Skip to main content

previous disabled Page of 8
and
  1. No Access

    Chapter and Conference Paper

    LSN: Long-Term Spatio-Temporal Network for Video Recognition

    Although recurrent neural networks (RNNs) are widely leveraged to process temporal or sequential data, they have attracted too little attention in current video action recognition applications. Therefore, this...

    Zhenwei Wang, Wei Dong, Bingbing Zhang, Jianxin Zhang in Data Science (2022)

  2. No Access

    Chapter and Conference Paper

    A Dynamic QoS Routing Mechanism for Deep Space Network Based on SDN Architecture

    Some characteristics of deep space communication network are well known, such as nodes limited resources, long communication delay and nearly no guarantee for the transmission quality, this paper proposes a dy...

    Dong Yan, Ming Gu, **ongwen He, Luyuan Wang in Wireless and Satellite Systems (2022)

  3. No Access

    Chapter and Conference Paper

    Efficient Dual-Process Cognitive Recommender Balancing Accuracy and Diversity

    In this paper, we propose a dual-process cognitive recommendation system for sequential recommendations. The framework includes an intuitive representation module (System 1) and an inference module (System 2)....

    Yixu Gao, Kun Shao, Zhijian Duan, Zhongyu Wei in Database Systems for Advanced Applications (2022)

  4. No Access

    Chapter and Conference Paper

    KCUBE: A Knowledge Graph University Curriculum Framework for Student Advising and Career Planning

    Knowledge representations and interactions are at the forefront of teaching, learning, and career planning activities in all endeavors of education and career development. University students are increasingly ...

    Qing Li, George Baciu, Jiannong Cao in Blended Learning: Engaging Students in the… (2022)

  5. No Access

    Chapter and Conference Paper

    SEIHAI: A Sample-Efficient Hierarchical AI for the MineRL Competition

    The MineRL competition is designed for the development of reinforcement learning and imitation learning algorithms that can efficiently leverage human demonstrations to drastically reduce the number of environ...

    Hangyu Mao, Chao Wang, **aotian Hao, Yihuan Mao in Distributed Artificial Intelligence (2022)

  6. No Access

    Chapter and Conference Paper

    You Already Have It: A Generator-Free Low-Precision DNN Training Framework Using Stochastic Rounding

    Stochastic rounding is a critical technique used in low-precision deep neural networks (DNNs) training to ensure good model accuracy. However, it requires a large number of random numbers generated on the fly....

    Geng Yuan, Sung-En Chang, Qing **, Alec Lu, Yanyu Li in Computer Vision – ECCV 2022 (2022)

  7. No Access

    Chapter and Conference Paper

    A Novel High-Performance Implementation of CRYSTALS-Kyber with AI Accelerator

    Public-key cryptography, including conventional cryptosystems and post-quantum cryptography, involves computation-intensive workloads. With noticing the extraordinary computing power of AI accelerators, in thi...

    Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao in Computer Security – ESORICS 2022 (2022)

  8. No Access

    Chapter and Conference Paper

    CLOSE: Curriculum Learning on the Sharing Extent Towards Better One-Shot NAS

    One-shot Neural Architecture Search (NAS) has been widely used to discover architectures due to its efficiency. However, previous studies reveal that one-shot performance estimations of architectures might not...

    Zixuan Zhou, Xuefei Ning, Yi Cai, Jiashu Han, Yi** Deng in Computer Vision – ECCV 2022 (2022)

  9. No Access

    Chapter and Conference Paper

    Deep Hierarchical App Recommendation with Dynamic Behaviors

    Many app recommendation models have been proposed to provide mobile users with the apps that meet their individual needs. However, three main drawbacks limit their performance: (1) Neglect the dynamic change o...

    Taiguo Qu, Wenjun Jiang, Dong Liu, Guojun Wang in Security in Computing and Communications (2021)

  10. No Access

    Chapter and Conference Paper

    Efficient Generation of Speech Adversarial Examples with Generative Model

    Deep neural network-based keyword spotting (KWS) have embraced the tremendous success in smart speech assistant applications. However, the neural network-based KWS have been demonstrated susceptible to be atta...

    Donghua Wang, Rangding Wang, Li Dong, Diqun Yan in Digital Forensics and Watermarking (2021)

  11. No Access

    Chapter and Conference Paper

    An Efficient Teaching Method for Physiological Basic Course of Online and Offline Integration

    High efficiency teaching method of traditional physiology basic course, and students’ interest in learning gray relevance, and online teaching resources utilization rate is low. Therefore, an efficient teachin...

    Lian-shi Dong, Dan Wang, **g-qiong **ao in e-Learning, e-Education, and Online Training (2021)

  12. No Access

    Chapter and Conference Paper

    VeriDL: Integrity Verification of Outsourced Deep Learning Services

    Deep neural networks (DNNs) are prominent due to their superior performance in many fields. The deep-learning-as-a-service (DLaaS) paradigm enables individuals and organizations (clients) to outsource their DN...

    Boxiang Dong, Bo Zhang, Hui (Wendy) Wang in Machine Learning and Knowledge Discovery i… (2021)

  13. No Access

    Chapter and Conference Paper

    COVID Edge-Net: Automated COVID-19 Lung Lesion Edge Detection in Chest CT Images

    Coronavirus Disease 2019 (COVID-19) has been spreading rapidly, threatening global health. Computer-aided screening on chest computed tomography (CT) images using deep learning, especially, lesion segmentation...

    Kang Wang, Yang Zhao, Yong Dou, Dong Wen in Machine Learning and Knowledge Discovery i… (2021)

  14. No Access

    Chapter and Conference Paper

    Research on In-Vehicle Haptic Interactions as Crucial Resources for Driver Perceptions

    Multiple resource theory is currently commonly applied in human–machine interactions in vehicle design. Haptic interaction is a crucial resource for driver perceptions. This paper reviews haptic research relat...

    **n **n, Yiji Wang, Nan Liu, Wenmin Yang in HCI International 2021 - Late Breaking Pap… (2021)

  15. Chapter and Conference Paper

    Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing

    The Meet-in-the-Middle (MITM) preimage attack is highly effective in breaking the preimage resistance of many hash functions, including but not limited to the full MD5, HAVAL, and Tiger, and reduced SHA-0/1/2. It...

    Zhenzhen Bao, **aoyang Dong, Jian Guo, Zheng Li in Advances in Cryptology – EUROCRYPT 2021 (2021)

  16. No Access

    Chapter and Conference Paper

    VisDrone-SOT2020: The Vision Meets Drone Single Object Tracking Challenge Results

    The Vision Meets Drone (VisDrone2020) Single Object Tracking is the third annual UAV tracking evaluation activity organized by the VisDrone team, in conjunction with European Conference on Computer Vision (ECC...

    Heng Fan, Longyin Wen, Dawei Du, Pengfei Zhu in Computer Vision – ECCV 2020 Workshops (2020)

  17. No Access

    Chapter and Conference Paper

    The Eighth Visual Object Tracking VOT2020 Challenge Results

    The Visual Object Tracking challenge VOT2020 is the eighth annual tracker benchmarking activity organized by the VOT initiative. Results of 58 trackers are presented; many are state-of-the-art trackers publish...

    Matej Kristan, Aleš Leonardis, Jiří Matas in Computer Vision – ECCV 2020 Workshops (2020)

  18. No Access

    Chapter and Conference Paper

    VisDrone-DET2020: The Vision Meets Drone Object Detection in Image Challenge Results

    The Vision Meets Drone Object Detection in Image Challenge (VisDrone-DET 2020) is the third annual object detector benchmarking activity. Compared with the previous VisDrone-DET 2018 and VisDrone-DET 2019 chal...

    Dawei Du, Longyin Wen, Pengfei Zhu, Heng Fan in Computer Vision – ECCV 2020 Workshops (2020)

  19. No Access

    Chapter and Conference Paper

    Learning Route Planning from Experienced Drivers Using Generalized Value Iteration Network

    Traffic congestion has long been a serious problem in cities, and route planning can improve traffic efficiency. The existing route planning approach relies on current and future traffic status. However, becau...

    **ao Wang, Quan Yuan, Zhihan Liu in Internet of Vehicles. Technologies and Ser… (2020)

  20. No Access

    Chapter and Conference Paper

    Research on Database Anomaly Access Detection Based on User Profile Construction

    As a platform for data storage and administration, database contains private and large information, which makes it a target of malicious personnel attacks. To prevent attacks from outsiders, database administr...

    Xuren Wang, Zhou Fang, Dong Wang, Anran Feng, Qiuyun Wang in Frontiers in Cyber Security (2020)

previous disabled Page of 8