Skip to main content

previous disabled Page of 4
and
  1. No Access

    Chapter and Conference Paper

    Research on General Automatic Test Platform for Onboard Automatic Train Protection

    Traditional train control systems experience problems such as low efficiency, tedious operation, high labor costs, poor visibility, and difficulty in designing and maintaining test cases during manual function...

    Zhang Guozhen, Jiang Yunwei, Shi Miao in Methods and Applications for Modeling and … (2024)

  2. No Access

    Chapter and Conference Paper

    Transpose and Mask: Simple and Effective Logit-Based Knowledge Distillation for Multi-attribute and Multi-label Classification

    Knowledge distillation (KD) improves a student network by transferring knowledge from a teacher network. Although KD has been extensively studied in single-labeled image classification, it is not well explored...

    Yuwei Zhao, Annan Li, Guozhen Peng, Yunhong Wang in Pattern Recognition and Computer Vision (2024)

  3. No Access

    Chapter and Conference Paper

    Automatic Search of Linear Structure: Applications to Keccak and Ascon

    The linear structure technique was developed by Guo et al. at ASIACRYPT 2016, notably boosting the preimage attacks on Keccak. This technique transforming the preimage attack into solving algebraic systems allows...

    Huina Li, Guozhen Liu, Haochen Zhang, Peng Tang in Information Security and Cryptology (2024)

  4. No Access

    Article

    Object detection based on knowledge graph network

    Object detection using convolutional neural networks addresses the recognition problem solely in terms of feature extraction and disregards knowledge and experience to explore higher-level relationships betwee...

    Jian** Li, Guozhen Tan, **ao Ke, Huaiwei Si, Yanfei Peng in Applied Intelligence (2023)

  5. No Access

    Article

    SMAF: a secure and makespan-aware framework for executing serverless workflows

    We propose a secure and makespan-aware framework for executing serverless workflows named SMAF. SMAF can significantly help in improving the security performance in the execution of serverless workflow with li...

    Shuai Zhang, Yunfei Guo, Zehua Guo, Hongchao Hu in Science China Information Sciences (2023)

  6. No Access

    Chapter and Conference Paper

    Frame Correlation Knowledge Distillation for Gait Recognition in the Wild

    Recently, large deep models have achieved significant progress on gait recognition in the wild. However, such models come with a high cost of runtime and computational resource consumption. In this paper, we i...

    Guozhen Peng, Shaoxiong Zhang, Yuwei Zhao, Annan Li, Yunhong Wang in Biometric Recognition (2023)

  7. No Access

    Article

    Software approaches for resilience of high performance computing systems: a survey

    With the scaling up of high-performance computing systems in recent years, their reliability has been descending continuously. Therefore, system resilience has been regarded as one of the critical challenges f...

    Jie Jia, Yi Liu, Guozhen Zhang, Yulin Gao, Depei Qian in Frontiers of Computer Science (2022)

  8. No Access

    Article

    AccNet: occluded scene text enhancing network with accretion blocks

    Scene text with occlusions is common in the real world, and occluded text recognition is important for many machine vision applications. However, corresponding techniques are not well explored as public datase...

    Yanxiang Gong, Zhiqiang Zhang, Guozhen Duan, Zheng Ma in Machine Vision and Applications (2022)

  9. No Access

    Article

    Graph Searches and Their End Vertices

    For a graph search algorithm, the end vertex problem is concerned with which vertices of a graph can be the last visited by this algorithm. We characterize all maximum cardinality searches on chordal graphs an...

    Guozhen Rong, Yixin Cao, Jianxin Wang, Zhifeng Wang in Algorithmica (2022)

  10. No Access

    Chapter and Conference Paper

    Research on Cloud Office Resource Allocation Algorithm Based on Correction Weight PSO

    With the development of science and technology, cloud computing technology has changed people's office methods. People begin to use cloud services to realize remote collaborative office, which can save costs a...

    Guozhen Wang, Chun Wang, Tong Gan in Advances in Artificial Intelligence and Se… (2022)

  11. No Access

    Chapter and Conference Paper

    Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3

    In this work, we focus on collision attacks against instances of SHA-3 hash family in both classical and quantum settings. Since the 5-round collision attacks on SHA3-256 and other variants proposed by Guo et al.

    Jian Guo, Guozhen Liu, Ling Song, Yi Tu in Advances in Cryptology – ASIACRYPT 2022 (2022)

  12. No Access

    Chapter and Conference Paper

    Rebound Attacks on  \(\textsf{SKINNY}\) Hashing with Automatic Tools

    In ToSC’20, a new approach combining Mix-Integer Linear Programming (MILP) tool and Constraint Programming (CP) tool to search for boomerang distinguishers is proposed and later used for rebound attack in ASIA...

    Shun Li, Guozhen Liu, Phuong Pham in Network and System Security (2022)

  13. No Access

    Chapter and Conference Paper

    Few-Shot Knowledge Graph Entity Ty**

    Knowledge graph entity ty**, which is an important way to complete knowledge graphs (KGs), aims at predicting the associating type of certain given entities without any external knowledge. However, previous ...

    Guozhen Zhu, Zhongbao Zhang, Sen Su in Advances in Knowledge Discovery and Data Mining (2022)

  14. No Access

    Article

    Efficient detection of silent data corruption in HPC applications with synchronization-free message verification

    Nowadays, high-performance computing (HPC) is step** forward to exascale era. However, silent data corruption (SDC) behaved as bit-flip** can cause disastrous consequences for scientific computation, which...

    Guozhen Zhang, Yi Liu, Hailong Yang, Depei Qian in The Journal of Supercomputing (2022)

  15. No Access

    Article

    Automated detection of retinopathy of prematurity by deep attention network

    Retinopathy of prematurity (ROP) is a retinal vascular proliferative disease principally observed in infants born prematurely with low birth weight. ROP is the leading cause of childhood blindness. Early scree...

    Baiying Lei, **anlu Zeng, Shan Huang, Rugang Zhang in Multimedia Tools and Applications (2021)

  16. No Access

    Article

    User-level failure detection and auto-recovery of parallel programs in HPC systems

    As the mean-time-between-failures (MTBF) continues to decline with the increasing number of components on large-scale high performance computing (HPC) systems, program failures might occur during the execution...

    Guozhen Zhang, Yi Liu, Hailong Yang, Jun Xu, Depei Qian in Frontiers of Computer Science (2021)

  17. No Access

    Chapter and Conference Paper

    IPE Transformer for Depth Completion with Input-Aware Positional Embeddings

    In contrast to traditional transformer blocks using a set of pre-defined parameters as positional embeddings, we propose the input-aware positional embedding (IPE) which is dynamically generated according to t...

    Bocen Li, Guozhen Li, Haiting Wang, Lijun Wang in Pattern Recognition and Computer Vision (2021)

  18. No Access

    Chapter and Conference Paper

    Evaluation of Relationship Quality Within Dyads Through the Performance in Dual-Player Cooperative Tasks

    Human beings are influenced widely by relationship among individuals. However, there is still a lack of a systematic, objective and direct way to assess the quality of relationships within dyads. The current s...

    Haijiang Yan, Kai Yu, Guozhen Zhao in Engineering Psychology and Cognitive Ergonomics (2021)

  19. No Access

    Chapter and Conference Paper

    A Reliable Voice Perceptual Hash Authentication Algorithm

    In order to protect the authenticity and integrity of voice, this paper proposes a reliable voice perceptual hash authentication algorithm. This algorithm considers the dynamic characteristics of voice signals...

    Li Li, Yang Li, Zizhen Wang, Xuemei Li, Guozhen Shi in Mobile Multimedia Communications (2021)

  20. No Access

    Chapter and Conference Paper

    An Automated Aggressive Posterior Retinopathy of Prematurity Diagnosis System by Squeeze and Excitation Hierarchical Bilinear Pooling Network

    Aggressive Posterior Retinopathy of Prematurity (AP-ROP) is a special type of Retinopathy of Prematurity (ROP), which is one of the most common childhood blindness that occurs in premature infants. AP-ROP is u...

    Rugang Zhang, **feng Zhao, Guozhen Chen, Hai **e in Ophthalmic Medical Image Analysis (2020)

previous disabled Page of 4