Skip to main content

and
  1. No Access

    Book

  2. No Access

    Chapter

    Friending

    The friending is a popular and important operation in online social networks. In this article, we discuss various optimization problems about friending. They can be formulated into nonlinear combinatorial opti...

    Shuyang Gu, Hongwei Du, My T. Thai, Ding-Zhu Du in Nonlinear Combinatorial Optimization (2019)

  3. No Access

    Book

  4. No Access

    Chapter

    Nonsubmodular Optimization

    The nonsubmodular optimization is a hot research topic in the study of nonlinear combinatorial optimizations. We discuss several approaches to deal with such optimization problems, including supermodular degre...

    Weili Wu, Zhao Zhang, Ding-Zhu Du in Nonlinear Combinatorial Optimization (2019)

  5. No Access

    Chapter

    Multi-Document Extractive Summarization as a Non-linear Combinatorial Optimization Problem

    Multi-document summarization deals with finding the core theme presented in multiple documents. This can be done by selecting the important information from the text in the multiple documents. Extractive summa...

    Meghana N. Satpute, Luobing Dong, Weili Wu in Nonlinear Combinatorial Optimization (2019)

  6. No Access

    Chapter

    Solving Combinatorial Problems with Machine Learning Methods

    With the development of machine learning in various fields, it can also be applied to combinatorial optimization problems, automatically discovering generic and fast heuristic algorithms based on training data...

    Tiande Guo, Congying Han, Siqi Tang, Man Ding in Nonlinear Combinatorial Optimization (2019)

  7. No Access

    Chapter and Conference Paper

    Adversarial Attacks on Deep Learning Models of Computer Vision: A Survey

    Deep learning plays a significant role in academic and commercial fields. However, deep neural networks are vulnerable to adversarial attacks, which limits its applications in safety-critical areas, such as auton...

    Jia Ding, Zhiwu Xu in Algorithms and Architectures for Parallel Processing (2020)

  8. No Access

    Chapter and Conference Paper

    Understanding Privacy-Preserving Techniques in Digital Cryptocurrencies

    Asset security and transaction efficiency have always been concerned, so that digital cryptocurrencies based on blockchain are increasingly favored. In the transaction, it is necessary to effectively protect p...

    Yue Zhang, Keke Gai, Meikang Qiu, Kai Ding in Algorithms and Architectures for Parallel … (2020)