-
Chapter and Conference Paper
Generating Cyclic 2-Gray Codes for Fibonacci q-Decreasing Words
We present a two-stage algorithm for generating cyclic 2-Gray codes for q-decreasing words. In the first step, a simple recursive algorithm is used to generate a cyclic 2-Gray code for q-run constrained words, wh...
-
Chapter and Conference Paper
Rapid APT Detection in Resource-Constrained IoT Devices Using Global Vision Federated Learning (GV-FL)
Security and privacy are critical concerns in cyberspace due to the inherent vulnerability of Internet of Things (IoT) systems. In particular, Advanced Persistent Threat (APT) has become one of the most severe...
-
Chapter and Conference Paper
A Noise Convolution Network for Tampering Detection
The vulnerability of digital images to tampering is an ongoing information security issue in the multimedia field. Thus, identifying tampered digital images and locating the tampered regions in the images can ...
-
Chapter
PK-BERT: Knowledge Enhanced Pre-trained Models with Prompt for Few-Shot Learning
The amount of data in some fields are scarce because they are difficult or expensive to obtain. The general practice is to pre-train a model on similar data sets and fine-tune the models in downstream tasks by...
-
Chapter and Conference Paper
Two High-Performance Antenna Selection Schemes for Secure SSK Modulation in Intelligent Industrial Wireless Sensing Systems
Industrial wireless sensor networks (IWSNs) provide intelligent factory management with a new dimension. Reliable intelligent industrial wireless sensing systems play a vital role in ensuring the reliability a...
-
Chapter and Conference Paper
Robust Graph Embedding Recommendation Against Data Poisoning Attack
With the development of recommendation system technology, more and more Internet services are applied to recommendation systems.
-
Chapter and Conference Paper
Real-Time Traffic Monitoring and Status Detection with a Multi-vehicle Tracking System
With live street videos posted online, the Macao Government provides means to the general public to assess the latest road traffic conditions. After reviewing over these videos, a person may decide to change t...
-
Chapter
Automatic Speech Recognition for Portuguese with Small Data Set
Voice recognition has become more and more popular in various systems and applications. To further promote Macau tourism worldwide, a mobile Macau tourism APP is being develo** that supports voice control to...
-
Chapter and Conference Paper
Robust Pedestrian Detection: Faster Deployments with Fusion of Models
Pedestrian detection has a wide range of real-world critical applications including security and management of emergency scenarios. In critical applications, detection recall and precision are both essential ...