Skip to main content

previous disabled Page of 16
and
  1. No Access

    Chapter and Conference Paper

    InDNI: An Infection Time Independent Method for Diffusion Network Inference

    Diffusion network inference aims to reveal the message propagation process among users and has attracted many research interests due to the fundamental role it plays in some real applications, such as rumor-sp...

    Guoxin Chen, Yongqing Wang, Jiangli Shao, Boshen Shi, Huawei Shen in Information Retrieval (2023)

  2. No Access

    Chapter and Conference Paper

    A System Integration Method of Product Data Management Based on UG/NX Secondary Development

    An integrated development methodology of UG/NX and product data management (PDM) system is carried out based on the UG/NX secondary development technology, aiming at the needs of the PDM system to manage the p...

    Kai Wang, Pengfei Zeng, Chun**g Shi, Wei** Shao in Intelligent Robotics and Applications (2022)

  3. No Access

    Chapter and Conference Paper

    Multi-scale Feature Based Densely Channel Attention Network for Vision-Based Haze Visibility Detection

    Due to the problem of reduced visibility caused by haze pollution, it has brought great inconvenience to outdoor activities and traffic travel. Therefore, haze control has become one of the topics closely conc...

    Jie Tao, Yaocai Wu, Qike Shao, Shihang Yan in Intelligent Robotics and Applications (2022)

  4. No Access

    Chapter and Conference Paper

    HFSWR Polarization DOA Estimation Based on Quaternion

    This paper examines the direction of arrival (DOA) estimation for polarized signals im**ing on a vector sensor array for high frequency surface wave radar (HFSWR). The vector array effectively utilizes the p...

    Shao Shuai, Liu Aijun, Yu Changjun, Lv Zhe, Zhao Quanrui in Wireless and Satellite Systems (2022)

  5. No Access

    Chapter and Conference Paper

    How to Apply Bloom’s Taxonomy to Operator Education in the Way of Human-Machine Cooperation?

    Operator education is essential in the process industry to avoid catastrophic accidents caused by human error. The operators of modern industrial plants not only need professional operation skills, more import...

    Guanghui Yang, Zhijiang Shao, Zuhua Xu in Learning and Collaboration Technologies. N… (2022)

  6. No Access

    Chapter and Conference Paper

    Generative Unknown-Aware Object Detection

    Building object detectors can identify unknown objects, which is critical yet underexplored. An additional discriminative inference pass is generally needed to generate final classification results for “unknow...

    Changhua Wang, Bao Li, Likang Chen, Qike Shao in Intelligent Robotics and Applications (2022)

  7. No Access

    Chapter and Conference Paper

    Robust Zero Watermarking Algorithm for Medical Images Using Local Binary Pattern and Discrete Cosine Transform

    Thanks to the rapid development of the telemedicine, medical treatment has turned in great convenience. However, as the internet network can be addressed by any user, the medical images cannot avoid the defect...

    Wenyi Liu, **gbing Li, Chunyan Shao in Advances in Artificial Intelligence and Se… (2022)

  8. No Access

    Chapter and Conference Paper

    Novel Shaped 8/16PSK Modulation with Improved Spectral Efficiency

    In this work, a precoder based on 8/16 phase shift keying (PSK) is devised and used to generate a novel shaped 8/16 PSK modulation combining precoding and continuous phase modulation (CPM). Then, two receivers...

    **ao Chen, Yu Zhou, Fan Gao, Xuesong Shao, Yue Li in Wireless and Satellite Systems (2022)

  9. No Access

    Chapter and Conference Paper

    A Review of Cross-Blockchain Solutions

    With the development of distributed ledgers, a variety of blockchain projects, with different characteristics, are emerging and working in a broad range of application scenarios. Cross-Blockchain Solutions are...

    YuXuan Zuo, Miao Yang, Zhen** Qiang, Dai Fei, **aoFeng Shao, ShiQi Su in Cloud Computing (2022)

  10. No Access

    Chapter and Conference Paper

    Outage Probability for Device to Device and Cellular Heterogeneous Networks over Nakagami-m Channels

    Device-to-Device (D2D) communication has become an important component in future communications, because it has the advantages of offloading traffic from the base stations and reducing the distance between the...

    Yu Zhou, **ao Chen, Xuesong Shao, Fan Gao, Qixin Cai in Wireless and Satellite Systems (2022)

  11. No Access

    Chapter and Conference Paper

    Path-Preserving Anonymization for Inter-domain Routing Policies

    The Internet consists of tens of thousands of autonomous systems (ASes), which exchange routing information through policy-based routing protocols, such as Border Gateway Protocol (BGP). BGP allows network adm...

    **aozhe Shao, Hossein Pishro-Nik, Lixin Gao in Risks and Security of Internet and Systems (2022)

  12. No Access

    Chapter and Conference Paper

    Dynamic Trust-Based Resource Allocation Mechanism for Secure Edge Computing

    Edge computing plays an important role in processing and storing data. By offloading tasks to the edge server, mobile users can access necessary computing resources on demand. However, security of edge computi...

    Huiqun Yu, Qifeng Tang, Zhiqing Shao in Collaborative Computing: Networking, Appli… (2022)

  13. No Access

    Chapter and Conference Paper

    Self-attention Based Multimodule Fusion Graph Convolution Network for Traffic Flow Prediction

    With rapid economic development, the per capita ownership of automobiles in our country has begun to rise year by year. More researchers have paid attention to using scientific methods to solve traffic flow pr...

    Lijie Li, Hongyang Shao, Junhao Chen, Ye Wang in Data Science (2022)

  14. No Access

    Chapter and Conference Paper

    fASLR: Function-Based ASLR for Resource-Constrained IoT Systems

    The address space layout randomization (ASLR) has been widely deployed on modern operating systems against code reuse attacks (CRAs) such as return-oriented programming (ROP) and return-to-libc. However, porti...

    **nhui Shao, Lan Luo, Zhen Ling, Huaiyu Yan, Yumeng Wei in Computer Security – ESORICS 2022 (2022)

  15. No Access

    Chapter and Conference Paper

    Efficient Dual-Process Cognitive Recommender Balancing Accuracy and Diversity

    In this paper, we propose a dual-process cognitive recommendation system for sequential recommendations. The framework includes an intuitive representation module (System 1) and an inference module (System 2)....

    Yixu Gao, Kun Shao, Zhijian Duan, Zhongyu Wei in Database Systems for Advanced Applications (2022)

  16. No Access

    Chapter and Conference Paper

    A Survey of Face Image Inpainting Based on Deep Learning

    In recent years, deep learning has become the mainstream method of image inpainting. It can not only repair the texture of the image, obtain high-level abstract features of the image, but also recover semantic...

    Shiqi Su, Miao Yang, Libo He, **aofeng Shao, Yuxuan Zuo, Zhen** Qiang in Cloud Computing (2022)

  17. No Access

    Chapter and Conference Paper

    Multi-task Lung Nodule Detection in Chest Radiographs with a Dual Head Network

    Lung nodules can be an alarming precursor to potential lung cancer. Missed nodule detections during chest radiograph analysis remains a common challenge among thoracic radiologists. In this work, we present a ...

    Chen-Han Tsai, Yu-Shao Peng in Medical Image Computing and Computer Assis… (2022)

  18. No Access

    Chapter and Conference Paper

    Rethinking Clustering-Based Pseudo-Labeling for Unsupervised Meta-Learning

    The pioneering method for unsupervised meta-learning, CACTUs, is a clustering-based approach with pseudo-labeling. This approach is model-agnostic and can be combined with supervised algorithms to learn from u...

    ** Dong, Jianbing Shen, Ling Shao in Computer Vision – ECCV 2022 (2022)

  19. No Access

    Chapter and Conference Paper

    PalGAN: Image Colorization with Palette Generative Adversarial Networks

    Multimodal ambiguity and color bleeding remain challenging in colorization. To tackle these problems, we propose a new GAN-based colorization approach PalGAN, integrated with palette estimation and chromatic a...

    Yi Wang, Menghan **a, Lu Qi, **g Shao, Yu Qiao in Computer Vision – ECCV 2022 (2022)

  20. No Access

    Chapter and Conference Paper

    Efficient Spatio-Temporal Network with Gated Fusion for Video Super-Resolution

    Video super-resolution (VSR) has drawn much attention in research community recently. As the typical three-dimensional (3D) signals, how to exploit spatio-temporal features in videos effectively and efficientl...

    Changyu Li, Dongyang Zhang, Ning **e in Artificial Neural Networks and Machine Lea… (2021)

previous disabled Page of 16