Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    Stroke-GAN Painter: Learning to paint artworks using stroke-style generative adversarial networks

    It is a challenging task to teach machines to paint like human artists in a stroke-by-stroke fashion. Despite advances in stroke-based image rendering and deep learning-based image rendering, existing painting...

    Qian Wang, Cai Guo, Hong-Ning Dai, ** Li in Computational Visual Media (2023)

  2. No Access

    Article

    Machine translation and its evaluation: a study

    Machine translation (namely MT) has been one of the most popular fields in computational linguistics and Artificial Intelligence (AI). As one of the most promising approaches, MT can potentially break the lang...

    Subrota Kumar Mondal, Haoxi Zhang, H. M. Dipu Kabir in Artificial Intelligence Review (2023)

  3. No Access

    Article

    Profit-based deep architecture with integration of reinforced data selector to enhance trend-following strategy

    Despite the popularity of trend-following strategies in financial markets, they often lack adaptability to the emerging varied markets. Recently, deep learning (DL) methods demonstrate the effectiveness in sto...

    Yang Li, Zibin Zheng, Hong-Ning Dai, Raymond Chi-Wing Wong, Haoran **e in World Wide Web (2023)

  4. No Access

    Article

    Leveraging deep learning for automatic literature screening in intelligent bibliometrics

    Intelligent bibliometrics, by providing sufficient statistical information based on large-scale literature data analytics, is promising for understanding innovative pathways, addressing meaningful insights wit...

    **eling Chen, Haoran **e, Zongxi Li in International Journal of Machine Learning … (2023)

  5. No Access

    Chapter

    Elastic Resource Allocation in Sharding-Based Blockchains

    This chapter studies the PBFT-based sharded permissioned blockchain, which executes in either a local datacenter or a rented cloud platform. In such permissioned blockchain, the transaction (TX) assignment str...

    Huawei Huang, Zhengyu Yue, **aowen Peng, Liuding He, Wuhui Chen in Blockchain Scalability (2023)

  6. No Access

    Chapter

    An Amalgamation of Blockchain and Connected Health for Combating COVID-19

    The coronavirus disease created an unprecedented stress around the world. Because resources became severely constrained, especially during the , approaches to increase supply took center stage. The ...

    Zhuorui Zhang, Bishenghui Tao, Xuran Li, Hong-Ning Dai in Blockchain in Healthcare (2023)

  7. No Access

    Article

    Kubernetes in IT administration and serverless computing: An empirical study and research challenges

    Today’s industry has gradually realized the importance of lifting efficiency and saving costs during the life-cycle of an application. In particular, we see that most of the cloud-based applications and servic...

    Subrota Kumar Mondal, Rui Pan, H M Dipu Kabir, Tan Tian in The Journal of Supercomputing (2022)

  8. No Access

    Chapter

    Overview of Blockchain Intelligence

    We have experienced the proliferation of diverse blockchain platforms, including cryptocurrencies as well as private blockchains. In this chapter, we present an overview of blockchain intelligence. We first br...

    Zibin Zheng, Hong-Ning Dai, Jia**g Wu in Blockchain Intelligence (2021)

  9. No Access

    Chapter

    Open Research Directions

    Although blockchain intelligence has great potential to further improve existing blockchain systems, there are open research directions in this emerging area. In this chapter, we discuss the open issues of blo...

    Hong-Ning Dai, Jia**g Wu, Zibin Zheng in Blockchain Intelligence (2021)

  10. No Access

    Chapter

    On-chain and Off-chain Blockchain Data Collection

    After the introduction of blockchain intelligence in Chap. 1, in this chapter, we present an overview of blockchain data collection. We first review the data growth brought ab...

    Peilin Zheng, Zibin Zheng, Jia**g Wu, Hong-Ning Dai in Blockchain Intelligence (2021)

  11. No Access

    Chapter and Conference Paper

    MFF-AMD: Multivariate Feature Fusion for Android Malware Detection

    Researchers have turned their focus on leveraging either dynamic or static features extracted from applications to train AI algorithms to identify malware precisely. However, the adversarial techniques have be...

    Guangquan Xu, Meiqi Feng, Litao Jiao in Collaborative Computing: Networking, Appli… (2021)

  12. No Access

    Chapter and Conference Paper

    Exploring Self-attention Mechanism of Deep Learning in Cloud Intrusion Detection

    Cloud computing offers elastic and ubiquitous computing services, thereby receiving extensive attention recently. However, cloud servers have also become the targets of malicious attacks or hackers due to the ...

    Chenmao Lu, Hong-Ning Dai, Junhao Zhou, Hao Wang in Cloud Computing (2021)

  13. No Access

    Chapter and Conference Paper

    Cryptocurrencies Price Prediction Using Weighted Memory Multi-channels

    After the invention of Bitcoin and a peer to peer electronic cash system based on the blockchain, the market of cryptocurrencies increases rapidly and attracts substantial interest from investors and researche...

    Zhuorui Zhang, Junhao Zhou, Yanan Song, Hong-Ning Dai in Blockchain and Trustworthy Systems (2020)

  14. No Access

    Chapter and Conference Paper

    Lightweight Distributed Attribute Based Keyword Search System for Internet of Things

    Internet of Things (IoT) is a promising networking paradigm that connects various kinds of sensors and exchanges data from smart devices. Since IoT always related to user’s daily life, the problems of security...

    Jiahuan Long, Ke Zhang, **aofen Wang in Security, Privacy, and Anonymity in Comput… (2019)

  15. No Access

    Article

    Connectivity of cognitive radio ad hoc networks with directional antennas

    In cognitive radio ad hoc networks, omni-directional antennas are typically used at both primary users (PUs) and secondary users (SUs), which can cause high interference. We name such cognitive radio ad hoc ne...

    Yuanyuan Wang, Qiu Wang, Hong-Ning Dai, Haibo Wang, Zhiguo Shi in Wireless Networks (2018)

  16. Article

    Open Access

    Data analysis on video streaming QoE over mobile networks

    One of recent proposals on standardizing quality of user experience (QoE) of video streaming over mobile network is video Mean Opinion Score (vMOS), which can model QoE of video streaming in 5 discrete grades....

    Qingyong Wang, Hong-Ning Dai, Di Wu in EURASIP Journal on Wireless Communications… (2018)

  17. No Access

    Chapter and Conference Paper

    A Novel Hybrid Data Mining Framework for Credit Evaluation

    Internet loan business has received extensive attentions recently. How to provide lenders with accurate credit scoring profiles of borrowers becomes a challenge due to the tremendous amount of loan requests an...

    Yatao Yang, Zibin Zheng, Chunzhen Huang in Collaborate Computing: Networking, Applica… (2017)

  18. No Access

    Chapter and Conference Paper

    AT-MAC: A Novel Full Duplex MAC Design for Achieving Asymmetric Transmission

    Wireless Full-duplex technique can significantly improve system throughput of a wireless network. Most existing full-duplex-supporting wireless MAC schemes only achieve symmetric transmission (i.e., the uplink...

    Zhijie Ma, Qinglin Zhao, Yu Zeng, Huan Zhang in Mobile and Wireless Technologies 2016 (2016)

  19. No Access

    Chapter and Conference Paper

    Parallelizing Simulated Annealing Algorithm in Many Integrated Core Architecture

    The simulated annealing algorithm (SAA) is a well-established approach to the approximate solution of combinatorial optimisation problems. SAA allows for occasional uphill moves in an attempt to reduce the probab...

    Junhao Zhou, Hong **ao, Hao Wang in Computational Science and Its Applications… (2016)

  20. Article

    Open Access

    On the delay reduction of wireless ad hoc networks with directional antennas

    It is shown that the throughput capacity of wireless ad hoc networks using omni-directional antennas (OMN networks) is significantly decreased with the increased number of nodes. One major reason lies in the inte...

    Hong-Ning Dai, Qinglin Zhao in EURASIP Journal on Wireless Communications and Networking (2015)

previous disabled Page of 2