Skip to main content

Page of 18
and
  1. No Access

    Article

    ACX-UNet: a multi-scale lung parenchyma segmentation study with improved fusion of skip connection and circular cross-features extraction

    Convolutional neural networks (CNN) are widely used in the field of computer-aided diagnosis of lung diseases. Its main tasks are segmentation of lung parenchyma, lung nodule detection and lesion analysis. Amo...

    Hongbing Wu, Zhuo Zhang, Yuchen Zhang, Baoshan Sun in Signal, Image and Video Processing (2024)

  2. No Access

    Chapter and Conference Paper

    Image Blending Algorithm with Automatic Mask Generation

    In recent years, image blending has gained popularity for its ability to create visually stunning content. However, the current image blending algorithms mainly have the following problems: manually creating i...

    Haochen Xue, Mingyu **, Chong Zhang, Yuxuan Huang in Neural Information Processing (2024)

  3. No Access

    Chapter and Conference Paper

    Automatic Search of Linear Structure: Applications to Keccak and Ascon

    The linear structure technique was developed by Guo et al. at ASIACRYPT 2016, notably boosting the preimage attacks on Keccak. This technique transforming the preimage attack into solving algebraic systems allows...

    Huina Li, Guozhen Liu, Haochen Zhang, Peng Tang in Information Security and Cryptology (2024)

  4. No Access

    Chapter and Conference Paper

    Design and Development of Digital Circuit Simulation Software Based on Virtual Reality Technology

    In order to improve teachers’ teaching efficiency, stimulate students’ interest in learning, increase students’ initiative and consciousness of learning, break through the limitation of physical environment co...

    Lianshuan Shi, **ao Han, **aochen Bian in Computer Science and Educational Informatization (2024)

  5. No Access

    Chapter and Conference Paper

    DFaP: Data Filtering and Purification Against Backdoor Attacks

    The rapid development of deep learning has led to a dramatic increase in user demand for training data. As a result, users are often compelled to acquire data from unsecured external sources through automated ...

    Haochen Wang, Tianshi Mu, Guocong Feng in Artificial Intelligence Security and Priva… (2024)

  6. No Access

    Chapter and Conference Paper

    Spatial Feature Regularization and Label Decoupling Based Cross-Subject Motor Imagery EEG Decoding

    Motor imagery (MI) serves as a vital approach to constructing brain-computer interfaces (BCIs) based on electroencephalogram (EEG) signals. However, the time-variant and label-coupling characteristics of EEG s...

    Yifan Zhou, Tian-jian Luo, **aochen Zhang in Pattern Recognition and Computer Vision (2024)

  7. No Access

    Chapter and Conference Paper

    An Erase Code Based Collaborative Storage Method in RFID Systems

    Ensuring the safe and reliable storage of important data under limited storage resources is an important challenge faced by RFID systems. Cooperative storage technology based on network coding can divide the t...

    Feng Lin, Yu Liu, Yunke Yang, Bin Peng, Xuemei Cui in Data Science and Information Security (2024)

  8. No Access

    Chapter and Conference Paper

    End-to-End Streaming Customizable Keyword Spotting Based on Text-Adaptive Neural Search

    Streaming keyword spotting (KWS) is an important technique for voice assistant wake-up. While KWS with a preset fixed keyword has been well studied, test-time customizable keyword spotting in streaming mode re...

    Baochen Yang, Jiaqi Guo, Haoyu Li, Yu **, Qing Zhuo in Man-Machine Speech Communication (2024)

  9. No Access

    Chapter and Conference Paper

    Efficient Point-Based Single Scale 3D Object Detection from Traffic Scenes

    In the field of 3D object detection, the point-based method faces significant limitations due to the need to process large-scale collections of irregular point clouds, resulting in reduced inference speed. To ...

    Wenneng Tang, Yaochen Li, Yifan Li, Bo Dong in Pattern Recognition and Computer Vision (2024)

  10. No Access

    Chapter and Conference Paper

    A PUF Based Audio Fingerprint Based for Device Authentication and Tamper Location

    As bioinformation authentication gains prominence, the significance of audio data in industries such as speech recognition intensifies, with audio storage becoming a pivotal concern for data protection. Existi...

    Zhi Lu, Haochen Dou, Songfeng Lu, Xueming Tang in Digital Forensics and Cyber Crime (2024)

  11. No Access

    Chapter and Conference Paper

    3RE-Net: Joint Loss-REcovery and Super-REsolution Neural Network for REal-Time Video

    Real-time video over the Internet suffers from packet loss and low network bandwidth. The receiving side may receive down-sampled video with damaged frames. In this work, we are motivated to enhance the qualit...

    Liming Ge, David Zhaochen Jiang, Wei Bao in AI 2023: Advances in Artificial Intelligence (2024)

  12. No Access

    Chapter and Conference Paper

    Evaluating the Security of CRYSTALS-Dilithium in the Quantum Random Oracle Model

    In the wake of recent progress on quantum computing hardware, the National Institute of Standards and Technology (NIST) is standardizing cryptographic protocols that are resistant to attacks by quantum adversa...

    Kelsey A. Jackson, Carl A. Miller, Daochen Wang in Advances in Cryptology – EUROCRYPT 2024 (2024)

  13. No Access

    Article

    Robust AUC maximization for classification with pairwise confidence comparisons

    Supervised learning often requires a large number of labeled examples, which has become a critical bottleneck in the case that manual annotating the class labels is costly. To mitigate this issue, a new framew...

    Haochen Shi, Mingkun **e, Shengjun Huang in Frontiers of Computer Science (2023)

  14. No Access

    Article

    Machine-learning-accelerated simulations to enable automatic surface reconstruction

    Understanding material surfaces and interfaces is vital in applications such as catalysis or electronics. By combining energies from electronic structure with statistical mechanics, ab initio simulations can, ...

    **aochen Du, James K. Damewood, Jaclyn R. Lunger in Nature Computational Science (2023)

  15. No Access

    Article

    Faster-FIIS-GMS: a novel object detection framework for instance search

    Visual sensors are widely deployed in many promising detection fields, such as precision measurement, visual object detection and search. Instance search is a special object search method based on visual senso...

    **aochen Liu, Tao Zhang, Chong Shen in Multimedia Tools and Applications (2023)

  16. No Access

    Article

    Joint power control and passive beamforming optimization in RIS-assisted anti-jamming communication

    Due to the openness of the wireless propagation environment, wireless networks are highly susceptible to malicious jamming, which significantly impacts their legitimate communication performance. This study in...

    Yang Liu 刘洋, Kui Xu 许魁, **aochen **a 夏晓晨 in Frontiers of Information Technology & Elec… (2023)

  17. No Access

    Article

    Zero-reference single underwater image enhancement

    Underwater images play an essential role in acquiring and analyzing underwater information. Autonomous Underwater Vehicles (AUVs) highly rely on the quality of the captured underwater images, in order to carry...

    Ai** Yang, Chaochen Wang, **bin Wang, Qian Wang in Multimedia Tools and Applications (2023)

  18. No Access

    Article

    Multi-speaker DoA Estimation Using Audio and Visual Modality

    Traditionally, direction of arrival (DoA) approaches only use a single audio modality. However, humans naturally locate sound sources through auditory and visual clues. Inspired by this motivation, we adopt au...

    Yulin Wu, Ruimin Hu, **aochen Wang, Shanfa Ke in Neural Processing Letters (2023)

  19. No Access

    Article

    Prediction of fault evolution and remaining useful life for rolling bearings with spalling fatigue using digital twin technology

    Quantifying fault severity is a critical part of rolling bearing health management. There are numerous methods for evaluating the severity of rolling bearing faults that utilize various signals to predict the ...

    Weiying Meng, Yutong Wang, **aochen Zhang, Sihui Li, Xu Bai in Applied Intelligence (2023)

  20. No Access

    Article

    Local critical analysis of inequalities related to the sum of distances between n points on the unit hemisphere for \(n=4,5\)

    In this paper, we study a geometrical inequality conjecture which states that for any four points on a hemisphere with the unit radius, the largest sum of distances between the points is

    Yaochen Xu, Zhenbing Zeng, Jian Lu in Annals of Mathematics and Artificial Intel… (2023)

Page of 18