![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
A reweighting method for speech recognition with imbalanced data of Mandarin and sub-dialects
Automatic speech recognition (ASR) is an important technology in many fields like video-sharing services, online education and live broadcast. Most recent ASR methods are based on deep learning technology. A d...
-
Article
BDNet: a method based on forward and backward convolutional networks for action recognition in videos
Human action recognition analyzes the behavior in a scene according to the spatiotemporal features carried in image sequences. Existing works suffers from ineffective spatial–temporal feature learning. For sho...
-
Article
Thermal infrared action recognition with two-stream shift Graph Convolutional Network
The extensive deployment of camera-based IoT devices in our society is heightening the vulnerability of citizens’ sensitive information and individual data privacy. In this context, thermal imaging techniques ...
-
Article
Generative facial prior embedded degradation adaption network for heterogeneous face hallucination
In real-world long-range surveillance systems, thermal face images captured from a distance suffer from low resolution and noise, posing challenges for thermal-to-visible face image translation. Current method...
-
Article
A robust dual color image blind watermarking scheme in the frequency domain
Aiming at the problems that many watermarking schemes cannot adapt to the image copyright protection with large amount of information, and the copyright protection of color images faces severe challenges, this...
-
Article
Open AccessFeature selection strategies: a comparative analysis of SHAP-value and importance-based methods
In the context of high-dimensional credit card fraud data, researchers and practitioners commonly utilize feature selection techniques to enhance the performance of fraud detection models. This study presents ...
-
Article
Open AccessAmplitude-modulated EM side-channel attack on provably secure masked AES
Recently a new type of side channels was discovered, called amplitude-modulated electromagnetic (EM) emanations from mixed-signal circuits. Unlike power analysis or near field EM analysis, attacks based on amp...
-
Article
Hybrid compression scheme based on VMD optimization algorithm application to mechanical equipment monitoring
The traditional variational mode decomposition (VMD) algorithm causes under-decomposition and over-decomposition problems when performing signal decomposition. Many studies have addressed various optimization ...
-
Article
Open AccessHarmfulness metrics in digital twins of social network rumors detection in cloud computing environment
Social network rumor harm metric is a task to score the harm caused by a rumor by analyzing the spreading range of the rumor, the users affected, the repercussions caused, etc., and then the harm caused by the...
-
Article
Open AccessData reduction techniques for highly imbalanced medicare Big Data
In the domain of Medicare insurance fraud detection, handling imbalanced Big Data and high dimensionality remains a significant challenge. This study assesses the combined efficacy of two data reduction techni...
-
Article
Progressive local-to-global vision transformer for occluded face hallucination
Hallucinating a photo-realistic high-resolution (HR) face image from an occluded low-resolution (LR) face image is beneficial for a series of face-related applications. However, previous efforts focused on eit...
-
Article
Bifurcation Analysis of a Fractional-Order Bidirectional Associative Memory Neural Network with Multiple Delays
The bidirectional associative memory (BAM) neural network has the capability to store hetero-associative pattern pairs, which has high requirements for stability. This paper inquires into Hopf bifurcation of f...
-
Article
Open AccessExplainable machine learning models for Medicare fraud detection
As a means of building explainable machine learning models for Big Data, we apply a novel ensemble supervised feature selection technique. The technique is applied to publicly available insurance claims data f...
-
Article
A novel cross-network node pair embedding methodology for anchor link prediction
Anchor link prediction across social networks is highly important for multiple social network analysis. Traditional methods rely heavily on user-generated information or the quality of network topology informa...
-
Article
Examining the applications of intelligent tutoring systems in real educational contexts: A systematic literature review from the social experiment perspective
Intelligent Tutoring Systems (ITSs) have a great potential to effectively transform teaching and learning. As more efforts have been put on designing and develo** ITSs and integrating them within learning an...
-
Article
SVF-Net: spatial and visual feature enhancement network for brain structure segmentation
Brain structure segmentation in Magnetic Resonance Images (MRI) is essential to the assessment and treatment of medical disorders, especially neuropsychiatric diseases. The key to semantic segmentation is to u...
-
Article
Disturbance-observer-based adaptive dynamic surface control for nonlinear systems with input dead-zone and delay using neural networks
Disturbance-observer-based adaptive neural control approach is proposed for nonlinear systems. Considering the effect caused by long input delay and dead-zone, a novel auxiliary system has been introduced to d...
-
Article
A color image watermarking method combined QR decomposition and spatial domain
For protecting the digital copyright of color image, a color image watermarking method should have strong robustness and short running-time at same time. To achieve these two goals, an effective color image wa...
-
Article
MNSSp3: Medical big data privacy protection platform based on Internet of things
How to transform the growing medical big data into medical knowledge is a global topic. However, medical data contains a large amount of personal privacy information, especially electronic medical records, gen...
-
Article
A high-efficiency blind watermarking algorithm for double color image using Walsh Hadamard transform
This paper presents an efficient blind watermarking algorithm for double color images using Walsh Hadamard transform (WHT). In this algorithm, the energy gathering function of WHT and the strong correlation be...