Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Rule-based adversarial sample generation for text classification

    In Text Classification, modern neural networks have achieved great performance, but simultaneously, it is sensitive to adversarial examples. Existing studies usually use synonym replacement or token insertion ...

    Nai Zhou, Nianmin Yao, Jian Zhao, Yanan Zhang in Neural Computing and Applications (2022)

  2. No Access

    Article

    GeSe: Generalized static embedding

    In natural language processing, most text representation methods can be generally categorized into two paradigms: static and dynamic. Both have distinctive advantages, which are reflected in the cost of traini...

    Ning Gong, Nianmin Yao in Applied Intelligence (2022)

  3. No Access

    Article

    Self attention mechanism of bidirectional information enhancement

    Self attention mechanism is widely used in relation extraction, emotion classification and other tasks. It can extract a wide range of relevance information in the text. The attention mode of the existing self...

    Qibin Li, Nianmin Yao, Jian Zhao, Yanan Zhang in Applied Intelligence (2022)

  4. No Access

    Article

    A message transmission scheduling algorithm based on time-domain interference alignment in UWANs

    High propagation delays cause message collisions at intended nodes, which seriously affects network performance. In this paper, we consider the transmission scheduling problem of messages with specified transm...

    Nan Zhao, Nianmin Yao, Zhenguo Gao in Peer-to-Peer Networking and Applications (2021)

  5. No Access

    Article

    Evolutionary selection for regression test cases based on diversity

    Although there are various studies related to selecting test cases, few are available for both path coverage and coverage balance. Our method is to select test cases that both traverse target paths and achieve...

    Baoying Ma, Li Wan, Nianmin Yao, Shu** Fan, Yan Zhang in Frontiers of Computer Science (2020)

  6. No Access

    Article

    Efficient data transfer in clustered IoT network with cooperative member nodes

    Wireless Sensor Network (WSN) is composed of numerous tiny smart sensors nodes integrated with Internet of Things (IoT) play a crucial role in many applications. The IoT connects physical devices to form a net...

    Begum Seema, Nianmin Yao, Anil Carie in Multimedia Tools and Applications (2020)

  7. No Access

    Article

    Generating word and document matrix representations for document classification

    We present an effective word and document matrix representation architecture based on a linear operation, referred to as doc2matrix, to learn representations for document-level classification. It uses a matrix...

    Shun Guo, Nianmin Yao in Neural Computing and Applications (2020)

  8. No Access

    Chapter and Conference Paper

    Memory Confidentiality and Integrity Protection Technology

    In most existing computer systems, data transmission and preservation in the form of plaintext are vulnerable to various attacks. In this paper, we use Parralelized memory Confidentiality and Integrity Protect...

    Hong** Wang, Huimin Meng, Nianmin Yao in Communications, Signal Processing, and Sys… (2020)

  9. No Access

    Article

    The impact of preprocessing steps on the accuracy of machine learning algorithms in sentiment analysis

    Big data and its related technologies have become active areas of research recently. There is a huge amount of data generated every minute and second that includes unstructured data which is the topic of inter...

    Saqib Alam, Nianmin Yao in Computational and Mathematical Organization Theory (2019)

  10. No Access

    Article

    Big Data Analytics, Text Mining and Modern English Language

    The modern English Language took centuries to convert from old English. The word ‘hath’ of old English for example, has taken centuries to become ‘have’ in the modern English Language. If these changes had not be...

    Saqib Alam, Nianmin Yao in Journal of Grid Computing (2019)

  11. No Access

    Article

    A RSU-aided distributed trust framework for pseudonym-enabled privacy preservation in VANETs

    Vehicular ad hoc networks (VANETs) have the potential to change the way of people drive, travel and so on, in which vehicle can broadcast and forward the message of road condition or emergency. When the receiv...

    Shibin Wang, Nianmin Yao in Wireless Networks (2019)

  12. No Access

    Article

    Efficient key generation leveraging channel reciprocity and balanced gray code

    Key generation leveraging wireless channel reciprocity can establish secret keys from unauthenticated broadcast channels and thus protect the communication of wireless networks. However, in real environments, ...

    Furui Zhan, Nianmin Yao, Zhenguo Gao, Zhimao Lu, Bingcai Chen in Wireless Networks (2019)

  13. No Access

    Article

    An anonymous data reporting strategy with ensuring incentives for mobile crowd-sensing

    To address the challenges of privacy preserving and incentive mechanisms, the paper proposes a system and a strategy to ensure anonymous data reporting while ensuring incentives simultaneously. The envisioned ...

    Yang Li, Yunlong Zhao, Serrat Ishak in Journal of Ambient Intelligence and Humani… (2018)

  14. No Access

    Article

    A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs

    Location privacy plays an important role in Vehicular Ad Hoc Networks (VANETs). Pseudonym is normally used to preserve location privacy, which can meet the requirements of both privacy and security. When the s...

    Shibin Wang, Nianmin Yao, Ning Gong in Peer-to-Peer Networking and Applications (2018)

  15. No Access

    Article

    A Novel Problem Model and Solution Scheme for Roadside Unit Deployment Problem in VANETs

    Being the building block of network infrastructure for Vehicular Ad-hoc Networks (VANETs), Roadside Units (RSUs) can facilitate vehicle-to-vehicle communications and bridge communications between vehicles and ...

    Zhenguo Gao, Danjie Chen, Nianmin Yao, Zhimao Lu in Wireless Personal Communications (2018)

  16. No Access

    Article

    Outage Probability of Cognitive Selective DF Relay Networks with Multiple Primary Nodes and Heterogenous Non-Identical Constraints

    Outage probability analysis of cognitive selective DF relay networks with selection combining technique taking into account all the following issues is important: multiple SU relays, multiple PUs, non-identica...

    Zhenguo Gao, Danjie Chen, Nianmin Yao, Zhimao Lu in Wireless Personal Communications (2017)

  17. No Access

    Chapter and Conference Paper

    EFAV-MERD: Expected Forwarding Area Volume and Residual Distance Mathematic Expectation Routing Protocol for UASNs

    The design of routing protocols for Underwater Acoustic Sensor Networks (UASNs) has many challenges arising from long variable propagation delay, high mobility in 3D environments, limited bandwidth, energy-con...

    Haitao Yu, Qingwen Wang, Nianmin Yao in Security, Privacy, and Anonymity in Comput… (2017)

  18. No Access

    Article

    Outage Probability Equivalency of Three Typical Relay Selection Schemes for Selective DF Relay Networks with Selection Combining

    Outage probability of selective decode-and-forward (DF) relay networks with different relay selection schemes are usually analyzed separately in the literature. In this paper, for selective DF relay networks w...

    Zhenguo Gao, Danjie Chen, Bingcai Chen, Zhimao Lu in Wireless Personal Communications (2015)

  19. Article

    Open Access

    A reliable data transfer protocol based on twin paths and network coding for underwater acoustic sensor network

    MPNC (multiple path and network coding) is proposed as a reliable transport protocol for UWASN (underwater acoustic sensor network). In MPNC, after three disjoint paths being established, two groups of packets (A

    Shaobin Cai, Nianmin Yao, Zhenguo Gao in EURASIP Journal on Wireless Communications… (2015)

  20. No Access

    Article

    Outage Analysis of Cognitive AF Relay Networks with Multiple Primary Users and Heterogeneous Non-identical Parameters

    In this paper, we investigate outage performance of dual-hop cognitive AF relay networks with multiple primary users (PUs) and heterogeneous non-identical parameters, including non-identical Rayleigh fading ch...

    Zhenguo Gao, Danjie Chen, Bingcai Chen, Nianmin Yao in Wireless Personal Communications (2014)

previous disabled Page of 2