Skip to main content

previous disabled Page of 4
and
  1. No Access

    Article

    Transferable universal adversarial perturbations against speaker recognition systems

    Deep neural networks (DNN) exhibit powerful feature extraction capabilities, making them highly advantageous in numerous tasks. DNN-based techniques have become widely adopted in the field of speaker recogniti...

    **aochen Liu, Hao Tan, Junjian Zhang, Ai** Li, Zhaoquan Gu in World Wide Web (2024)

  2. No Access

    Article

    Network structure optimization for social networks by minimizing the average path length

    Network structure plays an important role in the natural and social sciences. Optimization of network structure in achieving specified goals has been a major research focus. In this paper, we focus on structur...

    Wei Du, Gang Li, **aochen He in Computing (2022)

  3. Article

    Open Access

    CrowdMed-II: a blockchain-based framework for efficient consent management in health data sharing

    The healthcare industry faces serious problems with health data. Firstly, health data is fragmented and its quality needs to be improved. Data fragmentation means that it is difficult to integrate the patient ...

    Chaochen Hu, Chao Li, Guigang Zhang, Zhiwei Lei, Mira Shah, Yong Zhang in World Wide Web (2022)

  4. No Access

    Chapter and Conference Paper

    3D Visualization Supporting Situational Awareness of Model-Based System of Systems

    Model-based System of Systems Engineering (MBSoSE) enables to improve the efficiency of the architecture design, and the performance analysis and modeling of highly complex system of systems (SoS). Introducing...

    Yuqian Cao, Boyu **e, Jian Wang, **aochen Zheng in Knowledge and Systems Sciences (2022)

  5. No Access

    Chapter and Conference Paper

    Facial Action Unit Detection by Exploring the Weak Relationships Between AU Labels

    In recent years, facial action unit (AU) detection attracts more and more attentions and great progress has been made. However, few approaches solve AU detection problem by applying the emotion information, an...

    Mengke Tian, Hengliang Zhu, Yong Wang in Collaborative Computing: Networking, Appli… (2022)

  6. No Access

    Chapter and Conference Paper

    Semantic Modeling Supporting Discrete Event Simulation for Aircraft Assembly Process

    Aircraft assembly is a complex process associated with different stakeholders, which strongly impacts the R&D cost for the entire aircraft lifecycle management. Traditional aircraft assembly process is designe...

    **aodu Hu, **zhi Lu, **aochen Zheng, Rebeca Arista in Knowledge and Systems Sciences (2022)

  7. No Access

    Article

    Implications of the Delphi method in the evaluation of sustainability open education resource repositories

    To better understand the sustainable development of open educational resources (OER), this paper aimed to break through the original ‘fixed’, highly structured evaluation system and develop an open and flexibl...

    **aochen Wang, Tingting Chen, Yihan Zhang in Education and Information Technologies (2021)

  8. Article

    Open Access

    Suffix-based double reader tag movement RFID anti-collision method

    At present, some existing tag anti-collision algorithms are used mostly in scenarios of fixed number of tags and they perform poorly in tag moving scenarios. Therefore, this paper proposes a double reader tag ...

    Haochen Lv, **aowu Li, Lianyin Jia, Runxin Li, Jiaman Ding in Journal of Cloud Computing (2021)

  9. No Access

    Chapter and Conference Paper

    PatentMiner: Patent Vacancy Mining via Context-Enhanced and Knowledge-Guided Graph Attention

    Although there are a small number of work to conduct patent research by building knowledge graph, but without constructing patent knowledge graph using patent documents and combining latest natural language pr...

    Gaochen Wu, Bin Xu, Yuxin Qin, Fei Kong in Knowledge Graph and Semantic Computing: Kn… (2021)

  10. No Access

    Chapter and Conference Paper

    Optimization Strategies for In-Store Order Picking in Omnichannel Retailing

    The COVID-19 pandemic is changing consumer behavior and accelerating the interest for online grocery purchases. Hence, traditional brick-and-mortar retailers are develo** omnichannel solutions enabling onlin...

    **aochen Chou, Nicola Ognibene Pietri in Advances in Production Management Systems.… (2021)

  11. No Access

    Chapter and Conference Paper

    Outlier Detection for Sensor Data Streams Based on Maximum Frequent and Minimum Rare Patterns

    Identifying outliers in data is an essential assignment in data mining. It aims to find the data that is significantly different from other data in the data streams, and scholars have proposed many outlier det...

    **aochen Shi, Saihua Cai, Ruizhi Sun in Computer Supported Cooperative Work and So… (2021)

  12. No Access

    Chapter and Conference Paper

    Supporting Digital Twin Integration Using Semantic Modeling and High-Level Architecture

    Digital twin (DT) provides a solution for supporting the interconnection between the physical world and the virtual world. When implementing DT integration, it is challenging to implement interface definition,...

    Han Li, **zhi Lu, **aochen Zheng in Advances in Production Management Systems.… (2021)

  13. No Access

    Chapter and Conference Paper

    Multi-step Coding Structure of Spatial Audio Object Coding

    The spatial audio object coding (SAOC) is an effective meth-od which compresses multiple audio objects and provides flexibility for personalized rendering in interactive services. It divides each frame signal ...

    Chenhao Hu, Ruimin Hu, **aochen Wang, Tingzhao Wu, Dengshi Li in MultiMedia Modeling (2020)

  14. No Access

    Chapter and Conference Paper

    Perceptual Localization of Virtual Sound Source Based on Loudspeaker Triplet

    When using a loudspeaker triplet for virtual sound localization, the traditional conversion method will result in inaccurate localization. In this paper, we constructed a perceptual localization distortion mod...

    Duanzheng Guan, Dengshi Li, Xuebei Cai, **aochen Wang, Ruimin Hu in MultiMedia Modeling (2020)

  15. No Access

    Chapter and Conference Paper

    HMM-Based Person Re-identification in Large-Scale Open Scenario

    This paper aims to tackle person re-identification (person re-ID) in large-scale open scenario, which differs from the conventional person re-ID tasks but is significant for some real suspect investigation ca...

    Dongyang Li, Ruimin Hu, Wenxin Huang, **aochen Wang, Dengshi Li in MultiMedia Modeling (2020)

  16. No Access

    Chapter and Conference Paper

    Systems Engineering Approach to Identify Requirements for Digital Twins Development

    Digital Twins (DT) are proposed in industries to support the entire lifecycle of services with different perspectives. Lack of systematic analysis of DT concepts leads to various definitions and services which...

    Ali Gharaei, **zhi Lu, Oliver Stoll in Advances in Production Management Systems.… (2020)

  17. No Access

    Chapter and Conference Paper

    HRTF Representation with Convolutional Auto-encoder

    The head-related transfer function (HRTF) can be considered as some kind of filter that describes how a sound from an arbitrary spatial direction transfers to the listener’s eardrums. HRTF can be used to synth...

    Wei Chen, Ruimin Hu, **aochen Wang, Dengshi Li in MultiMedia Modeling (2020)

  18. No Access

    Chapter and Conference Paper

    Using GMOSTNet for Tree Detection Under Complex Illumination and Morphological Occlusion

    Trees are an integral part of the forestry ecosystem. In forestry work, the precise acquisition of tree morphological parameters and attributes is affected by complex illumination and tree morphology. In order...

    Zheng Qian, Hailin Feng, Yinhui Yang, **aochen Du, Kai **a in Data Science (2020)

  19. No Access

    Chapter and Conference Paper

    A Generalized Cellular Automata Approach to Modelling Contagion and Monitoring for Emergent Events in Sensor Networks

    In order to improve the invulnerability and adaptability in sensor networks, we propose a cellular automata (CA) based propagation control mechanism (CACM) to inhibit and monitor emergent-event contagion. The ...

    Ru Huang, Hongyuan Yang, Haochen Yang in Digital TV and Wireless Multimedia Communi… (2020)

  20. No Access

    Chapter and Conference Paper

    Decentralized Industrial IoT Data Management Based on Blockchain and IPFS

    The wide application of Internet of Things (IoT) has fostered the development of Industry 4.0. In manufacturing domain, Industrial IoT (IIoT) are key components of the Factories of the Future (FoF). The big II...

    **aochen Zheng, **zhi Lu, Sheng**g Sun in Advances in Production Management Systems.… (2020)

previous disabled Page of 4