Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Pairwise Negative Sample Mining for Human-Object Interaction Detection

    In recent years, Human-Object Interaction (HOI) detection has been riding the wave of the development of object detectors. Typically, one-stage methods exploit them by instantiating HOI and detecting them in a...

    Weizhe Jia, Shiwei Ma in Pattern Recognition and Computer Vision (2024)

  2. No Access

    Chapter and Conference Paper

    Accelerating BGV Bootstrap** for Large p Using Null Polynomials over  \(\mathbb {Z}_{p^e}\)

    The BGV scheme is one of the most popular FHE schemes for computing homomorphic integer arithmetic. The bootstrap** technique of BGV is necessary to evaluate arbitrarily deep circuits homomorphically. Howeve...

    Shihe Ma, Tairong Huang, Anyu Wang, **aoyun Wang in Advances in Cryptology – EUROCRYPT 2024 (2024)

  3. No Access

    Chapter and Conference Paper

    Medical Image Feature Extraction and Registration Algorithm Based on PCA

    In order to improve the accuracy and speed of medical image registration, a PCA based medical image feature extraction and registration algorithm is proposed. Firstly, the original image is trained and the sam...

    Shihao Ma, An in Innovative Computing (2022)

  4. No Access

    Chapter and Conference Paper

    A Privacy-Preserving Lightweight Energy Data Sharing Scheme Based on Blockchain for Smart Grid

    As many users join the smart grid system, energy companies need user energy data to manage and improve energy delivery. However, while enjoying the services provided by energy companies, the energy data submit...

    **nyang Li, Yujue Wang, Yong Ding, Shiye Ma in Collaborative Computing: Networking, Appli… (2022)

  5. No Access

    Chapter and Conference Paper

    LQR Optimal Control Method Based on Two-Degree-of Freedom Manipulator

    The robotic arm is a very complex multi-input, multi-output nonlinear system, and it needs to have high trajectory tracking accuracy. In this paper, a mathematical modeling and optimal trajectory tracking cont...

    Taotao Song, Yan** Li, Shifeng Ma in Neural Computing for Advanced Applications (2022)

  6. No Access

    Chapter and Conference Paper

    Temperature Prediction of Medium Frequency Furnace Based on Transformer Model

    Aiming at the difficulty of continuous measurement of charge temperature in intermediate frequency furnace smelting process, this paper proposes a method of continuous measurement of charge temperature in inte...

    Shifeng Ma, Yan** Li, Dongyue Luo in Neural Computing for Advanced Applications (2022)

  7. No Access

    Chapter and Conference Paper

    An Adaptive Low Illumination Color Image Enhancement Method Using Dragonfly Algorithm

    In order to improve the visual perception of color images under low illumination conditions, an adaptive enhancement method is proposed to enhance the contrast and brightness, enrich the color and avoid over-e...

    Jiang Liu, Shiwei Ma in Methods and Applications for Modeling and … (2022)

  8. No Access

    Chapter and Conference Paper

    SemFlow: Accurate Semantic Identification from Low-Level System Data

    Forensic analysis, nowadays, is a crucial part of attack investigation in end-user and enterprise systems. Log collection and analysis enable investigators to rebuild the attack chain, find the attack source a...

    Mohammad Kavousi, Runqing Yang, Shiqing Ma in Security and Privacy in Communication Netw… (2021)

  9. No Access

    Chapter and Conference Paper

    UDC 2020 Challenge on Image Restoration of Under-Display Camera: Methods and Results

    This paper is the report of the first Under-Display Camera (UDC) image restoration challenge in conjunction with the RLQ workshop at ECCV 2020. The challenge is based on a newly-collected database of Under-Dis...

    Yuqian Zhou, Michael Kwan, Kyle Tolentino in Computer Vision – ECCV 2020 Workshops (2020)

  10. Chapter and Conference Paper

    A Robust Multi-terminal Support Method Based on Tele-Immersion Multimedia Technology

    In this paper, a multi terminal support method based on tele-immersion multimedia technology is proposed. This method provides two functions of synchronous request and asynchronous request, and it can dynamic...

    Ronghe Wang, Bo Zhang, Haiyong **e, Dong Jiao, Shilong Ma in Cloud Computing – CLOUD 2019 (2019)

  11. No Access

    Chapter and Conference Paper

    An Approach to Propose Optimal Energy Storage System in Real-Time Electricity Pricing Environments

    Based on the fact that the penetration of renewable energies is increasing dramatically, almost all the energy markets have changed and taken action to present the strategy of real-time pricing over the last d...

    Shiqian Ma, Tianchun **ang, Yue Wang in Advances in Green Energy Systems and Smart… (2018)

  12. No Access

    Chapter and Conference Paper

    A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware

    Provenance of system subjects (e.g., processes) and objects (e.g., files) are very useful for many forensics tasks. In our analysis and comparison of existing Linux provenance tracing systems, we found that mo...

    Chonghua Wang, Shiqing Ma, **angyu Zhang in Security and Privacy in Communication Netw… (2018)

  13. No Access

    Chapter and Conference Paper

    Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter

    As a new generation voice service, Voice over LTE (VoLTE) has attracted worldwide attentions in both the academia and industry. Different from the traditional voice call based on circuit-switched (CS), VoLTE e...

    Mingli Wu, Na Ruan, Shiheng Ma, Hao** Zhu in Wireless Algorithms, Systems, and Applicat… (2017)

  14. No Access

    Chapter and Conference Paper

    A Sharing-Memory Based Ring Framework

    A single-ring may become performance bottleneck for multi-consumer and multi-producer. Although multi-ring can solve above problems by allocating one ring for each task, it may decrease resource utilization. T...

    Shicong Ma, Baosheng Wang, **anming Gao in Algorithms and Architectures for Parallel … (2015)

  15. No Access

    Chapter and Conference Paper

    Evaluation and Analysis of Three Typical Resource Allocation Algorithms in Virtual Router Platform

    Virtual router is regarded as one of key platforms for the deployment and application of network virtualization technology, which can run multiple router instances in parallel and in independent. However, due ...

    **anming Gao, Baosheng Wang, **aozhe Zhang in Algorithms and Architectures for Parallel … (2015)

  16. No Access

    Chapter and Conference Paper

    An Evolving Architecture for Network Virtualization

    Network virtualization realizes new possibilities for the evolution way to future network by allowing multiple virtual networks over a shared physical infrastructure. In this paper, we discuss the shortcoming ...

    Shicong Ma, Baosheng Wang, **aozhe Zhang in Testbeds and Research Infrastructure: Deve… (2014)

  17. No Access

    Chapter and Conference Paper

    A Capability-Based Matchmaking Mechanism Supporting Resource Aggregation within Large-Scale Distributed Computing Infrastructures

    Facing the large-scale, heterogeneous dynamic resource and the complex constraints of computation-intensive parallel scientific applications, collaborating large-scale computation resource for these applicatio...

    Feng Liang, Hai Liu, Yunzhen Liu, Shilong Ma, Siyao Zheng, Pan Deng in Cloud Computing (2014)

  18. No Access

    Chapter and Conference Paper

    Research on an Adaptive Routing Mechanism of Combination of Packet Forward with Virtual Circuit

    Virtual circuit transmission mechanism as represented by MPLS has the characteristics of low forwarding overhead and short transmission delay. In contrast, the traditional packet forward mechanism is more flex...

    **anming Gao, **aozhe Zhang, Zexin Lu in Internet and Distributed Computing Systems (2013)

  19. No Access

    Chapter and Conference Paper

    An Improved DES Anti-DPA Algorithm and Its Automatic Simulation System

    Based on the analysis of DES cryptographic algorithms and anti-attack strategy, this paper proposes an advanced DES anti-DPA attack algorithm by further improving the Mask method in the power consumption point...

    **g**g Liu, Shiwei Ma, Guanghua Chen in System Simulation and Scientific Computing (2012)

  20. No Access

    Chapter and Conference Paper

    An Adaptive Slope Compensation Circuit and Its Application

    To solve the over-compensation problem in the current mode PWM switch power, a new adaptive slope compensation circuit is proposed in this paper. In the circuit, the difference between the output and input vol...

    Guanghua Chen, Fengjiao Wang, Changqian Wu in System Simulation and Scientific Computing (2012)

previous disabled Page of 2