Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Research on General Automatic Test Platform for Onboard Automatic Train Protection

    Traditional train control systems experience problems such as low efficiency, tedious operation, high labor costs, poor visibility, and difficulty in designing and maintaining test cases during manual function...

    Zhang Guozhen, Jiang Yunwei, Shi Miao in Methods and Applications for Modeling and … (2024)

  2. No Access

    Chapter and Conference Paper

    Transpose and Mask: Simple and Effective Logit-Based Knowledge Distillation for Multi-attribute and Multi-label Classification

    Knowledge distillation (KD) improves a student network by transferring knowledge from a teacher network. Although KD has been extensively studied in single-labeled image classification, it is not well explored...

    Yuwei Zhao, Annan Li, Guozhen Peng, Yunhong Wang in Pattern Recognition and Computer Vision (2024)

  3. No Access

    Chapter and Conference Paper

    Automatic Search of Linear Structure: Applications to Keccak and Ascon

    The linear structure technique was developed by Guo et al. at ASIACRYPT 2016, notably boosting the preimage attacks on Keccak. This technique transforming the preimage attack into solving algebraic systems allows...

    Huina Li, Guozhen Liu, Haochen Zhang, Peng Tang in Information Security and Cryptology (2024)

  4. No Access

    Chapter and Conference Paper

    Frame Correlation Knowledge Distillation for Gait Recognition in the Wild

    Recently, large deep models have achieved significant progress on gait recognition in the wild. However, such models come with a high cost of runtime and computational resource consumption. In this paper, we i...

    Guozhen Peng, Shaoxiong Zhang, Yuwei Zhao, Annan Li, Yunhong Wang in Biometric Recognition (2023)

  5. No Access

    Chapter and Conference Paper

    Research on Cloud Office Resource Allocation Algorithm Based on Correction Weight PSO

    With the development of science and technology, cloud computing technology has changed people's office methods. People begin to use cloud services to realize remote collaborative office, which can save costs a...

    Guozhen Wang, Chun Wang, Tong Gan in Advances in Artificial Intelligence and Se… (2022)

  6. No Access

    Chapter and Conference Paper

    Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3

    In this work, we focus on collision attacks against instances of SHA-3 hash family in both classical and quantum settings. Since the 5-round collision attacks on SHA3-256 and other variants proposed by Guo et al.

    Jian Guo, Guozhen Liu, Ling Song, Yi Tu in Advances in Cryptology – ASIACRYPT 2022 (2022)

  7. No Access

    Chapter and Conference Paper

    Rebound Attacks on  \(\textsf{SKINNY}\) Hashing with Automatic Tools

    In ToSC’20, a new approach combining Mix-Integer Linear Programming (MILP) tool and Constraint Programming (CP) tool to search for boomerang distinguishers is proposed and later used for rebound attack in ASIA...

    Shun Li, Guozhen Liu, Phuong Pham in Network and System Security (2022)

  8. No Access

    Chapter and Conference Paper

    Few-Shot Knowledge Graph Entity Ty**

    Knowledge graph entity ty**, which is an important way to complete knowledge graphs (KGs), aims at predicting the associating type of certain given entities without any external knowledge. However, previous ...

    Guozhen Zhu, Zhongbao Zhang, Sen Su in Advances in Knowledge Discovery and Data Mining (2022)

  9. No Access

    Chapter and Conference Paper

    IPE Transformer for Depth Completion with Input-Aware Positional Embeddings

    In contrast to traditional transformer blocks using a set of pre-defined parameters as positional embeddings, we propose the input-aware positional embedding (IPE) which is dynamically generated according to t...

    Bocen Li, Guozhen Li, Haiting Wang, Lijun Wang in Pattern Recognition and Computer Vision (2021)

  10. No Access

    Chapter and Conference Paper

    Evaluation of Relationship Quality Within Dyads Through the Performance in Dual-Player Cooperative Tasks

    Human beings are influenced widely by relationship among individuals. However, there is still a lack of a systematic, objective and direct way to assess the quality of relationships within dyads. The current s...

    Haijiang Yan, Kai Yu, Guozhen Zhao in Engineering Psychology and Cognitive Ergonomics (2021)

  11. No Access

    Chapter and Conference Paper

    A Reliable Voice Perceptual Hash Authentication Algorithm

    In order to protect the authenticity and integrity of voice, this paper proposes a reliable voice perceptual hash authentication algorithm. This algorithm considers the dynamic characteristics of voice signals...

    Li Li, Yang Li, Zizhen Wang, Xuemei Li, Guozhen Shi in Mobile Multimedia Communications (2021)

  12. No Access

    Chapter and Conference Paper

    An Automated Aggressive Posterior Retinopathy of Prematurity Diagnosis System by Squeeze and Excitation Hierarchical Bilinear Pooling Network

    Aggressive Posterior Retinopathy of Prematurity (AP-ROP) is a special type of Retinopathy of Prematurity (ROP), which is one of the most common childhood blindness that occurs in premature infants. AP-ROP is u...

    Rugang Zhang, **feng Zhao, Guozhen Chen, Hai **e in Ophthalmic Medical Image Analysis (2020)

  13. No Access

    Chapter and Conference Paper

    Characterization and Linear-Time Recognition of Paired Threshold Graphs

    In a paired threshold graph, each vertex has a weight, and two vertices are adjacent if and only if their weight sum is large enough and their weight difference is small enough. It generalizes threshold graphs...

    Yixin Cao, Guozhen Rong, Jianxin Wang in Graph-Theoretic Concepts in Computer Science (2020)

  14. No Access

    Chapter and Conference Paper

    Aggressive Posterior Retinopathy of Prematurity Automated Diagnosis via a Deep Convolutional Network

    Aggressive Posterior Retinopathy of Prematurity (AP-ROP) is a retinal pathology characterized by severe vasodilation and distortion of the posterior pole of the retina. It may lead to blindness if it is not di...

    Rugang Zhang, **feng Zhao, Guozhen Chen, Tianfu Wang in Ophthalmic Medical Image Analysis (2019)

  15. No Access

    Chapter and Conference Paper

    Automated Stage Analysis of Retinopathy of Prematurity Using Joint Segmentation and Multi-instance Learning

    Retinopathy of prematurity (ROP) is the primary cause of childhood blindness. Prior works have demonstrated the remarkable performances of deep learning (DL) in detecting plus disease and classification betwee...

    Guozhen Chen, **feng Zhao, Rugang Zhang, Tianfu Wang in Ophthalmic Medical Image Analysis (2019)

  16. No Access

    Chapter and Conference Paper

    Retinopathy Diagnosis Using Semi-supervised Multi-channel Generative Adversarial Network

    Various kinds of retinopathy are the leading causes of blindness in human being, and with the rapid development of fundus images (FI) analysis in recent years, deep learning has became the focus while using Co...

    Yingpeng **e, Qiwei Wan, Guozhen Chen, Yanwu Xu in Ophthalmic Medical Image Analysis (2019)

  17. No Access

    Chapter and Conference Paper

    SQL Injection Behavior Mining Based Deep Learning

    SQL injection is a common network attack. At present, filtering methods are mainly used to prevent SQL injection, yet risks of incomplete filtering still remains. By deep learning, we detect whether the user b...

    Peng Tang, Weidong Qiu, Zheng Huang, Huijuan Lian in Advanced Data Mining and Applications (2018)

  18. No Access

    Chapter and Conference Paper

    A Novel Image Encryption Scheme Based on Hidden Random Disturbance and Feistel RPMPFrHT Network

    In this paper, we propose a novel image encryption scheme based on hidden random disturbance and Feistel RPMPFrHT network, which can improve some common defects of the transform-based methods. At first, we hid...

    Guozhen Hu, Xue**g Kang, Zihui Guo in Image and Graphics Technologies and Applic… (2018)

  19. Chapter and Conference Paper

    Natural Interaction in Video Image Investigation and Its Evaluation

    Video image investigation has become an important way to protect the public security. Traditional paper-based investigation method lacks of natural interactive tools to organize case and clue information, lead...

    Yan Zheng, Guozhen Zhao in Engineering Psychology and Cognitive Ergonomics (2018)

  20. Chapter and Conference Paper

    Android Stack Machine

    In this paper, we propose Android Stack Machine (ASM), a formal model to capture key mechanisms of Android multi-tasking such as activities, back stacks, launch modes, as well as task affinities. The model is ...

    Taolue Chen, **long He, Fu Song, Guozhen Wang, Zhilin Wu in Computer Aided Verification (2018)

previous disabled Page of 3