Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Implementing Lattice-Based PQC on Resource-Constrained Processors:

    This paper studies the implementation of the lattice-based PQC on the 32-bit constrained processors that only have constrained multiplication instructions. A typical example of such constrained processors is t...

    Lu Li, Mingqiang Wang, Weijia Wang in Progress in Cryptology – INDOCRYPT 2023 (2024)

  2. Article

    Open Access

    Dynamic Context Removal: A General Training Strategy for Robust Models on Video Action Predictive Tasks

    Predicting future actions is an essential feature of intelligent systems and embodied AI. However, compared to the traditional recognition tasks, the uncertainty of the future and the reasoning ability require...

    **nyu Xu, Yong-Lu Li, Cewu Lu in International Journal of Computer Vision (2023)

  3. No Access

    Chapter and Conference Paper

    M \(^2\) HGCL: Multi-scale Meta-path Integrated Heterogeneous Graph Contrastive Learning

    Inspired by the successful application of contrastive learning on graphs, researchers attempt to impose graph contrastive learning approaches on heterogeneous information networks. Orthogonal to homogeneous gr...

    Yuanyuan Guo, Yu **a, Rui Wang, Rongcheng Duan in Advanced Data Mining and Applications (2023)

  4. Article

    Open Access

    Data news dissemination strategy for decision making using new media platform

    In big data era, data has become an important part of human lives and work. At the same time, data plays an important role in information acquisition and dissemination. At present, the influence of data journa...

    Lu Li in Soft Computing (2022)

  5. No Access

    Chapter and Conference Paper

    Small Object Detection Based on Multi-source Data Learning Fusion Network

    Small object group detection is a difficult task in the field of object detection. In recent years, with the development of sensing technology and unmanned driving, there are more and more multi-source data in...

    Huanyu Liu, Lu Li, Hejun Jiang, Yi Yang in Advances in Intelligent Information Hiding… (2022)

  6. No Access

    Chapter and Conference Paper

    Study on the Method of Adversarial Example Attack Based on MI-FGSM

    neural network outperformed human beings in many fields such as image classification [13], object detection [4, 5], and image semantic segmentation [6] in recent years. But this model has security risks; ...

    Guanqiao Mao, Lu Li, Qingyu Wang, Junbao Li in Advances in Intelligent Information Hiding… (2022)

  7. No Access

    Chapter and Conference Paper

    Automatic Generation of Distribution Network Operation Data Report and Application of Data Mining

    Electricity is the main pillar of today’s social progress, and the rapid progress of social economy has also driven the rapid growth of electricity. The scope of the power system continues to expand, the netwo...

    Zongxun Song, Dongzhao Gu, Lu Li, Li** Yu in The 2021 International Conference on Machi… (2022)

  8. No Access

    Chapter and Conference Paper

    Privacy-Preserving and Truthful Auction for Task Assignment in Outsourced Cloud Environments

    Due to high fairness and allocation efficiency, the task assignment problem of mobile applications via auctions has become a promising approach to motivate bidders to provide their mobile device resources effe...

    Xufeng Jiang, Lu Li in Wireless Algorithms, Systems, and Applications (2022)

  9. No Access

    Chapter and Conference Paper

    SLUGBOT, an Aplysia-Inspired Robotic Grasper for Studying Control

    Living systems can use a single periphery to perform a variety of tasks and adapt to a dynamic environment. This multifunctionality is achieved through the use of neural circuitry that adaptively controls the ...

    Kevin Dai, Ravesh Sukhnandan, Michael Bennington in Biomimetic and Biohybrid Systems (2022)

  10. No Access

    Chapter and Conference Paper

    Privacy-Preserving Auction for Heterogeneous Task Assignment in Mobile Device Clouds

    In the past several decades, despite the continuous improvement of mobile devices, mobile applications requiring resources are still beyond its capacity to be completed on a single device. Due to high fairness...

    Xufeng Jiang, Xuhao Pei, Dawei Tian in Wireless Algorithms, Systems, and Applications (2021)

  11. No Access

    Article

    Optimization of kernel learning algorithm based on parallel architecture

    This paper concentrates on a parallel acceleration method of optimizing Gaussian hyper-parameters with the maximum likelihood estimation. In the process of optimizing the hyper-parameters, many calculations of...

    Lu Li, **n Chen in Computing (2020)

  12. No Access

    Article

    MPI-RCDD: A Framework for MPI Runtime Communication Deadlock Detection

    The message passing interface (MPI) has become a de facto standard for programming models of high-performance computing, but its rich and flexible interface semantics makes the program easy to generate communi...

    Hong-Mei Wei, Jian Gao, Peng Qing, Kang Yu in Journal of Computer Science and Technology (2020)

  13. No Access

    Chapter and Conference Paper

    Design of Intelligent Mobile Robot Control System Based on Gesture Recognition

    At present, technologies such as smart home and intelligent wearable devices are develo**, bringing convenience and enjoyment to our daily lives, while also avoiding a series of potential hidden dangers. Thi...

    Dong Dai, Wei Zhuang, Yixian Shen, Lu Li in Artificial Intelligence and Security (2020)

  14. No Access

    Chapter and Conference Paper

    Light Pre-Trained Chinese Language Model for NLP Tasks

    We present the results of shared-task 1 held in the 2020 Conference on Natural Language Processing and Chinese Computing (NLPCC): Light Pre-Trained Chinese Language Model for NLP tasks. This shared-task examin...

    Junyi Li, Hai Hu, Xuanwei Zhang, Minglei Li in Natural Language Processing and Chinese Co… (2020)

  15. No Access

    Chapter and Conference Paper

    A Method of Communication State Monitoring for Multi-node CAN Bus Network

    Multi-node CAN bus network tended to have higher requirements for communication capability. In the multi-node CAN bus network which does not need application layer protocol of CAN bus to develop, with the incr...

    Lu Li-xin, Gu Ye, Li Gui-qin, Peter Mitrouchev in Advanced Manufacturing and Automation IX (2020)

  16. No Access

    Chapter and Conference Paper

    Efficient Privacy-Preserving Skyline Queries over Outsourced Cloud

    In the cloud computing paradigm, data owners could outsource their databases to the service provider, and thus reap huge benefits from releasing the heavy storage and management tasks to the cloud server. Howe...

    Lu Li, Xufeng Jiang, Fei Zhu, An Liu in Web Information Systems Engineering (2020)

  17. No Access

    Article

    Boost particle swarm optimization with fitness estimation

    It is well known that the classical particle swarm optimization (PSO) is time-consuming when used to solve complex fitness optimization problems. In this study, we perform in-depth research on fitness estimati...

    Lu Li, Yanchun Liang, Tingting Li, Chunguo Wu, Guozhong Zhao in Natural Computing (2019)

  18. No Access

    Chapter and Conference Paper

    Parallel MOEA/D for Real-Time Multi-objective Optimization Problems

    There are a large number of multi-objective optimization problems in real-world applications, like in games, that need to be solved in real time. In order to meet this pressing need, we suggests a method of pa...

    Jusheng Yu, Lu Li, YuTao Qi in E-Learning and Games (2019)

  19. Chapter and Conference Paper

    Research on Knowledge Discovery in Database of Traffic Flow State Based on Attribute Reduction

    Recognizing and diagnosing the state of traffic flow is an important research area, which is the basis of improving the level of traffic management and the quality of traffic information services. However, due...

    Jia-lin Wang, **ao-lu Li, Li Wang, ** Zhang in Computational Science – ICCS 2019 (2019)

  20. Chapter and Conference Paper

    Data Fault Identification and Repair Method of Traffic Detector

    The quality control and evaluation of traffic detector data are a prerequisite for subsequent applications. Considering that the PCA method is not ideal when detecting fault information with time-varying and ...

    **ao-lu Li, Jia-xu Chen, **n-ming Yu, ** Zhang in Computational Science – ICCS 2018 (2018)

previous disabled Page of 3