Skip to main content

previous disabled Page of 17
and
  1. No Access

    Chapter and Conference Paper

    Enhanced Featurization of Queries with Interval Density Encoding

    Learning-based cardinality estimation methods outperform traditional methods by effectively overcoming strong assumptions(attribute value independence and uniform distribution). Existing learning-based methods...

    Jiangqing Wang, Dong Yang, Chong Sun, Jun Tie in Artificial Intelligence in China (2024)

  2. No Access

    Chapter and Conference Paper

    A Low-Latency Hardware Accelerator for YOLO Object Detection Algorithms

    Object detection is an important computer vision task with a wide range of applications, including autonomous driving, smart security, and other domains. However, the high computational requirements poses chal...

    Aibin Wang, Youshi Ye, Yu Peng, Dezheng Zhang in Advanced Parallel Processing Technologies (2024)

  3. No Access

    Chapter and Conference Paper

    DC Voltage Detection Based on Combined Sinc and Kalman Filter

    Relay test equipment are key equipment for rail transit to ensure safe operation of rail transit

    Gu-hua Lin, Chen Li, Jia-ning Zhu, Lei ** in Proceedings of 3rd 2023 International Conf… (2024)

  4. No Access

    Chapter and Conference Paper

    Study on the Genetic Links Between Type 2 Diabetes Mellitus and Glioma by Bioinformatics

    Diabetes will increase the risk of most cancers, such as pancreatic, breast and prostate cancer. However, some studies showed patients with diabetes are less susceptible to glioma than the people with normal b...

    Yidan Sang, Mengyang Hu, Na Wang in Bio-Inspired Computing: Theories and Appli… (2024)

  5. No Access

    Chapter and Conference Paper

    Accelerated Lifetime Experiment of Maximum Current Ratio Based on Charge and Discharge Capacity Confinement

    Lithium-ion batteries will undergo continuous aging during the process of charging and discharging. Charging and discharging cycle conditions for lithium-ion batteries are usually an important method to detect...

    Baoji Wang, Boyan Li, Qixuan Wang, Lei Dong in Advanced Computational Intelligence and In… (2024)

  6. No Access

    Chapter and Conference Paper

    High-Resolution Feature Representation Driven Infrared Small-Dim Object Detection

    Infrared small-dim object detection is a challenging task due to the small size, weak features, lack of prominent structural information, and vulnerability to background interference. During the process of dee...

    Yuhang Dong, Yingying Wang, Linyu Fan in Pattern Recognition and Computer Vision (2024)

  7. No Access

    Chapter and Conference Paper

    Intelligent Cooperative Routing for Services in Computing Integration Networking

    With the widespread application of cloud computing and edge computing, achieving optimal allocation of computing resources in a heterogeneous network environment has become a key issue. The objective of this c...

    Guoqing Dong, Tianhao Peng, Qixuan Zhang, Huizhi Wang in Mobile Internet Security (2024)

  8. No Access

    Chapter and Conference Paper

    Blockchain Scam Detection: State-of-the-Art, Challenges, and Future Directions

    With the rapid development of blockchain platforms, such as Ethereum and Hyperledger Fabric, blockchain technology has been widely applied in various domains. However, various scams exist in the cryptocurrency...

    Shunhui Ji, Congxiong Huang, Hanting Chu, **ao Wang in Blockchain and Trustworthy Systems (2024)

  9. No Access

    Chapter and Conference Paper

    SFRSwin: A Shallow Significant Feature Retention Swin Transformer for Fine-Grained Image Classification of Wildlife Species

    Fine-grained image classification of wildlife species is a task of practical value and has an important role to play in the fields of endangered animal conservation, environmental protection and ecological con...

    Shuai Wang, Yubing Han, Shouliang Song in Pattern Recognition and Computer Vision (2024)

  10. No Access

    Chapter and Conference Paper

    Construction and Evaluation of the Five-in-One Practice Teaching Model

    In response to the economic and social development of Tibet Autonomous Region and the demand for information technology construction in the new engineering era, this paper analyzes the communication engineerin...

    Zhicheng Dong, Donghong Cai, Yonghao Shi in Computer Science and Education. Educationa… (2024)

  11. No Access

    Chapter and Conference Paper

    Intelligent Network Intrusion Detection and Situational Awareness for Cyber-Physical Systems in Smart Cities

    Smart cities are enabled by cyber-physical systems (CPS) which leverage the Internet of Things (IoT) to connect the physical world and information systems. Due to lack of security protection, IoT systems are v...

    Shouliang Song, Anming Dong, Honglei Zhu in PRICAI 2023: Trends in Artificial Intellig… (2024)

  12. No Access

    Chapter and Conference Paper

    Flexible Sensor Array and Newton Interpolation Algorithm for Molded Dichromatic Sole by Operating Robot

    Based on the principle of system engineering and optimization method, the multi-color soles mold operation robot was constructed instead of manual operation, and the double-layer quality inspection standard of...

    Lizhi Gu, Shan** Gao, Dong Wang, **ling Song in Computer Networks and IoT (2024)

  13. No Access

    Chapter and Conference Paper

    Multi-sourced Integrated Ranking with Exposure Fairness

    Integrated ranking system is one of the critical components of industrial recommendation platforms. An integrated ranking system is expected to generate a mix of heterogeneous items from multiple upstream sour...

    Yifan Liu, Weiwen Liu, Wei **a, Jieming Zhu in Advances in Knowledge Discovery and Data M… (2024)

  14. No Access

    Chapter and Conference Paper

    A Secure Circulation Mechanism of Personal Data Based on Blockchains

    This paper discusses the privacy protection and security application of personal data from the perspective of building private chains. Individuals have control over their private chains, and their data can be ...

    Tianqi Cai, Yuhan Dong, Zitao Xuan, Lei Wang in Data Science and Information Security (2024)

  15. No Access

    Chapter and Conference Paper

    Co-regularized Facial Age Estimation with Graph-Causal Learning

    In this paper, we present a graph-causal regularization (GCR) for robust facial age estimation. Existing label facial age estimation methods often suffer from overfitting and overconfidence issues due to limit...

    Tao Wang, **n Dong, Zhendong Li, Hao Liu in Pattern Recognition and Computer Vision (2024)

  16. No Access

    Chapter and Conference Paper

    A Survey of Integrating Federated Learning with Smart Grids: Application Prospect, Privacy Preserving and Challenges Analysis

    With the widespread promotion of smart grid, the power time series data collected by smart meters also increases rapidly. How to collect these data safely and effectively, analyze and utilize them, and provide...

    Zhichao Tang, Yan Yan, Dong Wu, Tianhao Yang, Ruixuan Dong in Big Data and Security (2023)

  17. No Access

    Chapter and Conference Paper

    Visual Realism Assessment for Face-Swap Videos

    Deep-learning-based face-swap videos, also known as deepfakes, are becoming more and more realistic and deceiving. The malicious usage of these face-swap videos has caused wide concerns. The research community...

    **anyun Sun, Beibei Dong, Caiyong Wang, Bo Peng, **g Dong in Image and Graphics (2023)

  18. No Access

    Chapter and Conference Paper

    A GCN-Based Sequential Recommendation Model for Heterogeneous Information Networks

    Sequential recommendation is an important task in the research of recommendation methods for heterogeneous information networks, which is a technique of predicting next user behavior according to completed beh...

    Dong Li, Yuchen Wang, Tingwei Chen in Web and Big Data. APWeb-WAIM 2022 Internat… (2023)

  19. No Access

    Chapter and Conference Paper

    Revisit Input Perturbation Problems for LLMs: A Unified Robustness Evaluation Framework for Noisy Slot Filling Task

    With the increasing capabilities of large language models (LLMs), these high-performance models have achieved state-of-the-art results on a wide range of natural language processing (NLP) tasks. However, the m...

    Guanting Dong, **xu Zhao, Tingfeng Hui in Natural Language Processing and Chinese Co… (2023)

  20. No Access

    Chapter and Conference Paper

    Chinese Event Causality Identification Based on Retrieval Enhancement

    Event causality identification (ECI) is a critical and challenging information extraction task, which aims to identify whether there is a causal relationship between the two events. To address the current prob...

    Yumiao Gao, Yizhi Ren, Jiawei Rao in Natural Language Processing and Chinese Co… (2023)

previous disabled Page of 17