Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    ATS: A Fully Automatic Troubleshooting System with Efficient Anomaly Detection and Localization

    As network scale expands and concurrent requests grow, unexpected network anomalies are more frequent, leading to service interruptions and degraded user experience. Real-time, accurate troubleshooting is crit...

    Lu Yuan, Yuan Meng, Jiyan Sun, Shangyuan Zhuang in Computational Science – ICCS 2023 (2023)

  2. No Access

    Chapter and Conference Paper

    Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection

    Millions of radio frequency identification (RFID) tags are pervasively used all around the globe to identify a wide variety of objects inexpensively. However, the tag cannot use energy-hungry cryptography due ...

    Yue Feng, Weiqing Huang, Siye Wang in Collaborative Computing: Networking, Appli… (2022)

  3. No Access

    Chapter and Conference Paper

    MEBV: Resource Optimization for Packet Classification Based on Map** Encoding Bit Vectors

    Packet classification plays a key role in network security systems such as firewalls and QoS. The so-called packet classification is to classify packets into different categories according to a set of predefin...

    Feng Guo, Ning Zhang, Qian Zou in Wireless Algorithms, Systems, and Applicat… (2022)

  4. No Access

    Chapter and Conference Paper

    An Efficient Interference Calculation Model Based on Large Scale Constellations Probabilistic Analysis

    With the large scale NGSO constellation systems entering the blowout launch period, new challenges are expected for inter-system satellite coexistence due to the increase in scale of the constellations and the...

    Yiqing Liu, Weiqing Huang, Wen Wang in Wireless Algorithms, Systems, and Applicat… (2022)

  5. No Access

    Chapter and Conference Paper

    Aspect and Opinion Terms Co-extraction Using Position-Aware Attention and Auxiliary Labels

    Aspect and opinion terms co-extraction is to extract what target is being discussed from the sentences and know what kind of emotion this target has. There are many studies about this task. To obtain the impor...

    Chao Liu, **ntong Wei, Min Yu, Gang Li in Knowledge Science, Engineering and Managem… (2021)

  6. No Access

    Chapter and Conference Paper

    Landscape-Enhanced Graph Attention Network for Rumor Detection

    Rumor detection aims to classify the truthfulness of content on social media. Due to the rapid development of web-based social platforms, rumors are disseminated in an ever faster speed. Recently, this problem...

    Jianguo Jiang, Qiang Liu, Min Yu, Gang Li in Knowledge Science, Engineering and Managem… (2021)

  7. No Access

    Chapter and Conference Paper

    AMQAN: Adaptive Multi-Attention Question-Answer Networks for Answer Selection

    Community Question Answering (CQA) provides platforms for users with various background to obtain information and share knowledge. In the recent years, with the rapid development of such online platforms, an e...

    Haitian Yang, Weiqing Huang, Xuan Zhao in Machine Learning and Knowledge Discovery i… (2021)

  8. No Access

    Chapter and Conference Paper

    Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple Detectors

    Web shells are commonly used to transfer malicious scripts in order to control web servers remotely. Malicious web shells are detected by extracting the feature profiles of known web shells and creating a lear...

    Weiqing Huang, Chenggang Jia, Min Yu, Kam-Pui Chow in Advances in Digital Forensics XVI (2020)

  9. No Access

    Chapter and Conference Paper

    Depthwise Separable Convolutional Neural Network for Confidential Information Analysis

    Confidential information analysis can identify the text containing confidential information, thereby protecting organizations from the threat posed by leakage of confidential information. It is effective to bu...

    Yue Lu, Jianguo Jiang, Min Yu, Chao Liu in Knowledge Science, Engineering and Managem… (2020)

  10. No Access

    Chapter and Conference Paper

    A Robust Representation with Pre-trained Start and End Characters Vectors for Noisy Word Recognition

    Powered by the advanced neural network, many tasks in the field of natural language processing could be completed by the network models. As the noise in the input text can affect negatively on the performance ...

    Chao Liu, **angmei Ma, Min Yu, **nghua Wu in Knowledge Science, Engineering and Managem… (2020)

  11. No Access

    Chapter and Conference Paper

    SCX-SD: Semi-supervised Method for Contextual Sarcasm Detection

    Sarcasm detection is to identify the text with the author’s sarcastic attitude. Verbal sarcasm is one main error sources of sentiment analysis tasks. However, labeled sarcastic samples are expensive to obtain....

    Meimei Li, Chen Lang, Min Yu, Yue Lu in Knowledge Science, Engineering and Managem… (2020)

  12. No Access

    Chapter and Conference Paper

    Restoration as a Defense Against Adversarial Perturbations for Spam Image Detection

    Spam image detection is essential for protecting the security and privacy of Internet users and saving network resources. However, we observe a spam image detection system might be out of order due to adversar...

    Jianguo Jiang, Boquan Li, Min Yu, Chao Liu in Artificial Neural Networks and Machine Lea… (2019)

  13. No Access

    Chapter and Conference Paper

    Research on Physical Layer Security Scheme Based on OAM

    Aiming at the physical layer information security risk in wireless communication system, a physical layer security transmission technology based on OAM (Orbital angular momentum) modulation is proposed in this...

    Weiqing Huang, Yan Li, Dong Wei in Wireless Algorithms, Systems, and Applicat… (2019)

  14. No Access

    Chapter and Conference Paper

    Effect of Dam** Factor Variation on Eigenfrequency Drift for Ultrasonic Motors

    Experimental studies reveal that the eigenfrequency of stator is increasing along with the growing preload. However, the inherent mechanism is obscure and the equivalent physical model is not investigated espe...

    Dawei An, Qingshuang Ning, Weiqing Huang in Intelligent Robotics and Applications (2019)

  15. No Access

    Chapter and Conference Paper

    A Two-Stage Model Based on BERT for Short Fake News Detection

    Online social media promotes the development of the news industry and make it easy for everyone to obtain the latest news. Meanwhile, the circumstances get worse because of fake news. Fake news is flooding and...

    Chao Liu, **nghua Wu, Min Yu, Gang Li in Knowledge Science, Engineering and Managem… (2019)

  16. No Access

    Chapter and Conference Paper

    AdvRefactor: A Resampling-Based Defense Against Adversarial Attacks

    Deep neural networks have achieved great success in many domains. However, they are vulnerable to adversarial attacks, which generate adversarial examples by adding tiny perturbations to legitimate images. Previo...

    Jianguo Jiang, Boquan Li, Min Yu, Chao Liu in Advances in Multimedia Information Process… (2018)

  17. No Access

    Chapter and Conference Paper

    Sentiment Embedded Semantic Space for More Accurate Sentiment Analysis

    Word embedding is one common word vector representation with improved performance for sentiment analysis task. Most existing methods of learning context-based word embedding are semantic oriented, but they typ...

    Jianguo Jiang, Yue Lu, Min Yu, Gang Li in Knowledge Science, Engineering and Managem… (2018)

  18. No Access

    Chapter and Conference Paper

    HEVC Lossless Compression Coding Based on Hadamard Butterfly Transformation

    Efficient video transmission has always been an important challenge in the field of computer networks. Elegant compression coding strategy will signicantly alleviate the heavy burden on network bandwidth. High...

    ** Yin, Weiqing Huang, Mohsen Guizani in Wireless Algorithms, Systems, and Applications (2018)