Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    Harmfulness metrics in digital twins of social network rumors detection in cloud computing environment

    Social network rumor harm metric is a task to score the harm caused by a rumor by analyzing the spreading range of the rumor, the users affected, the repercussions caused, etc., and then the harm caused by the...

    Hao Li, Wu Yang, Wei Wang, Huanran Wang in Journal of Cloud Computing (2024)

  2. No Access

    Article

    A novel cross-network node pair embedding methodology for anchor link prediction

    Anchor link prediction across social networks is highly important for multiple social network analysis. Traditional methods rely heavily on user-generated information or the quality of network topology informa...

    Huanran Wang, Wu Yang, Dapeng Man, Wei Wang, Jiguang Lv, Meng Joo Er in World Wide Web (2023)

  3. Article

    Examining the applications of intelligent tutoring systems in real educational contexts: A systematic literature review from the social experiment perspective

    Intelligent Tutoring Systems (ITSs) have a great potential to effectively transform teaching and learning. As more efforts have been put on designing and develo** ITSs and integrating them within learning an...

    Huanhuan Wang, Ahmed Tlili, Ronghuai Huang in Education and Information Technologies (2023)

  4. No Access

    Chapter and Conference Paper

    Activities-Centered Participatory Community Design: Shoupa Community Service Station Rooftop Renovation Plan

    This paper first provides an overview of the urban regeneration process of Bei**g since the1970s, with a focus of the shift from material promotion to historical cultural preservation and sustainability promo...

    Huan Wang, Ruoxi Wang, Lili Fu, Qing Miao in Cross-Cultural Design. Interaction Design … (2022)

  5. No Access

    Chapter and Conference Paper

    TTS-GAN: A Transformer-Based Time-Series Generative Adversarial Network

    Signal measurements appearing in the form of time series are one of the most common types of data used in medical machine learning applications. However, such datasets are often small, making the training of d...

    **aomin Li, Vangelis Metsis, Huangyingrui Wang in Artificial Intelligence in Medicine (2022)

  6. No Access

    Chapter and Conference Paper

    Privacy-Preserving Face Recognition with Learnable Privacy Budgets in Frequency Domain

    Face recognition technology has been used in many fields due to its high recognition accuracy, including the face unlocking of mobile devices, community access control systems, and city surveillance. As the cu...

    Jiazhen Ji, Huan Wang, Yuge Huang, Jiaxiang Wu, **ngkun Xu in Computer Vision – ECCV 2022 (2022)

  7. Article

    Open Access

    Investigating feedback implemented by instructors to support online competency-based learning (CBL): a multiple case study

    Instructional feedback has the power to enhance learning. However, learners do not always feel satisfied with their feedback experience. Simultaneously, little attention has been paid on investigating how feed...

    Huanhuan Wang, Ahmed Tlili, James D. Lehman in International Journal of Educational Techn… (2021)

  8. No Access

    Chapter and Conference Paper

    A Capacitive Flexible Tactile Sensor

    In this paper, a capacitive flexible tactile sensor was designed to measure the pressure of objects based on MEMS technology. This sensor is a structure of a 4 × 4 array, with metal Ag as the capacitive electr...

    Dandan Yuan, Haoxin Shu, Yulong Bao, Bin Xu, Huan Wang in Human Centered Computing (2021)

  9. No Access

    Article

    Existence identifications of unobserved paths in graph-based social networks

    In recent years, social networks have surged in popularity as one of the main applications of the Internet. One key aspect of social network research is exploring important unobserved network information which...

    Huan Wang, Qiufen Ni, Jiali Wang, Hao Li, Fuchuan Ni, Hao Wang in World Wide Web (2021)

  10. No Access

    Chapter and Conference Paper

    A Flexible Film Thermocouple Temperature Sensor

    This article introduces a thin-film thermocouple temperature sensor with symmetrical electrode structure. It uses PI film as a flexible substrate. Cu film and CuNi film made by MEMS manufacturing process as p...

    Yulong Bao, Bin Xu, Huang Wang, Dandan Yuan, **aoxiao Yan in Human Centered Computing (2021)

  11. No Access

    Chapter and Conference Paper

    Federated Learning in Side-Channel Analysis

    Recently introduced federated learning is an attractive framework for the distributed training of deep learning models with thousands of participants. However, it can potentially be used with malicious intent....

    Huanyu Wang, Elena Dubrova in Information Security and Cryptology – ICISC 2020 (2021)

  12. No Access

    Chapter and Conference Paper

    Multi-UAV Cooperative Exploring for the Unknown Indoor Environment Based on Dynamic Target Tracking

    This paper proposes a method for collaborative exploration adopting multiple UAVs in an unknown GPS-denied indoor environment. The core of this method is to use the Tracking-D*Lite algorithm to track moving ta...

    Ning Li, Jiefu Tan, Yunlong Wu, Jiachi Xu in Collaborative Computing: Networking, Appli… (2021)

  13. No Access

    Chapter and Conference Paper

    Research on Bionic Robot Micro Adsorption Mechanism SMA Driven System

    In view of the shape memory alloy (SMA) actuation and sensing properties of smart materials, using of SMA output larger driving force in the process of phase transformation, a biasing SMA rigid elastic coupli...

    Junmei **, Huan Wang, Zhen Wang, Songhai Zhang, Anbang Dai in Human Centered Computing (2019)

  14. No Access

    Chapter and Conference Paper

    Incorporating External Knowledge to Boost Machine Comprehension Based Question Answering

    We propose an effective knowledge representation network via a two-level attention mechanism, called KRN, to represent the background knowledge of entities in documents for boosting machine comprehension (MC)....

    Huan Wang, Weiming Lu, Zeyun Tang in Advances in Information Retrieval (2019)

  15. Chapter and Conference Paper

    Urban Interaction Design Supports Modular Design Practice for Urban Public Space

    Multiple-dimensional structured urban space directs to an inter-disciplinary considers on public space utilization. The people-users are consciously and unconsciously in the communicative activities with the c...

    Huan Wang, Ming Yan, Han **e, Zhiyong Fu in Cross-Cultural Design. Culture and Society (2019)

  16. No Access

    Chapter and Conference Paper

    Continuous Nearest Neighbor Query with the Direction Constraint

    This paper proposes a new spatial data query, the continuous nearest neighbor query with the direction constraint (DCNN query). The DCNN query finds the nearest point of interest (POI), which also satisfies th...

    Xue Miao, ** Guo, Huan Wang, Zhaoshun Wang in Web and Wireless Geographical Information … (2019)

  17. No Access

    Chapter and Conference Paper

    Cross-Lingual Entity Matching for Heterogeneous Online Wikis

    Knowledge bases play an increasing important role in many applications. However, many knowledge bases mainly focus on English knowledge, and have only a few knowledge for low-resource languages (LLs). If we ca...

    Weiming Lu, Peng Wang, Huan Wang, Jiahui Liu in Natural Language Processing and Chinese Co… (2018)

  18. Chapter and Conference Paper

    Bridge the Physical and Virtual Design for Hutongs - Creative Design Supports Hutongs Community Participation

    In the context of the urban renovation process, hutong community has become the focus of creative design in Bei**g, and there have been practical cases of hutongs that can improve public participation and acc...

    Huan Wang, Zhiyong Fu in Cross-Cultural Design. Applications in Cul… (2018)

  19. No Access

    Article

    An event detection method for social networks based on hybrid link prediction and quantum swarm intelligent

    How can we discover and estimate major events in complex social networks? Even with ever enlarging networks and data scale? Event detection and evaluation in social networks provide an effective solution, whic...

    Wenbin Hu, Huan Wang, Zhenyu Qiu, Cong Nie, Li** Yan, Bo Du in World Wide Web (2017)

  20. No Access

    Chapter and Conference Paper

    An Efficient Passive Authentication Scheme for Copy-Move Forgery Based on DCT

    Digital images can be easily manipulated due to availability of powerful image processing software. Passive authentication as a common challenge method of digital image authentication is extensively used to de...

    Huan Wang, Hongxia Wang, Canghong Shi in Cloud Computing and Security (2016)

previous disabled Page of 2