Skip to main content

and
  1. Article

    Open Access

    Multi-risk factors joint prediction model for risk prediction of retinopathy of prematurity

    Retinopathy of prematurity (ROP) is a retinal vascular proliferative disease common in low birth weight and premature infants and is one of the main causes of blindness in children.

    Shaobin Chen, **nyu Zhao, Zhenquan Wu, Kangyang Cao, Yulin Zhang, Tao Tan in EPMA Journal (2024)

  2. No Access

    Article

    Recognition of score words in freestyle kayaking using improved DTW matching

    Voice is the most natural information carrier for human beings, and is likely to become the main method of human–computer interaction in the future. This article focuses on the recognition of score words in fr...

    Qiyuan Zhang, **aochen Yuan, Chan-Tong Lam in Multimedia Tools and Applications (2024)

  3. No Access

    Chapter and Conference Paper

    Generating Cyclic 2-Gray Codes for Fibonacci q-Decreasing Words

    We present a two-stage algorithm for generating cyclic 2-Gray codes for q-decreasing words. In the first step, a simple recursive algorithm is used to generate a cyclic 2-Gray code for q-run constrained words, wh...

    Dennis Wong, Bowie Liu, Chan-Tong Lam, Marcus Im in WALCOM: Algorithms and Computation (2024)

  4. No Access

    Chapter and Conference Paper

    Rapid APT Detection in Resource-Constrained IoT Devices Using Global Vision Federated Learning (GV-FL)

    Security and privacy are critical concerns in cyberspace due to the inherent vulnerability of Internet of Things (IoT) systems. In particular, Advanced Persistent Threat (APT) has become one of the most severe...

    Han Zhu, Huibin Wang, Chan-Tong Lam, Liyazhou Hu in Neural Information Processing (2024)

  5. No Access

    Article

    Real-scene-constrained virtual scene layout synthesis for mixed reality

    Given a real source scene and a virtual target scene, the real-scene-constrained virtual scene layout synthesis problem is defined as how to re-synthesize the layout of the virtual furniture in the virtual sce...

    Runze Fan, Lili Wang, **nda Liu, Sio Kei Im, Chan Tong Lam in The Visual Computer (2023)

  6. No Access

    Article

    PCTMF-Net: heart sound classification with parallel CNNs-transformer and second-order spectral analysis

    Heart disease is a common condition worldwide and has become one of the leading causes of death worldwide. The electrocardiogram (PCG) is a safe, painless, and non-invasive test that captures bioacoustic infor...

    Rongsheng Wang, Yaofei Duan, Yukun Li, Dashun Zheng, **aohong Liu in The Visual Computer (2023)

  7. No Access

    Chapter and Conference Paper

    A Noise Convolution Network for Tampering Detection

    The vulnerability of digital images to tampering is an ongoing information security issue in the multimedia field. Thus, identifying tampered digital images and locating the tampered regions in the images can ...

    Zhiyao **e, **aochen Yuan, Chan-Tong Lam in Artificial Neural Networks and Machine Lea… (2023)

  8. No Access

    Chapter

    PK-BERT: Knowledge Enhanced Pre-trained Models with Prompt for Few-Shot Learning

    The amount of data in some fields are scarce because they are difficult or expensive to obtain. The general practice is to pre-train a model on similar data sets and fine-tune the models in downstream tasks by...

    Han Ma, Benjamin K. Ng, Chan-Tong Lam in Computer and Information Science (2023)

  9. No Access

    Chapter and Conference Paper

    Two High-Performance Antenna Selection Schemes for Secure SSK Modulation in Intelligent Industrial Wireless Sensing Systems

    Industrial wireless sensor networks (IWSNs) provide intelligent factory management with a new dimension. Reliable intelligent industrial wireless sensing systems play a vital role in ensuring the reliability a...

    Hui Xu, Benjamin K. Ng, Huibin Wang, Boyu Yang in Big Data Intelligence and Computing (2023)

  10. No Access

    Chapter and Conference Paper

    Robust Graph Embedding Recommendation Against Data Poisoning Attack

    With the development of recommendation system technology, more and more Internet services are applied to recommendation systems.

    Junyan Zhong, Chang Liu, Huibin Wang, Lele Tian in Big Data Intelligence and Computing (2023)

  11. No Access

    Chapter and Conference Paper

    Real-Time Traffic Monitoring and Status Detection with a Multi-vehicle Tracking System

    With live street videos posted online, the Macao Government provides means to the general public to assess the latest road traffic conditions. After reviewing over these videos, a person may decide to change t...

    Lu Wang, Chan Tong Lam, K. L. Eddie Law, Benjamin Ng in Intelligent Transport Systems (2022)

  12. No Access

    Chapter

    Automatic Speech Recognition for Portuguese with Small Data Set

    Voice recognition has become more and more popular in various systems and applications. To further promote Macau tourism worldwide, a mobile Macau tourism APP is being develo** that supports voice control to...

    Yapeng Wang, Ruize Jia, Chan Tong Lam in Computer and Information Science 2021 - Fa… (2022)

  13. No Access

    Chapter and Conference Paper

    Robust Pedestrian Detection: Faster Deployments with Fusion of Models

    Pedestrian detection has a wide range of real-world critical applications including security and management of emergency scenarios. In critical applications, detection recall and precision are both essential ...

    Chan Tong Lam, Jose Gaspar, Wei Ke, Xu Yang, Sio Kei Im in Pattern Recognition (2020)