Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Btda: basis transformation based distribution alignment for imbalanced semi-supervised learning

    Semi-supervised learning (SSL) employs unlabeled data with limited labeled samples to enhance deep networks, but imbalance degrades performance due to biased pseudo-labels skewing decision boundaries. To addre...

    **huang Ye, **aozhi Gao, Zuoyong Li in International Journal of Machine Learning … (2024)

  2. No Access

    Chapter and Conference Paper

    Rethinking Distribution Alignment for Inter-class Fairness

    Semi-supervised learning (SSL) is a successful paradigm that can use unlabelled data to alleviate the labelling cost problem in supervised learning. However, the excellent performance brought by SSL does not t...

    **huang Ye, Jiawei Wu, Zuoyong Li in Artificial Intelligence Security and Priva… (2024)

  3. No Access

    Chapter and Conference Paper

    A Privacy-Preserving Face Recognition Scheme Combining Homomorphic Encryption and Parallel Computing

    Face recognition technology is widely used in various fields, such as law enforcement, payment systems, transportation, and access control. Traditional face authentication systems typically establish a facial ...

    Gong Wang, **anghan Zheng, Ling**g Zeng in Artificial Intelligence Security and Priva… (2024)

  4. No Access

    Chapter and Conference Paper

    Ethereum Public Opinion Analysis Based on Attention Mechanism

    With the rapid development of Ethereum, vast amounts of data are recorded on the blockchain through transactions, encompassing diverse and extensive textual information. While Long Short-Term Memory (LSTM) mod...

    **anghan Zheng, Wenyan Zhang, Jianxian Zhang in Cognitive Computing – ICCC 2023 (2024)

  5. Article

    Open Access

    Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems

    The combination of unmanned aerial vehicles (UAVs) and mobile edge computing (MEC) technology breaks through the limitations of traditional terrestrial communications. The effective line-of-sight channel provi...

    Zheyi Chen, Hongqiang Zheng, Jianshan Zhang in Peer-to-Peer Networking and Applications (2022)

  6. No Access

    Article

    Retinal image quality assessment for diabetic retinopathy screening: A survey

    Retinal image quality assessment (RIQA) is one of the key components in screening for diabetic retinopathy (DR). As one of the most serious complications of diabetes, DR has become a leading cause of blindness...

    Jiawen Lin, Lun Yu, Qian Weng, **anghan Zheng in Multimedia Tools and Applications (2020)

  7. No Access

    Article

    Multimedia access control with secure provenance in fog-cloud computing networks

    Multimedia data, ranging from text, audio, video to animation, undergoes intellectual property protection or has high sensitivity. To deal with privacy leakage during multimedia sharing and dissemination, it i...

    Yang Yang, **meng Liu, Wenzhong Guo, **anghan Zheng in Multimedia Tools and Applications (2020)

  8. No Access

    Article

    Clustering based interest prediction in social networks

    Efficient interest prediction for social networks is critical for both users and service providers for behavior analysis and a series of extension services. However, most existing approaches are inefficient, i...

    **anghan Zheng, Wenfei Zheng, Yang Yang, Wenzhong Guo in Multimedia Tools and Applications (2019)

  9. No Access

    Chapter and Conference Paper

    Multi-modal Feature Fusion Based on Variational Autoencoder for Visual Question Answering

    Visual Question Answering (VQA) tasks must provide correct answers to the questions posed by given images. Such requirement has been a wide concern since this task was presented. VQA consists of four steps: im...

    Liqing Chen, Yifan Zhuo, Yingjie Wu, Yilei Wang in Pattern Recognition and Computer Vision (2019)

  10. No Access

    Article

    An efficient cascaded method for network intrusion detection based on extreme learning machines

    Machine learning techniques are widely used for network intrusion detection (NID). However, it has to face the unbalance of training samples between classes as it is hard to collect samples of some intrusion c...

    Yuanlong Yu, Zhifan Ye, **anghan Zheng, Chunming Rong in The Journal of Supercomputing (2018)

  11. Article

    Open Access

    Efficient pairing-free PRE schemes for multimedia data sharing in IoT

    Nowadays, Internet of things (IoT) become more and more popular. At the same time, the requirements of security mechanism for multimedia in IoT received a huge concern. Multimedia data is easily shared by devi...

    **ng Hu, Chunming Tang, Duncan S. Wong, **anghan Zheng in Multimedia Tools and Applications (2018)

  12. No Access

    Article

    Deep learning based feature representation for automated skin histopathological image annotation

    Automated annotation of skin biopsy histopathological images provides valuable information and supports for diagnosis, especially for the discrimination between malignant and benign lesions. Currently, compute...

    Gang Zhang, Ching-Hsien Robert Hsu, Huadong Lai in Multimedia Tools and Applications (2018)

  13. No Access

    Article

    Lattice assumption based fuzzy information retrieval scheme support multi-user for secure multimedia cloud

    Multimedia cloud is novel computation paradigm which could leverage cloud infrastructure to store large quantity of multimedia documents and respond on the requests from customers. With the development of mult...

    Yang Yang, **anghan Zheng, Victor Chang, Shaozhen Ye in Multimedia Tools and Applications (2018)

  14. Article

    Open Access

    Framework for context-aware computation offloading in mobile cloud computing

    Computation offloading is a promising way to improve the performance as well as reducing the battery power consumption of a mobile application by executing some parts of the application on a remote server. Rec...

    **ng Chen, Shihong Chen, Xuee Zeng, **anghan Zheng in Journal of Cloud Computing (2017)

  15. No Access

    Article

    ELM-based spammer detection in social networks

    Online social networks, such as Facebook, Twitter, and Weibo have played an important role in people’s common life. Most existing social network platforms, however, face the challenges of dealing with undesira...

    **anghan Zheng, Xueying Zhang, Yuanlong Yu, Tahar Kechadi in The Journal of Supercomputing (2016)

  16. Article

    Open Access

    Distributed multi-hop clustering algorithm for VANETs based on neighborhood follow

    Vehicular ad hoc networks (VANETs) have become important components of metropolitan area networks, and clustering for VANETS provides many advantages. However, the stability of current clustering algorithms exhib...

    Yuzhong Chen, Mingyue Fang, Song Shi in EURASIP Journal on Wireless Communications… (2015)

  17. No Access

    Book and Conference Proceedings

    Multi-disciplinary Trends in Artificial Intelligence

    9th International Workshop, MIWAI 2015, Fuzhou, China, November 13-15, 2015, Proceedings

    Antonis Bikakis, **anghan Zheng in Lecture Notes in Computer Science (2015)

  18. No Access

    Book and Conference Proceedings

    Cloud Computing and Big Data

    Second International Conference, CloudCom-Asia 2015, Huangshan, China, June 17-19, 2015, Revised Selected Papers

    Weizhong Qiang, **anghan Zheng in Lecture Notes in Computer Science (2015)

  19. No Access

    Chapter and Conference Paper

    A System Architecture for Smart Health Services and Applications

    Given the increasing social needs for high-quality health and medical services at a low cost, smart health has gained significant attention as the leader in achieving national happiness and next-generation gro...

    Jiangyong Chen, **anghan Zheng in Multi-disciplinary Trends in Artificial Intelligence (2015)

  20. No Access

    Chapter and Conference Paper

    An Architecture-Based Autonomous Engine for Services Configuration and Deployment in Hybrid Clouds

    As cloud computing offers scalability, extensibility, elasticity, flexibility and cost savings to the customers of cloud service providers, there is a growing trend towards migrating services to the cloud. Hyb...

    Yan** Liu, **ngTu Lan, **ng Chen, **n Feng in Cloud Computing and Big Data (2015)

previous disabled Page of 2