Skip to main content

previous disabled Page of 7
and
  1. No Access

    Chapter and Conference Paper

    Dynamic Gesture Recognition Based on 3D Central Difference Separable Residual LSTM Coordinate Attention Networks

    The recognition of dynamic gestures has garnered significant attention in the field of human-computer interaction. However, several factors unrelated to the gestures, such as background, and spatial scale, pos...

    Jie Chen, Yun Tie, Lin Qi, Chengwu Liang in Pattern Recognition and Computer Vision (2024)

  2. No Access

    Chapter and Conference Paper

    Object-Aware Transfer-Based Black-Box Adversarial Attack on Object Detector

    Deep neural networks have been demonstrated to be vulnerable to adversarial noise from attacks. Compared with white-box attacks, black-box attacks fool deep neural networks to yield erroneous predictions witho...

    Zhuo Leng, Zesen Cheng, Pengxu Wei, Jie Chen in Pattern Recognition and Computer Vision (2024)

  3. No Access

    Chapter and Conference Paper

    Two-Stage Deep Learning Segmentation for Tiny Brain Regions

    Accurate segmentation of brain regions has become increasingly important in the early diagnosis of brain diseases. Widely used methods for brain region segmentation usually rely on atlases and deformations, wh...

    Yan Ren, **awu Zheng, Rongrong Ji, Jie Chen in Pattern Recognition and Computer Vision (2024)

  4. No Access

    Chapter and Conference Paper

    AST: An Attention-Guided Segment Transformer for Drone-Based Cross-View Geo-Localization

    To tackle the problem of drone-based cross-view geo-localization, we address how to match drone-view images and satellite-view images, which is extremely challenging due to the variability of view angles and v...

    Zichuan Zhao, Tianhang Tang, Jie Chen, Xuelei Shi in Computational Visual Media (2024)

  5. No Access

    Chapter and Conference Paper

    CCA-Secure Identity-Based Matchmaking Encryption from Standard Assumptions

    Identity-based Matchmaking Encryption (IB-ME) is a new form of encryption that enables anonymous communication by specifying identities for both sender and receiver. Its applications in network services put fo...

    Shen Lin, Yu Li, Jie Chen in Information Security and Cryptology (2024)

  6. No Access

    Chapter and Conference Paper

    OD-Enhanced Dynamic Spatial-Temporal Graph Convolutional Network for Metro Passenger Flow Prediction

    Metro passenger flow prediction is crucial for efficient urban transportation planning and resource allocation. However, it faces two challenges. The first challenge is extracting the diverse passenger flow pa...

    Lei Ren, Jie Chen, Tong Liu, Hang Yu in Neural Information Processing (2024)

  7. No Access

    Chapter and Conference Paper

    Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions

    In the past decade, much progress has been made on proposing encryption schemes with multi-user security. However, no known work aims at constructing a Public-key Encryption with Keyword Search (PEKS) scheme t...

    Yunhao Ling, Kai Zhang, Jie Chen, Qiong Huang in Public-Key Cryptography – PKC 2024 (2024)

  8. No Access

    Chapter and Conference Paper

    Registered Attribute-Based Signature

    This paper introduces the notion of registered attribute-based signature (registered ABS). Distinctly different from classical attribute-based signature (ABS), registered ABS allows any user to generate their own...

    Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong in Public-Key Cryptography – PKC 2024 (2024)

  9. No Access

    Chapter and Conference Paper

    Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding

    In this work, we present two generic frameworks for leakage-resilient attribute-based encryption (ABE), which is an improved version of ABE that can be proven secure even when part of the secret key is leaked....

    Yijian Zhang, Yunhao Ling, Jie Chen in Information Security and Cryptology – ICIS… (2024)

  10. No Access

    Chapter and Conference Paper

    Unsupervised KeyPhrase Extraction Based on Multi-granular Semantics Feature Fusion

    In Unsupervised Keyphrase Extraction (UKE) tasks, candidate phrases are ranked based on their similarity to the document embedding. However, This method assumes that every document focuses on only one topic. A...

    Jie Chen, Hainan Hu, Shu Zhao, Yan** Zhang in Rough Sets (2023)

  11. No Access

    Chapter and Conference Paper

    Improved Fully Adaptive Decentralized MA-ABE for NC1 from MDDH

    We improve the first and the only existing prime-order fully adaptively secure decentralized Multi-Authority Attribute-Based Encryption (MA-ABE) scheme for NC1 in Datta-Komargodski-Waters [Eurocrypt ’23]. Comp...

    Jie Chen, Qiaohan Chu, Ying Gao, Jianting Ning in Advances in Cryptology – ASIACRYPT 2023 (2023)

  12. No Access

    Chapter and Conference Paper

    M2MTR: Reposition Idle Taxis in the Many-to-Many Manner with Multi-agent Reinforcement Learning

    Ride-hailing apps, such as Didi and Uber, allow people to easily request a ride by inputting their desired origin and destination locations. Due to transportation system complexity and vast city areas, uneven ...

    Hao Yu, ** Guo, Jie Chen, **ao Luo in Advanced Data Mining and Applications (2023)

  13. No Access

    Chapter and Conference Paper

    A Coverless Image Steganography Method Based on Feature Matrix Map**

    To address the challenge that the current coverless image steganography (CIS) method requires more cover images and more information, a coverless image steganography method based on feature matrix map** is p...

    Li Li, Chao Yang, Jie Chen in Image and Graphics Technologies and Applications (2023)

  14. No Access

    Chapter and Conference Paper

    Adaptive Deep Learning Approximation for Allen-Cahn Equation

    Solving general non-linear partial differential equations (PDE) precisely and efficiently has been a long-lasting challenge in the field of scientific computing. Based on the deep learning framework for solvin...

    Huiying Xu, Jie Chen, Fei Ma in Computational Science – ICCS 2022 (2022)

  15. No Access

    Chapter and Conference Paper

    OpenMedIA: Open-Source Medical Image Analysis Toolbox and Benchmark Under Heterogeneous AI Computing Platforms

    In this paper, we present OpenMedIA, an open-source toolbox library containing a rich set of deep learning methods for medical image analysis under heterogeneous Artificial Intelligence (AI) computing platform...

    Jia-**n Zhuang, **ansong Huang, Yang Yang in Pattern Recognition and Computer Vision (2022)

  16. No Access

    Chapter and Conference Paper

    A Survey of Traffic Classification Technology for Smart Home Based on Machine Learning

    With the wide use of smart home devices and the privacy of their activities, more and more research have focused on the traffic classification for smart home, and traffic classification technology can infer th...

    Jie Chen, Ya** Liu, Shuo Zhang, Bing Chen in Artificial Intelligence and Security (2022)

  17. No Access

    Chapter and Conference Paper

    An Inclusive Task-Aware Framework for Radiology Report Generation

    To avoid the tedious and laborious radiology report writing, the automatic generation of radiology reports has drawn great attention recently. Previous studies attempted to directly transfer the image captioni...

    Lin Wang, Munan Ning, Donghuan Lu, Dong Wei in Medical Image Computing and Computer Assis… (2022)

  18. No Access

    Chapter and Conference Paper

    Using User’s Expression Propensity for Sarcasm Detection Based on Sequential Three-Way Decision

    Sarcasm detection is mainly to distinguish whether the target comment is sarcasm that can help identify the actual sentiment. The previous sarcasm detection mainly focused on text features using vocabulary, gr...

    Jie Chen, **peng Chen, Shu Zhao, Yan** Zhang in Rough Sets (2022)

  19. No Access

    Chapter and Conference Paper

    When Active Learning Meets Implicit Semantic Data Augmentation

    Active learning (AL) is a label-efficient technique for training deep models when only a limited labeled set is available and the manual annotation is expensive. Implicit semantic data augmentation (ISDA) effe...

    Zhuangzhuang Chen, ** Zhang, Pan Wang, Jie Chen in Computer Vision – ECCV 2022 (2022)

  20. No Access

    Chapter and Conference Paper

    Temporal-MPI: Enabling Multi-plane Images for Dynamic Scene Modelling via Temporal Basis Learning

    Novel view synthesis of static scenes has achieved remarkable advancements in producing photo-realistic results. However, key challenges remain for immersive rendering of dynamic scenes. One of the seminal ima...

    Wenpeng **ng, Jie Chen in Computer Vision – ECCV 2022 (2022)

previous disabled Page of 7