Skip to main content

previous disabled Page of 5
and
  1. No Access

    Article

    Recognition of score words in freestyle kayaking using improved DTW matching

    Voice is the most natural information carrier for human beings, and is likely to become the main method of human–computer interaction in the future. This article focuses on the recognition of score words in fr...

    Qiyuan Zhang, **aochen Yuan, Chan-Tong Lam in Multimedia Tools and Applications (2024)

  2. No Access

    Article

    Driver fatigue detection and human-machine cooperative decision-making for road scenarios

    Driver fatigue detection and human-machine cooperative decision-making are key issues in intelligent transportation systems. The proposed method consists of two main stages.In the first stage, we propose an im...

    Anna Li, **nnan Ma, Jiaxin Guo, **gyue Zhang in Multimedia Tools and Applications (2024)

  3. No Access

    Article

    Relaxed support vector based dictionary learning for image classification

    Discriminative dictionary learning (DDL) has attracted significant attention in the field of image classification. To enhance the classification performance, most existing discriminative dictionary learning me...

    Jianqiang Song, Zuozhi Liu, Chaochen **e, Chao Lu in Multimedia Tools and Applications (2024)

  4. No Access

    Chapter and Conference Paper

    Automatic Search of Linear Structure: Applications to Keccak and Ascon

    The linear structure technique was developed by Guo et al. at ASIACRYPT 2016, notably boosting the preimage attacks on Keccak. This technique transforming the preimage attack into solving algebraic systems allows...

    Huina Li, Guozhen Liu, Haochen Zhang, Peng Tang in Information Security and Cryptology (2024)

  5. No Access

    Chapter and Conference Paper

    Spatial Feature Regularization and Label Decoupling Based Cross-Subject Motor Imagery EEG Decoding

    Motor imagery (MI) serves as a vital approach to constructing brain-computer interfaces (BCIs) based on electroencephalogram (EEG) signals. However, the time-variant and label-coupling characteristics of EEG s...

    Yifan Zhou, Tian-jian Luo, **aochen Zhang in Pattern Recognition and Computer Vision (2024)

  6. No Access

    Chapter and Conference Paper

    An Erase Code Based Collaborative Storage Method in RFID Systems

    Ensuring the safe and reliable storage of important data under limited storage resources is an important challenge faced by RFID systems. Cooperative storage technology based on network coding can divide the t...

    Feng Lin, Yu Liu, Yunke Yang, Bin Peng, Xuemei Cui in Data Science and Information Security (2024)

  7. No Access

    Chapter and Conference Paper

    Efficient Point-Based Single Scale 3D Object Detection from Traffic Scenes

    In the field of 3D object detection, the point-based method faces significant limitations due to the need to process large-scale collections of irregular point clouds, resulting in reduced inference speed. To ...

    Wenneng Tang, Yaochen Li, Yifan Li, Bo Dong in Pattern Recognition and Computer Vision (2024)

  8. No Access

    Chapter and Conference Paper

    A PUF Based Audio Fingerprint Based for Device Authentication and Tamper Location

    As bioinformation authentication gains prominence, the significance of audio data in industries such as speech recognition intensifies, with audio storage becoming a pivotal concern for data protection. Existi...

    Zhi Lu, Haochen Dou, Songfeng Lu, Xueming Tang in Digital Forensics and Cyber Crime (2024)

  9. No Access

    Chapter and Conference Paper

    3RE-Net: Joint Loss-REcovery and Super-REsolution Neural Network for REal-Time Video

    Real-time video over the Internet suffers from packet loss and low network bandwidth. The receiving side may receive down-sampled video with damaged frames. In this work, we are motivated to enhance the qualit...

    Liming Ge, David Zhaochen Jiang, Wei Bao in AI 2023: Advances in Artificial Intelligence (2024)

  10. No Access

    Chapter and Conference Paper

    Evaluating the Security of CRYSTALS-Dilithium in the Quantum Random Oracle Model

    In the wake of recent progress on quantum computing hardware, the National Institute of Standards and Technology (NIST) is standardizing cryptographic protocols that are resistant to attacks by quantum adversa...

    Kelsey A. Jackson, Carl A. Miller, Daochen Wang in Advances in Cryptology – EUROCRYPT 2024 (2024)

  11. No Access

    Article

    Faster-FIIS-GMS: a novel object detection framework for instance search

    Visual sensors are widely deployed in many promising detection fields, such as precision measurement, visual object detection and search. Instance search is a special object search method based on visual senso...

    **aochen Liu, Tao Zhang, Chong Shen in Multimedia Tools and Applications (2023)

  12. No Access

    Article

    Zero-reference single underwater image enhancement

    Underwater images play an essential role in acquiring and analyzing underwater information. Autonomous Underwater Vehicles (AUVs) highly rely on the quality of the captured underwater images, in order to carry...

    Ai** Yang, Chaochen Wang, **bin Wang, Qian Wang in Multimedia Tools and Applications (2023)

  13. No Access

    Article

    I2I translation model based on CondConv and spectral domain realness measurement: BCS-StarGAN

    In recent years, the research on the Image-to-Image(I2I) translation based on Generative Adversarial Networks has received extensive attention from both industry and academia, and relevant research results hav...

    Yuqiang Li, **nyi Shangguan, Chun Liu, Haochen Meng in Multimedia Systems (2023)

  14. No Access

    Article

    Reversible multi-watermarking for color images with grayscale invariance

    As a special way of hiding information, reversible data hiding is mostly used to embed data into digital multimedia. The original multimedia and embedded data can be restored from the watermarked one without a...

    Ying Sun, **aochen Yuan, **ngrun Wang, Jianqing Li in Multimedia Tools and Applications (2023)

  15. No Access

    Article

    Feature constraint reinforcement based age estimation

    As one of the critical biological characteristics of human age, the face has been widely studied for age prediction, which has broad application prospects in the fields of commerce, security, entertainment, et...

    Gan Chen, Junjie Peng, Lu Wang, Haochen Yuan in Multimedia Tools and Applications (2023)

  16. No Access

    Article

    Effective low-light image enhancement with multiscale and context learning network

    Convolutional Neural Network (CNN) has been widely used in low-light image enhancement task, and has achieved good enhancement results. However, the enhancement results not only are limited by the convolution ...

    Qiao Li, Bin Jiang, **aochen Bo, Chao Yang, Xu Wu in Multimedia Tools and Applications (2023)

  17. No Access

    Article

    Towards a multimodal human activity dataset for healthcare

    Human activity recognition (HAR) based on wearable devices has become a hot topic due to the wide adoption of smartphones and smart bands. In this paper, we propose a new dataset, MMC-PCL-Activity, for wearabl...

    Menghao Hu, Mingxuan Luo, Menghua Huang, Wenhua Meng, Baochen **ong in Multimedia Systems (2023)

  18. No Access

    Chapter and Conference Paper

    Design of Financial Modeling System Based on Decision Tree Analysis

    The design of financial modeling system is based on decision tree analysis. The main objective of this analysis is to determine the best portfolio of investors and choose the best investment strategy. The proc...

    Shihui Du, **aochen Guo in Innovative Computing Vol 2 - Emerging Topics in Future Internet (2023)

  19. No Access

    Chapter

    Incentivizing Platform-Users with Win-Win Effects

    To ensure the effectiveness of crowdsensing, it is of vital importance to incentivize the interactions of participants and platforms. However, existing approaches are incapable of personalized bidding (PB), i.e.,...

    Chaocan **ang, Panlong Yang, Fu **ao in Multi-dimensional Urban Sensing Using Crow… (2023)

  20. No Access

    Chapter

    Data Transmission Empowered by Edge Computing

    Intelligent Transportation Systems (ITSs) have been applied in a wide range to provide traffic sensing data for various smart traffic applications. However, the missing data, which is inevitable and ubiquitous...

    Chaocan **ang, Panlong Yang, Fu **ao in Multi-dimensional Urban Sensing Using Crow… (2023)

previous disabled Page of 5