![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Deeplab-YOLO: a method for detecting hot-spot defects in infrared image PV panels by combining segmentation and detection
Aiming at the problem of difficult operation and maintenance of PV power plants in complex backgrounds and combined with image processing technology, a method for detecting hot spot defects in infrared image P...
-
Chapter and Conference Paper
Reinforcement Learning-Based Algorithm for Real-Time Automated Parking Decision Making
Recently, automated parking has gained attention for its ability to enhance parking accuracy and provide a comfortable experience for car owners. However, with the increasing number of vehicles in the parking ...
-
Chapter and Conference Paper
Self-supervised Multi-object Tracking with Cycle-Consistency
Multi-object tracking is a challenging video task that requires both locating the objects in the frames and associating the objects among the frames, which usually utilizes the tracking-by-detection paradigm. ...
-
Article
SWVM: a light-weighted virtualization platform based on Sunway CPU architecture
-
Chapter and Conference Paper
Pervasive Monitoring of Gastrointestinal Health of Newborn Babies
Babies needing intensive care are at risk of develo** gastrointestinal problems, such as feed intolerance and necrotizing enterocolitis (NEC). Monitoring, early detection, and prevention of bowel diseases in...
-
Article
An integrated approach for medical abnormality detection using deep patch convolutional neural networks
Computer-aided detection of abnormalities in medical images has clinical significance but remains a challenging research topic. Unlike object detection in natural images, the detection of medical abnormalities...
-
Article
Online traffic-aware linked VM placement in cloud data centers
In cloud computing, virtual machine (VM) placement plays a crucial role in data center (DC) management, as different ways of VM placement may require different system resources. As Cisco research reveals that ...
-
Chapter and Conference Paper
An Integrated Deep Architecture for Lesion Detection in Breast MRI
Complex nature of medical images and tedious process of data exploration calls for the development of Computer Aided Detection (CADe) methods to ease the process of lesion detection. Recent deep learning-based...
-
Chapter and Conference Paper
Dual Adversarial Network for Deep Active Learning
Active learning, reducing the cost and workload of annotations, attracts increasing attentions from the community. Current active learning approaches commonly adopted uncertainty-based acquisition functions fo...
-
Chapter and Conference Paper
FTL: A Universal Framework for Training Low-Bit DNNs via Feature Transfer
Low-bit Deep Neural Networks (low-bit DNNs) have recently received significant attention for their high efficiency. However, low-bit DNNs are often difficult to optimize due to the saddle points in loss surfac...
-
Chapter and Conference Paper
Qualitative Instead of Quantitative: Towards Practical Data Analysis Under Differential Privacy
Differential privacy (DP) has become the de facto standard in the academic and industrial communities. Although DP can provide strong privacy guarantee, it also brings a major of performance loss for data mini...
-
Article
Embedding differential privacy in decision tree algorithm with different depths
Differential privacy (DP) has become one of the most important solutions for privacy protection in recent years. Previous studies have shown that prediction accuracy usually increases as more data mining (DM) ...
-
Chapter and Conference Paper
Analysis of User’s Abnormal Behavior Based on Behavior Sequence in Enterprise Network
There are many abnormal user behavior in the enterprise network environment, how to monitor it effectively is a hot research hotspot. At present, the analysis of abnormal behavior is mainly through the means o...
-
Article
SMe: explicit & implicit constrained-space probabilistic threshold range queries for moving objects
This paper studies the constrained-space probabilistic threshold range query (CSPTRQ) for moving objects, where objects move in a constrained-space (i.e., objects are forbidden to be located in some specific area...
-
Chapter and Conference Paper
Location Privacy Protected Recommendation System in Mobile Cloud
As the core of location-based services (LBS), the LBS-oriented recommendation systems, which suggest the points-of-interest (POIs) to users by analyzing the distribution of the user’s previous points-of-intere...
-
Article
A Virtualization Based Monitoring System for Mini-intrusive Live Forensics
Digital evidences hold great significance for governing cybercrime. Unfortunately, previous acquisition tools were troubled by either the shortage of suspending the target system’s running or the security of t...
-
Chapter and Conference Paper
DaSS: Dynamic Time Slice Scheduler for Virtual Machine Monitor
I/O performance is an important factor in virtualization technology. However, the hypervisor and the scheduler brings impact on the I/O performance, since the scheduler considers I/O-intensive Virtual Machine ...
-
Chapter and Conference Paper
HYBit: A Hybrid Taint Analyzing Framework for Binary Programs
For the purpose of discovering security flaws in software, many dynamic and static taint analyzing techniques have been proposed. The dynamic techniques can precisely find the security flaws of the software; b...
-
Chapter and Conference Paper
A Improved Clustering Analysis Method Based on Fuzzy C-Means Algorithm by Adding PSO Algorithm
Fuzzy c-means algorithm (FCM) is one of the most widely used clustering methods for modern medical image segmentation applications. However the conventional FCM algorithm has certain possibilities of convergin...
-
Chapter and Conference Paper
Fuzzy C-means Clustering with Bilateral Filtering for Medical Image Segmentation
Fuzzy c-means (FCM) is a widely used unsupervised pattern recognition method for medical image segmentation. The conventional FCM algorithm and some existing variants are either sensitive to noise or prone to ...