Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Intelligent Cooperative Routing for Services in Computing Integration Networking

    With the widespread application of cloud computing and edge computing, achieving optimal allocation of computing resources in a heterogeneous network environment has become a key issue. The objective of this c...

    Guoqing Dong, Tianhao Peng, Qixuan Zhang, Huizhi Wang in Mobile Internet Security (2024)

  2. No Access

    Chapter and Conference Paper

    Flexible Sensor Array and Newton Interpolation Algorithm for Molded Dichromatic Sole by Operating Robot

    Based on the principle of system engineering and optimization method, the multi-color soles mold operation robot was constructed instead of manual operation, and the double-layer quality inspection standard of...

    Lizhi Gu, Shan** Gao, Dong Wang, **ling Song in Computer Networks and IoT (2024)

  3. No Access

    Chapter and Conference Paper

    A Survey of Integrating Federated Learning with Smart Grids: Application Prospect, Privacy Preserving and Challenges Analysis

    With the widespread promotion of smart grid, the power time series data collected by smart meters also increases rapidly. How to collect these data safely and effectively, analyze and utilize them, and provide...

    Zhichao Tang, Yan Yan, Dong Wu, Tianhao Yang, Ruixuan Dong in Big Data and Security (2023)

  4. No Access

    Chapter and Conference Paper

    A Routing Algorithm for Node Protection in Wireless Sensor Network Based on Clustering Ant Colony Strategy

    Thanks to the rapid development of wireless communication and electronic technology, wireless sensor networks have been increasingly used in military, medical and other fields. Because of the characteristics o...

    **ao Feng, Yuanzheng Wang, Tengfei Dong in Artificial Intelligence and Security (2022)

  5. No Access

    Chapter and Conference Paper

    A Transaction Model of Bill Service Based on Blockchain

    In recent years, the bill business has developed rapidly, but it can not be ignored that there are also great risks in the bill business. In 2016, an Agricultural Bank of China (ABC) Bill case involving 3.9 bi...

    **nyan Wang, Jianxun Guo, Dong Li, **n Chen in Artificial Intelligence and Security (2021)

  6. No Access

    Chapter and Conference Paper

    Research on Database Anomaly Access Detection Based on User Profile Construction

    As a platform for data storage and administration, database contains private and large information, which makes it a target of malicious personnel attacks. To prevent attacks from outsiders, database administr...

    Xuren Wang, Zhou Fang, Dong Wang, Anran Feng, Qiuyun Wang in Frontiers in Cyber Security (2020)

  7. No Access

    Chapter and Conference Paper

    Adversarial Examples Attack and Countermeasure for Speech Recognition System: A Survey

    Speech recognition technology is affecting and changing the current human-computer interaction profoundly. Due to the remarkable progress of deep learning, the performance of the Automatic Speech Recognition (...

    Donghua Wang, Rangding Wang, Li Dong, Diqun Yan in Security and Privacy in Digital Economy (2020)

  8. No Access

    Chapter and Conference Paper

    Post-processing for Enhancing Audio Steganographic Undetectability

    Currently, the conventional steganography method often only perform data embedding, without additional post-processing to enhance undetectability. In this work, we propose a new audio post-processing steganogr...

    Xueyuan Zhang, Rangding Wang, Li Dong, Diqun Yan in Security and Privacy in Digital Economy (2020)

  9. No Access

    Chapter and Conference Paper

    BBM: A Blockchain-Based Model for Open Banking via Self-sovereign Identity

    Open banking technology is an emerging data-sharing paradigm that can facilitate and inspire new businesses vie efficient data-sharing with banks, such as quick approval of loan applications and finding a bett...

    Chengzu Dong, Ziyuan Wang, Shi** Chen, Yang **ang in Blockchain – ICBC 2020 (2020)

  10. No Access

    Chapter and Conference Paper

    Robust, Imperceptible and End-to-End Audio Steganography Based on CNN

    Recently, deep learning-based steganography emerges, where the end-to-end steganography is a promising direction. However, most of the existing approaches are developed for the image which are not suitable for...

    Jie Wang, Rangding Wang, Li Dong, Diqun Yan in Security and Privacy in Digital Economy (2020)

  11. No Access

    Chapter and Conference Paper

    Urban Data Acquisition Routing Approach for Vehicular Sensor Networks

    Vehicular sensor networks have emerged as a new wireless sensor network paradigm that is envisioned to revolutionize the human driving experiences and traffic control systems. Like conventional sensor networks...

    Leilei Meng, Ziyu Dong, Ziyu Wang, Zhen Cheng in Green, Pervasive, and Cloud Computing (2019)

  12. No Access

    Chapter and Conference Paper

    Generative Creativity: Adversarial Learning for Bionic Design

    Generative creativity in the context of visual data refers to the generation process of new and creative images by composing features of existing ones. In this work, we aim to achieve generative creativity by ...

    Simiao Yu, Hao Dong, Pan Wang, Chao Wu in Artificial Neural Networks and Machine Lea… (2019)

  13. Chapter and Conference Paper

    PIRM2018 Challenge on Spectral Image Super-Resolution: Methods and Results

    In this paper, we describe the Perceptual Image Restoration and Manipulation (PIRM) workshop challenge on spectral image super-resolution, motivate its structure and conclude on results obtained by the partici...

    Mehrdad Shoeiby, Antonio Robles-Kelly in Computer Vision – ECCV 2018 Workshops (2019)

  14. No Access

    Chapter and Conference Paper

    Similarity-Aware Deep Attentive Model for Clickbait Detection

    Clickbait is a type of web content advertisements designed to entice readers into clicking accompanying links. Usually, such links will lead to articles that are either misleading or non-informative, making th...

    Manqing Dong, Lina Yao, **anzhi Wang in Advances in Knowledge Discovery and Data M… (2019)

  15. Chapter and Conference Paper

    Gated Convolutional LSTM for Speech Commands Recognition

    As the mobile device gaining increasing popularity, Acoustic Speech Recognition on it is becoming a leading application. Unfortunately, the limited battery and computational resources on a mobile device highly...

    Dong Wang, Shaohe Lv, **aodong Wang, **nye Lin in Computational Science – ICCS 2018 (2018)

  16. No Access

    Chapter and Conference Paper

    Research on Auto-Generating Test-Paper Model Based on Spatial-Temporal Clustering Analysis

    In the process of auto-generating test-paper, the category and the difficulty of the title plays a key role in the quality of generating test-paper. It will produce low quality questions and hard to popularize...

    Yuling Fan, Likai Dong, Xuesong Sun in Intelligent Computing Theories and Applica… (2018)

  17. No Access

    Chapter and Conference Paper

    Sketch Based Model-Like Standing Style Recommendation

    Various mobile devices with high-quality cameras are very popular in human daily life. Appropriate directions about the standing postures can greatly improve the user experience while taking photos. In this pa...

    Ying Zheng, Hongxun Yao, Dong Wang in Advances in Multimedia Information Process… (2018)

  18. No Access

    Chapter and Conference Paper

    Multi-information Fusion Based Mobile Attendance Scheme with Face Recognition

    There are some problems in traditional classroom attendances, such as complex interaction, masquerading, waste of time and information out of sync. A novel class attendance scheme is proposed based on face rec...

    Likai Dong, Qinlin Li, Tao Xu, Xuesong Sun in Intelligent Computing Theories and Applica… (2018)

  19. No Access

    Chapter and Conference Paper

    The Wide and Deep Flexible Neural Tree and Its Ensemble in Predicting Long Non-coding RNA Subcellular Localization

    The long non-coding RNA (lncRNA) is a hot research topic among researchers in the field of biology. Recent studies have illustrated that the subcellular localizations carry salient information to understand t...

    **g Xu, Peng Wu, Yuehui Chen in Intelligent Computing Theories and Applica… (2018)

  20. No Access

    Chapter and Conference Paper

    Study on Human Body Action Recognition

    A novel human body action recognition method based on Kinect is proposed. Firstly, the key frame of the original data is extracted by using the key frame extraction technology based on quaternion. Secondly, t...

    Dong Yin, Yu-Qing Miao, Kang Qiu, An Wang in Biometric Recognition (2018)

previous disabled Page of 2