Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    An Efficient Consortium Blockchain Dual Privacy Protection Scheme

    The ledger on the blockchain is public, so that the transactions on the chain can be verified and traced by other nodes, but it will also lead to the privacy of blockchain users being leaked or analyzed by som...

    Haipeng Yang, Peng Han, Lili **ong, Yuanyuan Li in Blockchain Technology and Application (2024)

  2. No Access

    Chapter and Conference Paper

    Improved Blockchain Sharding Consensus for Cross-Shard Validation

    The consensus algorithm, which serves as the core of blockchain technology, enables the realization of decentralized and secure trusted service delivery environments. To address the complex validation mechanis...

    Yuanyuan Li, Linzhao Sun, Peng Han, Shenhai Zheng in Blockchain Technology and Application (2024)

  3. No Access

    Chapter and Conference Paper

    Practical Private Intersection-Sum Protocols with Good Scalability

    Private intersection-sum (PI-Sum) enables participants to compute the sum of data associated with the intersection without revealing any personal information. It has been a research focus of secure multi-party...

    Yuanyuan Li, Hanyue **ao, Peng Han, Zhihao Zhou in Blockchain Technology and Application (2024)

  4. No Access

    Chapter and Conference Paper

    Cooperative Control of Dual-Manipulator System with Unknown Dynamic Parameters

    The precise control of the cooperative operation for dual-manipulator system has high requirements for the dynamic controller. In this paper, the cooperative control method of dual-manipulator system with unkn...

    Yuanyuan Li, Guilin Yang, Wen**g Wu, Wenjie Chen in Intelligent Robotics and Applications (2023)

  5. No Access

    Chapter and Conference Paper

    Iterative Refinement of an AIS Rewards System

    Gamification-based reward systems are a key part of the design of modern adaptive instructional systems and can have substantial impacts on learner choices and engagement. In this paper, we discuss our efforts...

    Karen Wang, Zhenjun Ma, Ryan S. Baker, Yuanyuan Li in Adaptive Instructional Systems (2022)

  6. No Access

    Chapter and Conference Paper

    A Multi-pronged Redesign to Reduce Gaming the System

    Despite almost two decades of interest in reducing gaming the system in interactive learning environments, gaming continues as a key factor reducing student learning outcomes and contributing to poorer learnin...

    Yuanyuan Li, **aotian Zou, Zhenjun Ma in Artificial Intelligence in Education. Pos… (2022)

  7. No Access

    Chapter and Conference Paper

    Research on the Shenzhen Mode of China’s State-Owned Enterprise Reform Serving Industrial Development in the New Era

    Based on the neoclassical micro theory, this paper expounds those state-owned enterprises, as the micro main body of the market, have the function of guiding private and small-micro enterprises to fully partic...

    Yuanyuan Li in Services – SERVICES 2021 (2022)

  8. No Access

    Chapter and Conference Paper

    SCEC: A Novel Single-Cell Classification Method Based on Cell-Pair Ensemble Learning

    With the development of single-cell sequencing technology, the increasing amount of single-cell transcription data enables a deeper understanding of cellular heterogeneity and mechanisms at the cell level. Sin...

    Wei Fan, Haonan Peng, Siyin Luo, Chujie Fang in Intelligent Computing Theories and Applica… (2021)

  9. No Access

    Chapter and Conference Paper

    Retinal Vessel Segmentation Method Based on Improved Deep U-Net

    The automatic segmentation of retinal vessels plays an important role in the early screening of eye diseases. However, vessels are difficult to segment with pathological retinal images. Hence, we propose the u...

    Yiheng Cai, Yuanyuan Li, Xurong Gao, Yajun Guo in Biometric Recognition (2019)

  10. No Access

    Chapter and Conference Paper

    Improved Spectral Clustering Method for Identifying Cell Types from Single-Cell Data

    With the development of single-cell RNA sequencing (scRNA-seq) technology, characterizing heterogeneity at the cellular level has become a new area of computational biology research. However, the infiltration ...

    Yuanyuan Li, ** Luo, Yi Lu, Fang-**ang Wu in Intelligent Computing Theories and Applica… (2019)

  11. No Access

    Chapter and Conference Paper

    Sharing Economy Protocol with Privacy Preservation and Fairness Based on Blockchain

    Blockchain, as the core technology of cryptocurrency, provides a novel idea for the sharing economy. A user pays the agreed money to the property owner without any trust third party in blockchain, which leads ...

    Zhenhua Liu, Yuanyuan Li, Yaohui Liu, Dong Yuan in Cloud Computing and Security (2018)

  12. No Access

    Chapter and Conference Paper

    CDC-MRF for Hyperspectral Data Classification

    This paper presents a new hyperspectral classification algorithm based on convolutional neural network (CNN). A CNN is first used to learn the posterior class distributions using a patch-wise training strategy...

    Yuanyuan Li, **g**g Zhang, Chunhou Zheng, Qing Yan in Intelligent Computing Methodologies (2018)

  13. No Access

    Chapter and Conference Paper

    Modular Robotic System for Nuclear Decommissioning

    Because of the radioactivity, the nuclear environment operation requires robot system to complete. In this paper, a modular robot system for nuclear environment operation is developed, which is easy to maintai...

    Yuanyuan Li, Shuzhi Sam Ge, Qing** Wei, Dong Zhou, Yuanqiang Chen in Social Robotics (2018)

  14. No Access

    Chapter and Conference Paper

    An Improved Artificial Bee Colony Algorithm and Its Taguchi Analysis

    The artificial bee colony (ABC) algorithm is one of well-known evolutionary algorithms, which has been successfully applied to many continuous or combinatorial optimization problems. To increase further its co...

    Yudong Ni, Yuanyuan Li, Yindong Shen in Bio-inspired Computing: Theories and Applications (2018)

  15. No Access

    Chapter and Conference Paper

    Face Detection with Better Representation Using a Multi-region WR-Inception Network Model

    This paper proposes a multi-region WR-Inception network model for face detection based on the Faster RCNN framework. Firstly, we utilize multi-region features to obtain better face representation and introduce...

    Lian** Yang, Yuanyuan Li, Xu Duan, **angde Zhang in Biometric Recognition (2017)

  16. No Access

    Chapter and Conference Paper

    Speaker Identification System Based on Lip-Motion Feature

    Traditional lip features have been used in speech recognition, but lately they have also been found useful as a new biometric identifier in computer vision applications. Firstly, we locate lips according to ge...

    **njun Ma, Chenchen Wu, Yuanyuan Li, Qianyuan Zhong in Computer Vision Systems (2017)

  17. No Access

    Chapter and Conference Paper

    Cultural Differences in the Understanding of History on Wikipedia

    This paper sheds light on cultural differences in the understanding of historical military events between Chinese, English, French, German, and Swedish Wikipedia language editions. Differences in understanding...

    Robin Gieck, Hanna-Mari Kinnunen in Designing Networks for Innovation and Impr… (2016)

  18. No Access

    Chapter and Conference Paper

    Mining RDF Data for OWL2 RL Axioms

    The large amounts of linked data are a valuable resource for the development of semantic applications. However, these applications often meet the challenges posed by flawed or incomplete schema, which would le...

    Yuanyuan Li, Huiying Li, **g Shi in Knowledge Graph and Semantic Computing: Se… (2016)

  19. No Access

    Chapter and Conference Paper

    Probabilistic Error Detecting in Numerical Linked Data

    Linked Open Data (LOD) has become a vast repository with billions of triples available in thousands of datasets. One of the most pressing challenges to Linked Data management is detecting errors in numerical d...

    Huiying Li, Yuanyuan Li, Feifei Xu, **nyu Zhong in Database and Expert Systems Applications (2015)

  20. No Access

    Chapter

    Sequential Anomaly Detection Using Wireless Sensor Networks in Unknown Environment

    Anomaly detection is an important problem for environment, fault diagnosis and intruder detection in Wireless Sensor Networks (WSNs). A key challenge is to minimize the communication overhead and energy consum...

    Yuanyuan Li, Michael Thomason in Human Behavior Understanding in Networked … (2014)

previous disabled Page of 2