USA(Honorable Mention Paper): USENIX; 2025. 访问链接Abstract
Signature schemes are a fundamental component of cybersecurity infrastructure. While they are designed to be mathematically secure against cryptographic attacks, they are vulnerable to Rowhammer fault-injection attacks. Since all existing attacks are ad-hoc in that they target individual parameters of specific signature schemes, it remains unclear about the impact of Rowhammer on signature schemes as a whole. In this paper, we present Achilles, a formal framework that aids in leaking secrets in various real-world signature schemes via Rowhammer. Particularly, Achilles can be used to find potentially more vulnerable parameters in schemes that have been studied before and also new schemes that are potentially vulnerable. Achilles mainly describes a formal procedure where Rowhammer faults are induced to key parameters of a generalized signature scheme, called G-sign, and a post-Rowhammer analysis is then performed for secret recovery on it. To illustrate the viability of Achilles, we have evaluated six signature schemes (with five CVEs assigned to track their respective Rowhammer vulnerability), covering traditional and post-quantum signatures with different mathematical problems. Based on the analysis with Achilles, all six schemes are proved to be vulnerable, and two new vulnerable parameters are identified for EdDSA. Further, we demonstrate a successful Rowhammer attack against each of these schemes, using recent cryptographic libraries including wolfsslrelic, and liboqs.
Zhang X, Yang Y, Zou J, Shen Q, Zhang Z, Gao Y, Wu Z, Carlson TE. AmpereBleed: Exploiting On-chip Current Sensors for Circuit-Free Attacks on ARM-FPGA SoCs, in 62nd ACM/IEEE Design Automation Conference, DAC 2025, San Francisco, CA, USA, June 22-25, 2025. IEEE; 2025:1–7. 访问链接
Zhou Y, HUANG R, Tang K. Comprehensive Investigation of the Disturb and Retention Issues in Scaled FeNAND Arrays, in 2025 9th IEEE Electron Devices Technology & Manufacturing Conference (EDTM).; 2025:01-03.
Wu D, Wang Y, Wu X, Qu T. Cross-attention Inspired Selective State Space Models for Target Sound Extraction, in International Conference on Acoustics, Speech and Signal Processing (ICASSP). Hyderabad, India; 2025:1-5.Abstract
The Transformer model, particularly its cross-attention module, is widely used for feature fusion in target sound extraction which extracts the signal of interest based on given clues. Despite its effectiveness, this approach suffers from low computational efficiency. Recent advancements in state space models, notably the latest work Mamba, have shown comparable performance to Transformer-based methods while significantly reducing computational complexity in various tasks. However, Mamba’s applicability in target sound extraction is limited due to its inability to capture dependencies between different sequences as the cross-attention does. In this paper, we propose CrossMamba for target sound extraction, which leverages the hidden attention mechanism of Mamba to compute dependencies between the given clues and the audio mixture. The calculation of Mamba can be divided to the query, key and value. We utilize the clue to generate the query and the audio mixture to derive the key and value, adhering to the principle of the cross-attention mechanism in Transformers. Experimental results from two representative target sound extraction methods validate the efficacy of the proposed CrossMamba
Luo W, Zhu R, Shao H, Zhou Y, HUANG R, Tang K. Decoupling Polarization and Trap Charges by Direct Vmid Measurement for Insights into Dynamic Mechanisms of MFMIS-FeFET, in 2025 9th IEEE Electron Devices Technology & Manufacturing Conference (EDTM).; 2025:1-3.
Xie Y, Zhang P. Detecting AI-Generated vs. Human-Written Health Misinformation: the Impact of eHealth Literacy on Accuracy and Sharing, in Annual Meeting of Association for Information Science and Technology.; 2025.
Xie L, Luan T, Cai W, Yan G, Chen Z, Xi N, Fang Y, Shen Q, Wu Z, Yuan J. dFLMoE: Decentralized Federated Learning via Mixture of Experts for Medical Data Analysis, in IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2025, Nashville, TN, USA, June 11-15, 2025. Computer Vision Foundation / IEEE; 2025:10203–10213. 访问链接
Zhang C, Li W, Luo Z, Zhang P. Engaging with AI in Crowdsourced Digitization of Ancient Texts: User Perception and Interaction, in Annual Meeting of Association for Information Science and Technology. (SIG-USE Best Conference Paper Award); 2025.
Yan G, Xie L, Gao X, Zhang W, Shen Q, Fang Y, Wu Z. FedVCK: Non-IID Robust and Communication-Efficient Federated Learning via Valuable Condensed Knowledge for Medical Image Analysis, in AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25 - March 4, 2025, Philadelphia, PA, USA. AAAI Press; 2025:21904–21912. 访问链接
Chen W, Zhang Z, Zhang X, Shen Q, Yarom Y, Genkin D, Yan C, Wang Z. HyperHammer: Breaking Free from KVM-Enforced Isolation, in Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2, ASPLOS 2025, Rotterdam, Netherlands, 30 March 2025 - 3 April 2025. ACM; 2025:545–559. 访问链接
Xu H, Zhang P. The Influence of Anonymity and Social Ties on Personal Experience Sharing: A Comprehensive Mixed-Methods Study, in The ACM International Conference on Supporting Group Work (GROUP ’25). New York, NY, USA: ACM; 2025.
Zhang X, Zou J, Yang Y, Shen Q, Zhang Z, Gao Y, Wu Z, Carlson TE. LeakyDSP: Exploiting Digital Signal Processing Blocks to Sense Voltage Fluctuations in FPGAs, in 62nd ACM/IEEE Design Automation Conference, DAC 2025, San Francisco, CA, USA, June 22-25, 2025. IEEE; 2025:1–7. 访问链接
Luo Y, Shen Q, Wu Z. LPDetective: Dusting the LLM Chats for Prompt Template Abusers, in Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence, IJCAI 2025, Montreal, Canada, August 16-22, 2025. ijcai.org; 2025:7616–7624. 访问链接
Luo Y, Shen Q, Wu Z. MA-RAG: Automating Role Engineering for RESTful APIs with Multi-Head Attention and Retrieval-Augmented Generation, in Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence, IJCAI 2025, Montreal, Canada, August 16-22, 2025. ijcai.org; 2025:7607–7615. 访问链接
Wu D, Du J, Qu T, Huang Q, Zhang D. Moving Sound Source Localization and Tracking based on Envelope Estimation for Unknown Number of Sources, in the AES 158th Convention. Warsaw, Poland; 2025:10216.Abstract
Existing methods for moving sound source localization and tracking face significant challenges when dealing withan unknown number of sound sources, which substantially limits their practical applications. This paper proposes amoving sound source tracking method based on source signal envelopes that does not require prior knowledge ofthe number of sources. First, an encoder-decoder attractor (EDA) method is used to estimate the number of sourcesand obtain an attractor for each source, based on which the signal envelope of each source is estimated. This signalenvelope is then used as a clue for tracking the target source. The proposed method has been validated throughsimulation experiments. Experimental results demonstrate that the proposed method can accurately estimate thenumber of sources and precisely track each source.
Quan Y, Wan X, Tang Z, Liang J, Ji H. Multi-Focus Image Fusion via Explicit Defocus Blur Modelling, in Proceedings of the AAAI Conference on Artificial Intelligence (AAAI).; 2025.Abstract
Multi-focus image fusion (MFIF) is a critical technique for enhancing depth of field in photography, producing an all-in-focus image from multiple images captured at different focal lengths. While deep learning has shown promise in MFIF, most existing methods ignore the physical model of defocus blurring in their neural architecture design, limiting their interoperability and generalization. This paper presents a novel framework that integrates explicit defocus blur modeling into the MFIF process, leading to enhanced interpretability and performance. Leveraging an atom-based spatially-varying parameterized defocus blurring model, our approach first calculates pixel-wise defocus descriptors and initial focused images from multi-focus source images through a scale-recurrent fashion, based on which soft decision maps are estimated. Afterward, image fusion is performed using masks constructed from the decision maps, with a separate treatment on pixels that are probably defocused in all source images or near boundaries of defocused/focused regions. Model training is done with a fusion loss and a cross-scale defocus estimation loss. Extensive experiments on benchmark datasets have demonstrated the effectiveness of our approach.
ZHONG Y†, WANG Z†, GAO Y, CUI X, Zhang X, WANG Y*. NeuroHexa: A 2D/3D-Scalable Model-Adaptive NoC Architecture for Neuromorphic Computing, in 5th Design, Automation and Test in Europe Conference (DATE). Lyon, France: IEEE Press; 2025. 访问链接

Pages