Skip to main content

previous disabled Page of 18
and
  1. No Access

    Article

    Research on variational optical flow method for rockfall monitoring

    Rockfall is a global mountain disaster problem, which has the characteristics of wide distribution, strong randomness, and inconspicuousness. The contacted monitoring method is difficult to deploy. Simultaneou...

    Hui Chen, Lu Zhang, Ying Zhang, Juan Liu in Signal, Image and Video Processing (2024)

  2. No Access

    Article

    An improved SMOTE based on center offset factor and synthesis strategy for imbalanced data classification

    It is an enormous challenge for imbalanced data learning in the field of machine learning. To construct balanced datasets, oversampling techniques have been studied extensively. However, many oversampling meth...

    Ying Zhang, Li Deng, Hefeng Huang, Bo Wei in The Journal of Supercomputing (2024)

  3. No Access

    Article

    Multi-representation web service recommendation system based on attention mechanism

    Recently, mashup developers seek to integrate multiple services with complementary functionalities from a large amount of web services. With so many available web services, it is difficult for developers to ch...

    Depeng Dang, Bilin Guo, Tingting Fang, Ying Zhang in Knowledge and Information Systems (2024)

  4. No Access

    Article

    Efficient algorithms for reachability and path queries on temporal bipartite graphs

    Bipartite graphs are naturally used to model relationships between two types of entities, such as people-location, user-post, and investor-stock. When modeling real-world applications like disease outbreaks, e...

    Kai Wang, Minghao Cai, **aoshuang Chen, Xuemin Lin, Wenjie Zhang in The VLDB Journal (2024)

  5. Article

    Open Access

    Short-term multi-step-ahead sector-based traffic flow prediction based on the attention-enhanced graph convolutional LSTM network (AGC-LSTM)

    Accurate sector-based air traffic flow predictions are essential for ensuring the safety and efficiency of the air traffic management (ATM) system. However, due to the inherent spatial and temporal dependencie...

    Ying Zhang, Shimin Xu, Linghui Zhang, Weiwei Jiang in Neural Computing and Applications (2024)

  6. No Access

    Article

    A lightweight early forest fire and smoke detection method

    Forest fire is natural disasters that are sudden, destructive and difficult to handle and rescue, with millions of hectares of forests burned every year all over the world, causing serious ecological damage, l...

    Yinsheng Chen, Jiahao Li, Kun Sun, Ying Zhang in The Journal of Supercomputing (2024)

  7. No Access

    Article

    Label-constrained shortest path query processing on road networks

    Computing the shortest path between two vertices is a fundamental problem in road networks. Most of the existing works assume that the edges in the road networks have no labels, but in many real applications, ...

    Junhua Zhang, Long Yuan, Wentao Li, Lu Qin, Ying Zhang, Wenjie Zhang in The VLDB Journal (2024)

  8. No Access

    Article

    Identification of human microRNA-disease association via low-rank approximation-based link propagation and multiple kernel learning

    Numerous studies have demonstrated that human microRNAs (miRNAs) and diseases are associated and studies on the microRNA-disease association (MDA) have been conducted. We developed a model using a low-rank app...

    Yizheng Wang, **n Zhang, Ying Ju, Qing Liu, Quan Zou in Frontiers of Computer Science (2024)

  9. No Access

    Article

    Rumor blocking with pertinence set in large graphs

    Online social networks facilitate the spread of information, while rumors can also propagate widely and fast, which may mislead some users. Therefore, suppressing the spread of rumors has become a daunting tas...

    Fangsong **ang, **ghao Wang, Yan** Wu, **aoyang Wang, Chen Chen in World Wide Web (2024)

  10. No Access

    Chapter and Conference Paper

    Efficient Maximum Relative Fair Clique Computation in Attributed Graphs

    Cohesive subgraph mining is a fundamental problem in attributed graph analysis. However, the existing models on attributed graphs ignore the fairness of attributes. In this paper, we propose a novel model, cal...

    Yufeng Zhang, Shiyuan Liu, Yan** Wu, Lu Qin in Databases Theory and Applications (2024)

  11. No Access

    Chapter and Conference Paper

    A Checklist for the Usability Evaluation of Artificial Intelligence (AI) mHealth Applications Graphical User Interface

    The download rate of AI mobile health (mHealth) apps has increased rapidly, and there are many usability evaluation studies based on mobile apps, but few studies have been conducted on the usability of AI mHea...

    Chanjuan Tu, Alessia Russo, Ying Zhang in Design, User Experience, and Usability (2024)

  12. No Access

    Article

    Reversible data hiding in enhanced images with anti-detection capability

    Reversible data hiding (RDH) technique has been widely used for content authentication. However, most conventional RDH schemes generally concentrates on the rate-and-distortion performance (namely high capacit...

    Junxiang Wang, Ying Zhang, Lin Huang, Chuntao Wang in Multimedia Tools and Applications (2024)

  13. No Access

    Chapter and Conference Paper

    An Android Malware Detection Method Based on Optimized Feature Extraction Using Graph Convolutional Network

    With the development of the mobile Internet, mobile devices have been extensively promoted and popularized. Android, as the current popular mobile intelligent operating system, has encountered problems such as...

    Zhiqiang Wang, Zhuoyue Wang, Ying Zhang in Digital Forensics and Cyber Crime (2024)

  14. No Access

    Chapter and Conference Paper

    The Potential of Interactive Design in Children’s Picture Books and Its Impact on User Experience

    With the development of digital technology, children’s picture books are transforming traditional printing to interactive digital media, which provides new possibilities for improving children’s reading experi...

    Dongtao Liu, Ying Zhang, Yinghong Zhang in Distributed, Ambient and Pervasive Interactions (2024)

  15. No Access

    Chapter and Conference Paper

    Balanced Hop-Constrained Path Enumeration in Signed Directed Graphs

    Hop-constrained path enumeration, which aims to output all the paths from two distinct vertices within the given hops, is one of the fundamental tasks in graph analysis. Previous works about this problem mainl...

    Zhiyang Tang, **ghao Wang, Yan** Wu, **aoyang Wang in Databases Theory and Applications (2024)

  16. No Access

    Chapter and Conference Paper

    Discovering Densest Subgraph over Heterogeneous Information Networks

    Densest Subgraph Discovery (DSD) is a fundamental and challenging problem in the field of graph mining in recent years. The DSD aims to determine, given a graph G, the subgraph with the maximum density according ...

    Haozhe Yin, Kai Wang, Wenjie Zhang, Dong Wen in Databases Theory and Applications (2024)

  17. No Access

    Article

    Feature reduction of unbalanced data classification based on density clustering

    With the development of big data, the problem of imbalanced data sets is becoming more and more serious. When dealing with high-dimensional imbalanced datasets, traditional classification algorithms usually te...

    Zhen-Fei Wang, Pei-Yao Yuan, Zhong-Ya Cao, Li-Ying Zhang in Computing (2024)

  18. No Access

    Article

    Healthcare and Fitness Services: A Comprehensive Assessment of Blockchain, IoT, and Edge Computing in Smart Cities

    Edge computing, blockchain technology, and the Internet of Things have all been identified as key enablers of innovative city initiatives. A comprehensive examination of the research found that IoT, blockchain...

    Yang-Yang Liu, Ying Zhang, Yue Wu, Man Feng in Journal of Grid Computing (2023)

  19. No Access

    Article

    Hadamard Encoding Based Frequent Itemset Mining under Local Differential Privacy

    Local differential privacy (LDP) approaches to collecting sensitive information for frequent itemset mining (FIM) can reliably guarantee privacy. Most current approaches to FIM under LDP add “padding and sampl...

    Dan Zhao, Su-Yun Zhao, Hong Chen in Journal of Computer Science and Technology (2023)

  20. No Access

    Article

    Handwritten Chinese signature detection with simple Copy–Paste augmentation on power plants technical documents

    Verification and validation of signed documents holds the key to successful operation in many industries such as manufacturing and energy. In power plants, a huge amount of technical documents is accumulated o...

    Ying Zhang, Jian Zhang, Kaihong Yan in Service Oriented Computing and Applications (2023)

previous disabled Page of 18