Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Cross-Domain Secure Deduplication Scheme Based on Threshold Blind Signature

    In the cloud storage environment, client-side deduplication can perform file repetitive detection locally. However, client-side deduplication still faces many security challenges. First, if the file hash value...

    **lei Du, Jide Deng, Hui Qi, **aoqiang Di in Mobile Wireless Middleware, Operating Syst… (2020)

  2. No Access

    Chapter and Conference Paper

    An Improved Weighted ELM with Hierarchical Feature Representation for Imbalanced Biomedical Datasets

    In medical intelligent diagnosis, most of the real-world datasets have the class-imbalance problem and some strong correlation features. In this paper, a novel classification model with hierarchical feature re...

    Liyuan Zhang, Jiashi Zhao, Huamin Yang in Knowledge Science, Engineering and Managem… (2018)

  3. Chapter and Conference Paper

    A New Color Information Entropy Retrieval Method for Pathological Cell Image

    For the distribution characteristics in a slice of pathological cell image, the system transforms them into the characteristic vector by quantization and clustering in HSV color model, it promotes the concerne...

    **angang Jiang, Qing Liang, Tao Shen in Computer and Computing Technologies in Agr… (2011)

  4. No Access

    Chapter and Conference Paper

    An Automatic Index Validity for Clustering

    Many validity index algorithms have been proposed to determine the number of clusters. These methods usually employ the Euclidean distance as the measurement. However, it is difficult for the Euclidean distanc...

    Zizhu Fan, **angang Jiang, Baogen Xu, Zhaofeng Jiang in Advances in Swarm Intelligence (2010)