Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Enhancing Open-Set Object Detection via Uncertainty-Boxes Identification

    Open-set object detection is a challenging task in computer vision, which aims to detect known object categories while simultaneously identifying unknown objects. Inspired by how humans naturally distinguish u...

    Wei Ji, Dongqin Wu, Rui-Wei Zhao, Weijia Fu in Pattern Recognition and Computer Vision (2024)

  2. No Access

    Chapter and Conference Paper

    Design and Practice of Virtual Experiments for Internet of Things Class

    Regarding the ability requirements for students majoring in Internet of Things (IOT) engineering, we propose a virtual experiment scheme for IOT system class, which is based on Arduino platform. The virtual ex...

    Yingwen Chen, Yuchuan Luo, Huan Zhou, Baokang Zhao in Computer Science and Education (2023)

  3. No Access

    Chapter and Conference Paper

    Construction and Evaluation of Chinese Word Segmentation Datasets in Malay Archipelago

    In recent years, there has been numerous mature research on Chinese word segmentation (CWS). However, the existing research mainly focuses on mainland Mandarin word segmentation, and the research on CWS of oth...

    Shengyi Jiang, Yingwen Fu, Nankai Lin in Chinese Lexical Semantics (2022)

  4. No Access

    Chapter and Conference Paper

    FedHF: A High Fairness Federated Learning Algorithm Based on Deconfliction in Heterogeneous Networks

    In large-scale machine learning, federated learning (FL) is considered as a promising paradigm to address the problem of data privacy breach. Previous works have focused on improving fairness in terms of fair ...

    Zhipeng Gao, Yingwen Duan, Yang Yang, Lanlan Rui, Chen Zhao in Service-Oriented Computing (2022)

  5. No Access

    Chapter and Conference Paper

    Research on Influencing Factors of Combined Transportation System Based on Analytic Hierarchy Process

    efficiency of an urban combined transportation travel system and solve the problem of urban residents’ “last mile” travel, this paper used the analytic hierarchy process to study the factors that af...

    Yan **ng, Yingwen **ng, Weidong Liu in Advances in Simulation and Process Modelli… (2021)

  6. No Access

    Chapter and Conference Paper

    A Hybrid Framework for Class-Imbalanced Classification

    Data classification is a commonly used data processing method in the fields of networks and distributed systems, and it has attracted extensive attention in recent years. Nevertheless, the existing classificat...

    Rui Chen, Lailong Luo, Yingwen Chen in Wireless Algorithms, Systems, and Applicat… (2021)

  7. No Access

    Chapter and Conference Paper

    Pre-trained Language Models for Tagalog with Multi-source Data

    Pre-trained language models (PLMs) for Tagalog can be categorized into two kinds: monolingual models and multilingual models. However, existing monolingual models are only trained in small-scale Wikipedia corp...

    Shengyi Jiang, Yingwen Fu, **aotian Lin in Natural Language Processing and Chinese Co… (2021)

  8. No Access

    Chapter and Conference Paper

    K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data

    Recent years have witnessed the advent of technologies such as the Internet of Things, cloud computing, and big data. Also, the analysis and research of data have attracted more and more attention from researc...

    Linghang Meng, Xueshu Hong, Yingwen Chen in Wireless Algorithms, Systems, and Applicat… (2020)

  9. No Access

    Chapter and Conference Paper

    Building Trustful Crowdsensing Service on the Edge

    Edge computing enables the data to be processed in the edge of networks in order to decrease the latency of crowdsensing services. However, due to the distributed environment and vulnerability of edges, it is ...

    Biao Yu, Yingwen Chen, Shao**g Fu in Wireless Algorithms, Systems, and Applicat… (2019)

  10. No Access

    Chapter and Conference Paper

    Exploration of Human Activities Using Sensing Data via Deep Embedded Determination

    Clustering analysis is one of promising techniques of uncovering different types of human activities from a set of ubiquitous sensing data in an unsupervised manner. Previous work proposes deep clustering to l...

    Yiqi Wang, En Zhu, Qiang Liu, Yingwen Chen in Wireless Algorithms, Systems, and Applicat… (2018)

  11. No Access

    Chapter and Conference Paper

    Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection

    Machine learning algorithms have been increasingly adopted in Intrusion Detection Systems (IDSs) and achieved demonstrable results, but few studies have considered intrinsic vulnerabilities of these algorithms...

    Yifan Dong, Peidong Zhu, Qiang Liu in Wireless Algorithms, Systems, and Applicat… (2018)

  12. No Access

    Chapter and Conference Paper

    An Adaptive MAC Protocol for Wireless Rechargeable Sensor Networks

    In the existing medium access control (MAC) protocols of rechargeable sensor networks, the maximum charging threshold of sensor nodes generally set to a fixed value based on nodes battery capacity. It leads to...

    ** Zhong, Yiwen Zhang, Shuaihua Ma in Wireless Algorithms, Systems, and Applicat… (2017)

  13. No Access

    Chapter and Conference Paper

    An Extension to ns-3 for Simulating Mobile Charging with Wireless Energy Transfer

    Many theoretical derivation of the energy model requires extensive simulation in Internet of Things (IoT). Network Simulator 3 (ns-3) provides a simulation platform for various experimental studies including e...

    ** Zhong, Yating Li, Weile Huang, **aoyan Kui, Yiming Zhang, Yingwen Chen in Data Science (2017)

  14. No Access

    Chapter and Conference Paper

    Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments

    Cloud platforms can provide elastic infrastructure for mobile users. Therefore, publicly auditing the integrity of shared data outsourced on the cloud is very important since the cloud may be untrusted. Howeve...

    Feng Chen, Hong Zhou, Yuchuan Luo in Wireless Algorithms, Systems, and Applicat… (2015)

  15. No Access

    Chapter and Conference Paper

    Throughput Prediction-Based Rate Adaptation for Real-Time Video Streaming over UAVs Networks

    Real-time video streaming is extensively used in UAVs networks for battlefield surveillance, disaster relief, etc. The available throughput of the multi-hop networks varies a lot with the movement of UAVs. To ...

    Tongqing Zhou, Haidong Zhang, Ming Xu in Wireless Algorithms, Systems, and Applicat… (2014)

  16. No Access

    Chapter and Conference Paper

    Empirical Study on Spatial and Temporal Features for Vehicular Wireless Communications

    Traditional networking technologies based on static topology analysis are not sufficient to the dynamic Vehicular Ad hoc Network. Understanding the network dynamics caused by vehicle mobility is very important...

    Yingwen Chen, Ming Xu, Pei Li, Bin Zhang in Wireless Algorithms, Systems, and Applications (2014)

  17. No Access

    Chapter and Conference Paper

    Schedule Algorithms for File Transmission in Vehicular Ad Hoc Networks

    The development of vehicular ad-hoc networks has lead to several new services, such as instant messages, multi-media videos and large data transmissions. These applications have altered the pattern of data tra...

    Chao Wang, Maya Larson, Yingwen Chen in Wireless Algorithms, Systems, and Applicat… (2014)

  18. Chapter and Conference Paper

    Roadside Infrastructure Placement for Information Dissemination in Urban ITS Based on a Probabilistic Model

    Information dissemination is an important application in VANETs for traffic safety and efficiency. In urban area, roadside infrastructure nodes can be deployed for information dissemination. However, it is ine...

    Bo **e, Geming **a, Yingwen Chen, Ming Xu in Network and Parallel Computing (2013)

  19. No Access

    Chapter and Conference Paper

    Local Information Storage Protocol for Urban Vehicular Networks

    Local information dissemination is a potential application of VANETs. By cooperative communication among vehicles, the information could be stored in a certain size of region for some time. However, it is diff...

    Bo **e, Yingwen Chen, Ming Xu, Yuangang Wang in Wireless Algorithms, Systems, and Applicat… (2013)

  20. No Access

    Chapter and Conference Paper

    ContactSim: An Efficient Realistic Trace Driven Contact Simulator for Vehicular Opportunistic Networks

    Opportunistic networking is an innovative data delivery solution, which leverages the contact opportunities between mobile terminals to exchange messages. The contact events are highly relevant to human behavi...

    Jianbin Jia, Xu Ming, Chen Yingwen in Internet and Distributed Computing Systems (2013)

previous disabled Page of 2