Skip to main content

previous disabled Page of 4
and
  1. No Access

    Chapter and Conference Paper

    Modelling and Simulation of a Full Power Conversion Wind Power System Based on Inertial Self-synchronization

    Aiming at the lack of frequency support capability of conventional wind turbines and the stability problem under weak grid, this paper gives a voltage source control strategy for full-power wind turbines. The ...

    Tao Liu, YueHong Dai, Jie Yin in The Proceedings of the 18th Annual Confere… (2024)

  2. No Access

    Chapter and Conference Paper

    A Construction of IoT Malicious Traffic Dataset and Its Applications

    The current Internet of Things (IoT) malicious traffic dataset mainly relies on raw binary data at the traffic packet level and structured data at the session flow level for learning training and predictive cl...

    Yi** Zhang, Yiyang Zhou, Jie Yin in Artificial Intelligence and Machine Learni… (2024)

  3. No Access

    Chapter and Conference Paper

    Graph-Genetic Enabled Spectrum Sharing for Terrestrial Radar-Communication Networks

    In this paper, we consider the problem of spectrum for multiple radar-communication integrated devices in a complex wireless environment. In particular, we consider a scenario characterized by the dense deploy...

    Shigui **ao, Guodong Duan, Shaohu Yan in Proceedings of 2023 11th China Conference … (2024)

  4. No Access

    Chapter and Conference Paper

    Anti-drilling Characteristic Predicting Method for Penglai Gas Area Based on Meso Characteristic of Stone

    Recently years, the rate of penetration (ROP) of Xujiahe sequence of upper tertiary (13 1/8in” bores) among prospecting wells in Penglai gas area was too slow, and the difficulty in coring also constrained the pr...

    Yu Lei, **-wei Wang, Jun-jie Yin in Proceedings of the International Field Exp… (2024)

  5. No Access

    Chapter and Conference Paper

    Facial Expression Recognition In-the-Wild with Deep Pre-trained Models

    Facial expression recognition (FER) is challenging, when transiting from the laboratory to in-the-wild situations. In this paper, we present a general framework for the Learning from Synthetic Data Challenge i...

    Siyang Li, Yifan Xu, Huanyu Wu, Dongrui Wu in Computer Vision – ECCV 2022 Workshops (2023)

  6. No Access

    Chapter and Conference Paper

    Edge but not Least: Cross-View Graph Pooling

    Graph neural networks have emerged as a powerful representation learning model for undertaking various graph prediction tasks. Various graph pooling methods have been developed to coarsen an input graph into a...

    **aowei Zhou, Jie Yin, Ivor W. Tsang in Machine Learning and Knowledge Discovery i… (2023)

  7. No Access

    Chapter and Conference Paper

    Analysis of Head Protection Performance of Bicycle Helmets by Full-Scale Computational Biomechanics Modelling of Real-World Car-to-Cyclist Accidents

    Cyclist are common . Helmets remain the most commonly used protective equipment against such injuries. However, discussion about the effectiveness of in continues. In this study, we computationally reco...

    Fang Wang, Ke Peng, Jiajie Yin, Shenghui Hu in Computational Biomechanics for Medicine (2023)

  8. No Access

    Chapter and Conference Paper

    A Multi-attribute Decision Handover Strategy for Giant LEO Mobile Satellite Networks

    Due to the characteristics of low orbital height and large number of satellites, the giant Low Earth Orbit (LEO) satellite network has more frequent handovers than ordinary LEO satellite communication systems. Th...

    TingTing Zhang, LinTao Yang, Tao Dong, Jie Yin in Smart Computing and Communication (2022)

  9. No Access

    Chapter and Conference Paper

    Improving EEG-based Motor Execution Classification for Robot Control

    Brain Computer Interface (BCI) systems have the potential to provide a communication tool using non-invasive signals which can be applied to various fields including neuro-rehabilitation and entertainment. Int...

    Sumeyra U. Demir Kanik, Wenjie Yin in Social Computing and Social Media: Design,… (2022)

  10. No Access

    Chapter and Conference Paper

    DeepC2: AI-Powered Covert Command and Control on OSNs

    Command and control (C &C) is important in an attack. It transfers commands from the attacker to the malware in the compromised hosts. Currently, some attackers use online social networks (OSNs) in C &C tasks....

    Zhi Wang, Chaoge Liu, **ang Cui, Jie Yin in Information and Communications Security (2022)

  11. No Access

    Chapter and Conference Paper

    Optimization Algorithm for Cooperative Assembly Sequence of Truss Structure Based on Reinforcement Learning

    Truss structure is widely used in the aerospace field, which has good structural performance and high structural efficiency. The truss structure plays an important role in the construction of alien ground scie...

    Jie Yin, Meng Chen, Tao Zhang in Intelligent Robotics and Applications (2021)

  12. No Access

    Chapter and Conference Paper

    Providing Network-Based Datasets and Multi-dimensional Features for IoT Botnet Detection Research

    The vulnerabilities found in Internet of Things (IoT) devices have caused a large number of IoT devices being compromised and used as botnet platforms, which imposes a serious threat to the cyber security. In ...

    Jie Yin, **anda Wu, Junnan Wang, Kun Jia in Advances in Artificial Intelligence and Se… (2021)

  13. No Access

    Chapter and Conference Paper

    Research on Rationality of Safety Sign Location Setting Based on Visual Search Performance

    To research the rationality of the location of safety signs, the safety signs were set at different positions and heights in the corridor. 30 subjects were invited to attend the experiment. Tobii eye tracker w...

    Guilei Sun, Yiyang Hu, Qi Yang, Junyu Zhou, Yujie Yin in HCI International 2021 - Posters (2021)

  14. No Access

    Chapter and Conference Paper

    Application of Object—Attribute Space Segmentation in Bidding Activities

    In this paper, the object-attribute space segmentation method is used to segment the high-dimensional sparse matrix of regulation-bidding process in bidding activities, and the correlation model of regulation-...

    Yijie Yin, Yuwen Huo, Yaoyu Hu in LISS 2020 (2021)

  15. No Access

    Chapter and Conference Paper

    GAN-Based Adversarial Patch for Malware C2 Traffic to Bypass DL Detector

    The constantly evolving malware brings great challenges to network security defense. Fortunately, deep learning (DL)-based system achieved good performance in the malware command and control (C2) traffic detec...

    Junnan Wang, Qixu Liu, Chaoge Liu, Jie Yin in Information and Communications Security (2021)

  16. No Access

    Chapter and Conference Paper

    Lightweight Non-local High-Resolution Networks for Human Pose Estimation

    Human pose estimation is one of the fundamental tasks in computer vision, applied in areas such as motion recognition, games, and animation production. Most of the current deep network models entail deepening ...

    Congcong Zhang, Ning He, Qixiang Sun, **aojie Yin, Kang Yan, Yuzhe He in Image and Graphics (2021)

  17. No Access

    Chapter and Conference Paper

    Human-Understandable Decision Making for Visual Recognition

    The widespread use of deep neural networks has achieved substantial success in many tasks. However, there still exists a huge gap between the operating mechanism of deep learning models and human-understandabl...

    **aowei Zhou, Jie Yin, Ivor Tsang, Chen Wang in Advances in Knowledge Discovery and Data M… (2021)

  18. No Access

    Chapter and Conference Paper

    Unified Robust Training for Graph Neural Networks Against Label Noise

    Graph neural networks (GNNs) have achieved state-of-the-art performance for node classification on graphs. The vast majority of existing works assume that genuine node labels are always provided for training. ...

    Yayong Li, Jie Yin, Ling Chen in Advances in Knowledge Discovery and Data Mining (2021)

  19. No Access

    Chapter and Conference Paper

    A Scalable and Secure Consensus Scheme Based on Proof of Stake in Blockchain

    As a decentralized database, the public blockchain has broad application prospects in many fields such as finance, healthcare, and supply chain, so it is getting more and more attention. The current mainstream...

    Fayuan Zhu, Jie Yin, Lei Liu, Jie Feng in Blockchain and Trustworthy Systems (2021)

  20. No Access

    Chapter and Conference Paper

    Switching-Aware Dynamic Control Path Planning for Software Defined Large-Scale LEO Satellite Networks with GEO Controllers

    Recently, to acquire the programmability, flexibility and re-configurability of network, the technologies of software-defined networking (SDN) are utilized to design new architectures for LEO satellite network...

    Tingting Zhang, Fan Bai, Tao Dong, Jie Yin, Zhihui Liu in Wireless and Satellite Systems (2021)

previous disabled Page of 4