![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Modelling and Simulation of a Full Power Conversion Wind Power System Based on Inertial Self-synchronization
Aiming at the lack of frequency support capability of conventional wind turbines and the stability problem under weak grid, this paper gives a voltage source control strategy for full-power wind turbines. The ...
-
Chapter and Conference Paper
A Construction of IoT Malicious Traffic Dataset and Its Applications
The current Internet of Things (IoT) malicious traffic dataset mainly relies on raw binary data at the traffic packet level and structured data at the session flow level for learning training and predictive cl...
-
Chapter and Conference Paper
Graph-Genetic Enabled Spectrum Sharing for Terrestrial Radar-Communication Networks
In this paper, we consider the problem of spectrum for multiple radar-communication integrated devices in a complex wireless environment. In particular, we consider a scenario characterized by the dense deploy...
-
Chapter and Conference Paper
Anti-drilling Characteristic Predicting Method for Penglai Gas Area Based on Meso Characteristic of Stone
Recently years, the rate of penetration (ROP) of Xujiahe sequence of upper tertiary (13 1/8in” bores) among prospecting wells in Penglai gas area was too slow, and the difficulty in coring also constrained the pr...
-
Chapter and Conference Paper
Facial Expression Recognition In-the-Wild with Deep Pre-trained Models
Facial expression recognition (FER) is challenging, when transiting from the laboratory to in-the-wild situations. In this paper, we present a general framework for the Learning from Synthetic Data Challenge i...
-
Chapter and Conference Paper
Edge but not Least: Cross-View Graph Pooling
Graph neural networks have emerged as a powerful representation learning model for undertaking various graph prediction tasks. Various graph pooling methods have been developed to coarsen an input graph into a...
-
Chapter and Conference Paper
Analysis of Head Protection Performance of Bicycle Helmets by Full-Scale Computational Biomechanics Modelling of Real-World Car-to-Cyclist Accidents
Cyclist are common . Helmets remain the most commonly used protective equipment against such injuries. However, discussion about the effectiveness of in continues. In this study, we computationally reco...
-
Chapter and Conference Paper
A Multi-attribute Decision Handover Strategy for Giant LEO Mobile Satellite Networks
Due to the characteristics of low orbital height and large number of satellites, the giant Low Earth Orbit (LEO) satellite network has more frequent handovers than ordinary LEO satellite communication systems. Th...
-
Chapter and Conference Paper
Improving EEG-based Motor Execution Classification for Robot Control
Brain Computer Interface (BCI) systems have the potential to provide a communication tool using non-invasive signals which can be applied to various fields including neuro-rehabilitation and entertainment. Int...
-
Chapter and Conference Paper
DeepC2: AI-Powered Covert Command and Control on OSNs
Command and control (C &C) is important in an attack. It transfers commands from the attacker to the malware in the compromised hosts. Currently, some attackers use online social networks (OSNs) in C &C tasks....
-
Chapter and Conference Paper
Optimization Algorithm for Cooperative Assembly Sequence of Truss Structure Based on Reinforcement Learning
Truss structure is widely used in the aerospace field, which has good structural performance and high structural efficiency. The truss structure plays an important role in the construction of alien ground scie...
-
Chapter and Conference Paper
Providing Network-Based Datasets and Multi-dimensional Features for IoT Botnet Detection Research
The vulnerabilities found in Internet of Things (IoT) devices have caused a large number of IoT devices being compromised and used as botnet platforms, which imposes a serious threat to the cyber security. In ...
-
Chapter and Conference Paper
Research on Rationality of Safety Sign Location Setting Based on Visual Search Performance
To research the rationality of the location of safety signs, the safety signs were set at different positions and heights in the corridor. 30 subjects were invited to attend the experiment. Tobii eye tracker w...
-
Chapter and Conference Paper
Application of Object—Attribute Space Segmentation in Bidding Activities
In this paper, the object-attribute space segmentation method is used to segment the high-dimensional sparse matrix of regulation-bidding process in bidding activities, and the correlation model of regulation-...
-
Chapter and Conference Paper
GAN-Based Adversarial Patch for Malware C2 Traffic to Bypass DL Detector
The constantly evolving malware brings great challenges to network security defense. Fortunately, deep learning (DL)-based system achieved good performance in the malware command and control (C2) traffic detec...
-
Chapter and Conference Paper
Lightweight Non-local High-Resolution Networks for Human Pose Estimation
Human pose estimation is one of the fundamental tasks in computer vision, applied in areas such as motion recognition, games, and animation production. Most of the current deep network models entail deepening ...
-
Chapter and Conference Paper
Human-Understandable Decision Making for Visual Recognition
The widespread use of deep neural networks has achieved substantial success in many tasks. However, there still exists a huge gap between the operating mechanism of deep learning models and human-understandabl...
-
Chapter and Conference Paper
Unified Robust Training for Graph Neural Networks Against Label Noise
Graph neural networks (GNNs) have achieved state-of-the-art performance for node classification on graphs. The vast majority of existing works assume that genuine node labels are always provided for training. ...
-
Chapter and Conference Paper
A Scalable and Secure Consensus Scheme Based on Proof of Stake in Blockchain
As a decentralized database, the public blockchain has broad application prospects in many fields such as finance, healthcare, and supply chain, so it is getting more and more attention. The current mainstream...
-
Chapter and Conference Paper
Switching-Aware Dynamic Control Path Planning for Software Defined Large-Scale LEO Satellite Networks with GEO Controllers
Recently, to acquire the programmability, flexibility and re-configurability of network, the technologies of software-defined networking (SDN) are utilized to design new architectures for LEO satellite network...