Skip to main content

and
Your search also matched 136 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

A reweighting method for speech recognition with imbalanced data of Mandarin and sub-dialects

Include preview-only content
  1. Article

    Open Access

    Feature selection strategies: a comparative analysis of SHAP-value and importance-based methods

    In the context of high-dimensional credit card fraud data, researchers and practitioners commonly utilize feature selection techniques to enhance the performance of fraud detection models. This study presents ...

    Huan**g Wang, Qianxin Liang, John T. Hancock, Taghi M. Khoshgoftaar in Journal of Big Data (2024)

  2. Article

    Open Access

    Amplitude-modulated EM side-channel attack on provably secure masked AES

    Recently a new type of side channels was discovered, called amplitude-modulated electromagnetic (EM) emanations from mixed-signal circuits. Unlike power analysis or near field EM analysis, attacks based on amp...

    Huanyu Wang in Journal of Cryptographic Engineering (2024)

  3. Article

    Open Access

    Harmfulness metrics in digital twins of social network rumors detection in cloud computing environment

    Social network rumor harm metric is a task to score the harm caused by a rumor by analyzing the spreading range of the rumor, the users affected, the repercussions caused, etc., and then the harm caused by the...

    Hao Li, Wu Yang, Wei Wang, Huanran Wang in Journal of Cloud Computing (2024)

  4. Article

    Open Access

    Data reduction techniques for highly imbalanced medicare Big Data

    In the domain of Medicare insurance fraud detection, handling imbalanced Big Data and high dimensionality remains a significant challenge. This study assesses the combined efficacy of two data reduction techni...

    John T. Hancock, Huan**g Wang, Taghi M. Khoshgoftaar, Qianxin Liang in Journal of Big Data (2024)

  5. Article

    Open Access

    Explainable machine learning models for Medicare fraud detection

    As a means of building explainable machine learning models for Big Data, we apply a novel ensemble supervised feature selection technique. The technique is applied to publicly available insurance claims data f...

    John T. Hancock, Richard A. Bauder, Huan**g Wang in Journal of Big Data (2023)

  6. Article

    Examining the applications of intelligent tutoring systems in real educational contexts: A systematic literature review from the social experiment perspective

    Intelligent Tutoring Systems (ITSs) have a great potential to effectively transform teaching and learning. As more efforts have been put on designing and develo** ITSs and integrating them within learning an...

    Huanhuan Wang, Ahmed Tlili, Ronghuai Huang in Education and Information Technologies (2023)

  7. Article

    Open Access

    Tandem Deep Learning Side-Channel Attack on FPGA Implementation of AES

    Side-channel attacks have become a realistic threat to implementations of cryptographic algorithms, especially with the help of deep-learning techniques. The majority of recently demonstrated deep-learning sid...

    Huanyu Wang, Elena Dubrova in SN Computer Science (2021)

  8. Article

    Open Access

    Investigating feedback implemented by instructors to support online competency-based learning (CBL): a multiple case study

    Instructional feedback has the power to enhance learning. However, learners do not always feel satisfied with their feedback experience. Simultaneously, little attention has been paid on investigating how feed...

    Huanhuan Wang, Ahmed Tlili, James D. Lehman in International Journal of Educational Techn… (2021)

  9. Chapter and Conference Paper

    Study on Restoration-Oriented Digital Visualization for Architectural Trim-Work of Guanlan Hall in Yuanming Yuan

    Today computing techniques and sophisticated digital tools are changing architectural heritage, conservation and restoration. In this paper, we study the historical architecture of the Yuanming Yuan imperial G...

    Huan Wang, Jue Zhong, Wen Li, Cameron Clarke in Cross-Cultural Design. Applications in Hea… (2020)

  10. Chapter and Conference Paper

    Urban Interaction Design Supports Modular Design Practice for Urban Public Space

    Multiple-dimensional structured urban space directs to an inter-disciplinary considers on public space utilization. The people-users are consciously and unconsciously in the communicative activities with the c...

    Huan Wang, Ming Yan, Han **e, Zhiyong Fu in Cross-Cultural Design. Culture and Society (2019)

  11. Chapter and Conference Paper

    Automated Segmentation of Intervertebral Disc Using Fully Dilated Separable Deep Neural Networks

    Accurate segmentation of intervertebral discs is a critical task in clinical diagnosis and treatment. Despite recent progress in applying deep learning to the segmentation of multiple natural image scenarios, ...

    Huan Wang, Ran Gu, Zhongyu Li in Computational Methods and Clinical Applica… (2019)

  12. Chapter and Conference Paper

    Bridge the Physical and Virtual Design for Hutongs - Creative Design Supports Hutongs Community Participation

    In the context of the urban renovation process, hutong community has become the focus of creative design in Bei**g, and there have been practical cases of hutongs that can improve public participation and acc...

    Huan Wang, Zhiyong Fu in Cross-Cultural Design. Applications in Cul… (2018)

  13. Chapter and Conference Paper

    Erratum to: Speech Authentication and Recovery Scheme in Encrypted Domain

    Qing Qian, Hongxia Wang, Sani M. Abdullahi, Huan Wang in Digital Forensics and Watermarking (2017)

  14. Article

    Open Access

    C2MP: Chebyshev chaotic map-based authentication protocol for RFID applications

    Radio frequency identification (RFID) is a promising wireless sensor technology in the Internet of Things and can be applied for object identification. However, the security issues are still open challenges an...

    Zhihua Zhang, Huanwen Wang, Yanghua Gao in Personal and Ubiquitous Computing (2015)

  15. Chapter and Conference Paper

    Retraction Note to: A Situation-Aware Method Based on Ontology Analysis of the Semantic Social Network

    The authors have retracted this chapter [1] because the method described in the chapter is based on the wrong data set, which means that the experimental results cannot be reproduced. All authors agree with th...

    Wenbin Hu, Huan Wang in Knowledge Science, Engineering and Management (2015)

  16. Chapter and Conference Paper

    Road Detection Based on Image Boundary Prior

    As for vision based road detection, most of color based methods use a center-lower region as a “safe” road region to model road appearance. However, this region heavily relies on the pose of ego-vehicle. Color...

    Huan Wang, Yan Gong, Yangyang Hou, Ting Cao in Image and Graphics (2015)

  17. Chapter and Conference Paper

    An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation

    An extended multi-secret images scheme based on Boolean operation is proposed, which is used to encrypt secret images with different dimensions to generate share images with the same dimension. The proposed sc...

    Huan Wang, Mingxing He, **ao Li in Information and Communication Technology (2013)

  18. Chapter and Conference Paper

    A Hidden Pattern Discovery and Meta-synthesis of Preference Adjustment in Group Decision-Making

    Two aspects of group decision-making (GDM) have received much attention since its appearance, one is the organizing process of GDM which emphasizes in particular on behavioral science and qualitative analysis,...

    Huizhang Shen, Jidi Zhao, Huanchen Wang in Computational Science – ICCS 2007 (2007)