-
Article
A 4D strong spatio-temporal feature learning network for behavior recognition of point cloud sequences
Although the depth map sequence widely used in behavior recognition can provide depth information. However, depth pixels are not strongly correlated with each other, and the spatio-temporal structure informati...
-
Article
A secure location management scheme in an LEO-satellite network with dual-mobility
Low Earth orbit (LEO) communication satellite constellation provides network service to remote areas without terrestrialnetwork coverage. In sparsely populated areas, the deployment of ground stations is also ...
-
Article
Multi-object reconstruction of plankton digital holograms
Plankton is the base of the ocean ecosystem and is very sensitive to changes in their environment. Thus, monitoring the status of plankton in-situ has incredible importance for environmental study. Hologram is on...
-
Chapter and Conference Paper
A Critical Server Security Protection Strategy Based on Traffic Log Analysis
Traditional perimeter-based security systems provide a level of defense against external attacks. However, with the increasing prevalence of advanced network attacks and the continual emergence of novel attack...
-
Article
Structural feature representation and fusion of human spatial cooperative motion for action recognition
Aiming at the cooperative relationship of human body parts in the process of action execution, we propose an action recognition method based on the structural feature model of human spatial cooperative motion....
-
Article
Robust HDR video watermarking method based on the HVS model and T-QR
In order to protect the copyright of the high dynamic range (HDR) video, a robust HDR video watermarking method based on the human visual system (HVS) model and Tensor-QR decomposition (T-QR) is proposed. In o...
-
Chapter and Conference Paper
Thinking in Patch: Towards Generalizable Forgery Detection with Patch Transformation
Nowadays, synthetic faces can completely trick human eyes, which raises social concerns for malicious dissemination of such fake content. As a result, face forgery detection has become a significant research t...
-
Chapter and Conference Paper
Modeling and Cycle Analysis of Traffic Signal Systems Based on Timed Networks
The traffic signal control systems offer an effective settlement for the city traffic management. In this paper, the operation process of traffic signal systems for one-way street and crossroad is described by...
-
Article
Multi-exposure image fusion based on tensor decomposition
In this paper, a multi-exposure image fusion (MEF) method is proposed based on tensor decomposition and saliency model. The main innovation of the proposed method is to explore a tensor domain for MEF and defi...
-
Article
Depth map prediction from a single image with generative adversarial nets
A depth map is a fundamental component of 3D construction. Depth map prediction from a single image is a challenging task in computer vision. In this paper, we consider the depth prediction as an image-to-imag...
-
Article
Fine-grained facial image-to-image translation with an attention based pipeline generative adversarial framework
Fine-grained feature detection and recognition is an important but tough work due to the resolution and noisy representation. Synthesize images with a specified tiny feature is even more challenging. Existing ...
-
Article
KA-Ensemble: towards imbalanced image classification ensembling under-sampling and over-sampling
Imbalanced learning has become a research emphasis in recent years because of the growing number of class-imbalance classification problems in real applications. It is particularly challenging when the imbalan...
-
Chapter and Conference Paper
Effective Android Malware Detection Based on Deep Learning
Android, the world’s most widely used mobile operating system, is the target of a large number of malwares. These malwares have brought great trouble to information security and users’ privacy, such as leaking...
-
Chapter and Conference Paper
A Robust Framework for High-Quality Voice Conversion with Conditional Generative Adversarial Network
The deep neural network (DNNs) has been applied in voice conversion (VC) system successfully. DNN shows its effectiveness especially with a large scale of training speech data, but on a small dataset, DNN suff...
-
Chapter and Conference Paper
Suzzer: A Vulnerability-Guided Fuzzer Based on Deep Learning
Fuzzing is a simple and effective way to find software bugs. Most state-of-the-art fuzzers focus on improving code coverage to enhance the possibility of causing crashes. However, a software program oftentimes...
-
Chapter and Conference Paper
Over-Sampling Multi-classification Method Based on Centroid Space
The problem of unbalanced data generally exists in various application fields of large data and machine learning, such as medical diagnosis, anomaly detection and so on. Researchers have proposed or adopted a ...
-
Article
A novel medical internet of things perception system based on visual image encryption and intrusion detection
Smart cities are the emerging topics in the recent decade with advancements in science and technology especially in the areas of communication technologies. Concept of smart cities depicts the inteconnectivity...
-
Article
A novel robust color image watermarking method using RGB correlations
In order to protect the copyright of the color image, a novel robust color image watermarking method using correlations of RGB channels is presented. RGB three channels of the color image have much strong corr...
-
Chapter and Conference Paper
A Robust Multi-terminal Support Method Based on Tele-Immersion Multimedia Technology
In this paper, a multi terminal support method based on tele-immersion multimedia technology is proposed. This method provides two functions of synchronous request and asynchronous request, and it can dynamic...
-
Chapter and Conference Paper
A Novel Distributed Knowledge Reasoning Model
This paper proposes a novel model and device based on distributed knowledge reasoning, for predicting the environmental risk degree for an abnormal event (e.g., fire) in the Internet of Things (IoT) environmen...