-
Chapter and Conference Paper
Intelligent Cooperative Routing for Services in Computing Integration Networking
With the widespread application of cloud computing and edge computing, achieving optimal allocation of computing resources in a heterogeneous network environment has become a key issue. The objective of this c...
-
Chapter and Conference Paper
Flexible Sensor Array and Newton Interpolation Algorithm for Molded Dichromatic Sole by Operating Robot
Based on the principle of system engineering and optimization method, the multi-color soles mold operation robot was constructed instead of manual operation, and the double-layer quality inspection standard of...
-
Chapter and Conference Paper
A Survey of Integrating Federated Learning with Smart Grids: Application Prospect, Privacy Preserving and Challenges Analysis
With the widespread promotion of smart grid, the power time series data collected by smart meters also increases rapidly. How to collect these data safely and effectively, analyze and utilize them, and provide...
-
Chapter and Conference Paper
A Routing Algorithm for Node Protection in Wireless Sensor Network Based on Clustering Ant Colony Strategy
Thanks to the rapid development of wireless communication and electronic technology, wireless sensor networks have been increasingly used in military, medical and other fields. Because of the characteristics o...
-
Chapter and Conference Paper
A Transaction Model of Bill Service Based on Blockchain
In recent years, the bill business has developed rapidly, but it can not be ignored that there are also great risks in the bill business. In 2016, an Agricultural Bank of China (ABC) Bill case involving 3.9 bi...
-
Chapter and Conference Paper
Research on Database Anomaly Access Detection Based on User Profile Construction
As a platform for data storage and administration, database contains private and large information, which makes it a target of malicious personnel attacks. To prevent attacks from outsiders, database administr...
-
Chapter and Conference Paper
Adversarial Examples Attack and Countermeasure for Speech Recognition System: A Survey
Speech recognition technology is affecting and changing the current human-computer interaction profoundly. Due to the remarkable progress of deep learning, the performance of the Automatic Speech Recognition (...
-
Chapter and Conference Paper
Post-processing for Enhancing Audio Steganographic Undetectability
Currently, the conventional steganography method often only perform data embedding, without additional post-processing to enhance undetectability. In this work, we propose a new audio post-processing steganogr...
-
Chapter and Conference Paper
BBM: A Blockchain-Based Model for Open Banking via Self-sovereign Identity
Open banking technology is an emerging data-sharing paradigm that can facilitate and inspire new businesses vie efficient data-sharing with banks, such as quick approval of loan applications and finding a bett...
-
Chapter and Conference Paper
Robust, Imperceptible and End-to-End Audio Steganography Based on CNN
Recently, deep learning-based steganography emerges, where the end-to-end steganography is a promising direction. However, most of the existing approaches are developed for the image which are not suitable for...
-
Chapter and Conference Paper
Urban Data Acquisition Routing Approach for Vehicular Sensor Networks
Vehicular sensor networks have emerged as a new wireless sensor network paradigm that is envisioned to revolutionize the human driving experiences and traffic control systems. Like conventional sensor networks...
-
Chapter and Conference Paper
Generative Creativity: Adversarial Learning for Bionic Design
Generative creativity in the context of visual data refers to the generation process of new and creative images by composing features of existing ones. In this work, we aim to achieve generative creativity by ...
-
Chapter and Conference Paper
PIRM2018 Challenge on Spectral Image Super-Resolution: Methods and Results
In this paper, we describe the Perceptual Image Restoration and Manipulation (PIRM) workshop challenge on spectral image super-resolution, motivate its structure and conclude on results obtained by the partici...
-
Chapter and Conference Paper
Similarity-Aware Deep Attentive Model for Clickbait Detection
Clickbait is a type of web content advertisements designed to entice readers into clicking accompanying links. Usually, such links will lead to articles that are either misleading or non-informative, making th...
-
Chapter and Conference Paper
Gated Convolutional LSTM for Speech Commands Recognition
As the mobile device gaining increasing popularity, Acoustic Speech Recognition on it is becoming a leading application. Unfortunately, the limited battery and computational resources on a mobile device highly...
-
Chapter and Conference Paper
Research on Auto-Generating Test-Paper Model Based on Spatial-Temporal Clustering Analysis
In the process of auto-generating test-paper, the category and the difficulty of the title plays a key role in the quality of generating test-paper. It will produce low quality questions and hard to popularize...
-
Chapter and Conference Paper
Sketch Based Model-Like Standing Style Recommendation
Various mobile devices with high-quality cameras are very popular in human daily life. Appropriate directions about the standing postures can greatly improve the user experience while taking photos. In this pa...
-
Chapter and Conference Paper
Multi-information Fusion Based Mobile Attendance Scheme with Face Recognition
There are some problems in traditional classroom attendances, such as complex interaction, masquerading, waste of time and information out of sync. A novel class attendance scheme is proposed based on face rec...
-
Chapter and Conference Paper
The Wide and Deep Flexible Neural Tree and Its Ensemble in Predicting Long Non-coding RNA Subcellular Localization
The long non-coding RNA (lncRNA) is a hot research topic among researchers in the field of biology. Recent studies have illustrated that the subcellular localizations carry salient information to understand t...
-
Chapter and Conference Paper
Study on Human Body Action Recognition
A novel human body action recognition method based on Kinect is proposed. Firstly, the key frame of the original data is extracted by using the key frame extraction technology based on quaternion. Secondly, t...