Skip to main content

previous disabled Page of 8
and
  1. No Access

    Article

    A reweighting method for speech recognition with imbalanced data of Mandarin and sub-dialects

    Automatic speech recognition (ASR) is an important technology in many fields like video-sharing services, online education and live broadcast. Most recent ASR methods are based on deep learning technology. A d...

    Jiaju Wu, Zhengchang Wen, Haitian Huang in Service Oriented Computing and Applications (2024)

  2. No Access

    Article

    BDNet: a method based on forward and backward convolutional networks for action recognition in videos

    Human action recognition analyzes the behavior in a scene according to the spatiotemporal features carried in image sequences. Existing works suffers from ineffective spatial–temporal feature learning. For sho...

    Chuanjiang Leng, Qichuan Ding, Chengdong Wu, Ange Chen, Huan Wang in The Visual Computer (2024)

  3. No Access

    Article

    Thermal infrared action recognition with two-stream shift Graph Convolutional Network

    The extensive deployment of camera-based IoT devices in our society is heightening the vulnerability of citizens’ sensitive information and individual data privacy. In this context, thermal imaging techniques ...

    Jishi Liu, Huanyu Wang, Junnian Wang, Dalin He in Machine Vision and Applications (2024)

  4. No Access

    Article

    Generative facial prior embedded degradation adaption network for heterogeneous face hallucination

    In real-world long-range surveillance systems, thermal face images captured from a distance suffer from low resolution and noise, posing challenges for thermal-to-visible face image translation. Current method...

    Huan Wang, Jianning Chi, **aoqiang Li, Chengdong Wu in Multimedia Tools and Applications (2024)

  5. No Access

    Article

    A robust dual color image blind watermarking scheme in the frequency domain

    Aiming at the problems that many watermarking schemes cannot adapt to the image copyright protection with large amount of information, and the copyright protection of color images faces severe challenges, this...

    Huanying Wang, **aojie Tian, Yu **a in Multimedia Tools and Applications (2024)

  6. Article

    Open Access

    Feature selection strategies: a comparative analysis of SHAP-value and importance-based methods

    In the context of high-dimensional credit card fraud data, researchers and practitioners commonly utilize feature selection techniques to enhance the performance of fraud detection models. This study presents ...

    Huan**g Wang, Qianxin Liang, John T. Hancock, Taghi M. Khoshgoftaar in Journal of Big Data (2024)

  7. Article

    Open Access

    Amplitude-modulated EM side-channel attack on provably secure masked AES

    Recently a new type of side channels was discovered, called amplitude-modulated electromagnetic (EM) emanations from mixed-signal circuits. Unlike power analysis or near field EM analysis, attacks based on amp...

    Huanyu Wang in Journal of Cryptographic Engineering (2024)

  8. No Access

    Article

    Hybrid compression scheme based on VMD optimization algorithm application to mechanical equipment monitoring

    The traditional variational mode decomposition (VMD) algorithm causes under-decomposition and over-decomposition problems when performing signal decomposition. Many studies have addressed various optimization ...

    Liqiang Song, Huaiguang Wang, Baojian Yang in The Journal of Supercomputing (2024)

  9. Article

    Open Access

    Harmfulness metrics in digital twins of social network rumors detection in cloud computing environment

    Social network rumor harm metric is a task to score the harm caused by a rumor by analyzing the spreading range of the rumor, the users affected, the repercussions caused, etc., and then the harm caused by the...

    Hao Li, Wu Yang, Wei Wang, Huanran Wang in Journal of Cloud Computing (2024)

  10. Article

    Open Access

    Data reduction techniques for highly imbalanced medicare Big Data

    In the domain of Medicare insurance fraud detection, handling imbalanced Big Data and high dimensionality remains a significant challenge. This study assesses the combined efficacy of two data reduction techni...

    John T. Hancock, Huan**g Wang, Taghi M. Khoshgoftaar, Qianxin Liang in Journal of Big Data (2024)

  11. No Access

    Chapter

    ChatGPT Implementation in the Metaverse: Towards Another Level of Immersiveness in Education

    Novel artificial intelligence (AI) technologies have the capability to reinvent education and enhance the immersive experience of learners. The education industry is continually embracing advanced AI tools to ...

    Michael Agyemang Adarkwah, Ahmed Tlili, Boulus Shehata in Applications of Generative AI (2024)

  12. No Access

    Article

    Progressive local-to-global vision transformer for occluded face hallucination

    Hallucinating a photo-realistic high-resolution (HR) face image from an occluded low-resolution (LR) face image is beneficial for a series of face-related applications. However, previous efforts focused on eit...

    Huan Wang, Jianning Chi, Chengdong Wu, **aosheng Yu in Multimedia Tools and Applications (2024)

  13. No Access

    Article

    Bifurcation Analysis of a Fractional-Order Bidirectional Associative Memory Neural Network with Multiple Delays

    The bidirectional associative memory (BAM) neural network has the capability to store hetero-associative pattern pairs, which has high requirements for stability. This paper inquires into Hopf bifurcation of f...

    Huanan Wang, Chengdai Huang, **de Cao, Mahmoud Abdel-Aty in Cognitive Computation (2023)

  14. Article

    Open Access

    Explainable machine learning models for Medicare fraud detection

    As a means of building explainable machine learning models for Big Data, we apply a novel ensemble supervised feature selection technique. The technique is applied to publicly available insurance claims data f...

    John T. Hancock, Richard A. Bauder, Huan**g Wang in Journal of Big Data (2023)

  15. No Access

    Article

    A novel cross-network node pair embedding methodology for anchor link prediction

    Anchor link prediction across social networks is highly important for multiple social network analysis. Traditional methods rely heavily on user-generated information or the quality of network topology informa...

    Huanran Wang, Wu Yang, Dapeng Man, Wei Wang, Jiguang Lv, Meng Joo Er in World Wide Web (2023)

  16. Article

    Examining the applications of intelligent tutoring systems in real educational contexts: A systematic literature review from the social experiment perspective

    Intelligent Tutoring Systems (ITSs) have a great potential to effectively transform teaching and learning. As more efforts have been put on designing and develo** ITSs and integrating them within learning an...

    Huanhuan Wang, Ahmed Tlili, Ronghuai Huang in Education and Information Technologies (2023)

  17. No Access

    Article

    SVF-Net: spatial and visual feature enhancement network for brain structure segmentation

    Brain structure segmentation in Magnetic Resonance Images (MRI) is essential to the assessment and treatment of medical disorders, especially neuropsychiatric diseases. The key to semantic segmentation is to u...

    Qian Hu, Ying Wei, **ang Li, Chuyuan Wang, Huan Wang, Shanze Wang in Applied Intelligence (2023)

  18. No Access

    Article

    Disturbance-observer-based adaptive dynamic surface control for nonlinear systems with input dead-zone and delay using neural networks

    Disturbance-observer-based adaptive neural control approach is proposed for nonlinear systems. Considering the effect caused by long input delay and dead-zone, a novel auxiliary system has been introduced to d...

    Junchang Zhai, Huanqing Wang, Jiaqing Tao in Neural Computing and Applications (2023)

  19. No Access

    Chapter and Conference Paper

    A Prompt-Based Representation Individual Enhancement Method for Chinese Idiom Reading Comprehension

    Chinese idiom is a distinctive language phenomenon, which usually consists of four Chinese characters and expresses a non-compositional and metaphorical meaning. Therefore, Chinese idioms pose unique challenge...

    Ying Sha, Mingmin Wu, Zhi Zeng, **ng Ge in Database Systems for Advanced Applications (2023)

  20. No Access

    Chapter and Conference Paper

    A Study on Behavioral Engagement of College English Learners in Blended Teaching Model

    The issue of student behavioral engagement in the blended teaching mode has become increasingly significant to ensure students’ learning outcome. This study focuses on the features of college English learners’...

    Huihui Li, Huan Wang in Computer Science and Education (2023)

previous disabled Page of 8