-
Article
Resisting TUL attack: balancing data privacy and utility on trajectory via collaborative adversarial learning
Nowadays, large-scale individual trajectories can be collected by various location-based social network services, which enables us to better understand human mobility patterns. However, the trajectory data usu...
-
Article
CLIP-guided Prototype Modulating for Few-shot Action Recognition
Learning from large-scale contrastive language-image pre-training like CLIP has shown remarkable success in a wide range of downstream tasks recently, but it is still under-explored on the challenging few-shot...
-
Article
The sequence reconstruction problem for permutations with the Hamming distance
V. Levenshtein first proposed the sequence reconstruction problem in 2001. This problem studies the same sequence from some set is transmitted over multiple channels, and the decoder receives the different out...
-
Article
Nonexistence of perfect permutation codes under the \(\ell _{\infty }\) -metric
Permutation codes are studied due to their numerous applications in various applications, such as power line communications, block ciphers, and coding for storage. In this paper, we study perfect permutation c...
-
Chapter and Conference Paper
Compactness and Separateness Driven Fuzzy Clustering Validity Index Called TLW
The design of validity index of fuzzy clustering has always been a historical problem in fuzzy clustering field. When the distribution of cluster centers is very close, it is difficult for the existing fuzzy c...
-
Chapter and Conference Paper
An Irregularly Shaped Plane Layout Generation Method with Boundary Constraints
We propose a novel method that aims to automatically generate outdoor building layouts based on given boundary constraints. It effectively solves the problem of irregular shapes that occur in practical applica...
-
Chapter and Conference Paper
Conversations in the Cloud: Crafting Harmony in AliCloud Computing Interaction Design
With the rapid development of cloud services, it has become the core driving force for innovation and business development in the digital era. The emerging technology of cloud computing has transformed cloud s...
-
Article
Open AccessProbabilistic linguistic evolutionary game with risk perception in applications to carbon emission reduction decision making
Carbon emission reduction, an effective way to facilitate carbon neutrality, has gained increasing attention in government policy and scientific research. However, the establishment of a sustainable carbon emi...
-
Article
Open AccessMinimum Power Adversarial Attacks in Communication Signal Modulation Classification with Deep Learning
Integrating cognitive radio (CR) technique with wireless networks is an effective way to solve the increasingly crowded spectrum. Automatic modulation classification (AMC) plays an important role in CR. AMC si...
-
Article
A fast second-order scheme for nonlinear Riesz space-fractional diffusion equations
In this paper, the fractional centered difference formula is employed to discretize the Riesz derivative, while the Crank-Nicolson scheme is approximated the time derivative, and the explicit linearized techni...
-
Article
A robust reversible watermarking scheme overcomes the misalignment problem of generalized histogram shifting
There are a lot of reversible watermarking (RW) methods have been proposed to losslessly embed watermarks. However, the embedding process of reversible watermarks is fragile, i.e., the hiding data can not resi...
-
Chapter and Conference Paper
A SAR Image Preprocessing Algorithm Based on Improved Homomorphic Wavelet Transform and Retinex
Synthetic Aperture Radar (SAR) imaging technology is gradually applied in the field of security inspection. However, the existence of speckle noise in SAR image will seriously affect its image interpretation a...
-
Chapter and Conference Paper
EIMDC: A New Model for Designing Digital Twin Applications
With the development of communications and big data, digital twin as a novel paradigm has been received insentive attentions. However, there are some huge challenges in designing digital twins due to the compl...
-
Chapter and Conference Paper
Adaptive Cost Aggregation in Iterative Depth Estimation for Efficient Multi-view Stereo
The deep multi-view stereo (MVS) approaches generally construct 3D cost volumes to regularize and regress the depth map. These methods are limited with high-resolution outputs since the memory and time costs g...
-
Chapter and Conference Paper
Semi-supervised Learning Enabled Fault Analysis Method for Power Distribution Network Based on LSTM Autoencoder and Attention Mechanism
By upgrading the existing distribution network fault statistical analysis system of Shanghai Institute of Electrical Science and Technology, comprehensive research is needed to investigate the hardware configu...
-
Chapter and Conference Paper
ISP-FESAN: Improving Significant Wave Height Prediction with Feature Engineering and Self-attention Network
In coastal cities, accurate wave forecasting provides vital safety for the marine operations of ships and the construction of coastal projects. However, it is challenging to accurately forecast ocean waves due...
-
Article
Reconstruction of permutations distorted by single Kendall τ-errors
Levenshtein first put forward the sequence reconstruction problem in 2001. This problem sets a model in which a sequence from some set is transmitted over multiple channels, and the decoder receives the differ...
-
Chapter and Conference Paper
Multi-task Adversarial Learning for Semi-supervised Trajectory-User Linking
Trajectory-User Linking (TUL), which aims to link the trajectories to the users who have generated them, is critically important to many real applications. Existing approaches generally consider TUL as a super...
-
Chapter and Conference Paper
A Robot Foreign Object Inspection Algorithm for Transmission Line Based on Improved YOLOv5
Aiming at the problems of slow detection rate and low accuracy of traditional transmission line inspection methods, a transmission line target detection model based on improved YOLOv5 is proposed in this paper...
-
Article
Rumor detection with self-supervised learning on texts and social graph
Rumor detection has become an emerging and active research field in recent years. At the core is to model the rumor characteristics inherent in rich information, such as propagation patterns in social network ...