Skip to main content

previous disabled Page of 5
and
  1. No Access

    Article

    Resisting TUL attack: balancing data privacy and utility on trajectory via collaborative adversarial learning

    Nowadays, large-scale individual trajectories can be collected by various location-based social network services, which enables us to better understand human mobility patterns. However, the trajectory data usu...

    Yandi Lun, Hao Miao, Jiaxing Shen, Renzhi Wang, **ang Wang, Senzhang Wang in GeoInformatica (2024)

  2. No Access

    Article

    CLIP-guided Prototype Modulating for Few-shot Action Recognition

    Learning from large-scale contrastive language-image pre-training like CLIP has shown remarkable success in a wide range of downstream tasks recently, but it is still under-explored on the challenging few-shot...

    **ang Wang, Shiwei Zhang, Jun Cen, Changxin Gao in International Journal of Computer Vision (2024)

  3. No Access

    Article

    The sequence reconstruction problem for permutations with the Hamming distance

    V. Levenshtein first proposed the sequence reconstruction problem in 2001. This problem studies the same sequence from some set is transmitted over multiple channels, and the decoder receives the different out...

    **ang Wang, Elena V. Konstantinova in Cryptography and Communications (2024)

  4. No Access

    Article

    Nonexistence of perfect permutation codes under the \(\ell _{\infty }\) -metric

    Permutation codes are studied due to their numerous applications in various applications, such as power line communications, block ciphers, and coding for storage. In this paper, we study perfect permutation c...

    **ang Wang, Wenjuan Yin, Fang-Wei Fu in Applicable Algebra in Engineering, Communi… (2024)

  5. No Access

    Chapter and Conference Paper

    Compactness and Separateness Driven Fuzzy Clustering Validity Index Called TLW

    The design of validity index of fuzzy clustering has always been a historical problem in fuzzy clustering field. When the distribution of cluster centers is very close, it is difficult for the existing fuzzy c...

    Yiming Tang, **ang Wang, Bing Li in Computer Supported Cooperative Work and So… (2024)

  6. No Access

    Chapter and Conference Paper

    An Irregularly Shaped Plane Layout Generation Method with Boundary Constraints

    We propose a novel method that aims to automatically generate outdoor building layouts based on given boundary constraints. It effectively solves the problem of irregular shapes that occur in practical applica...

    **ang Wang, Lin Li, Liang He, ** Liu in Computer-Aided Design and Computer Graphics (2024)

  7. No Access

    Chapter and Conference Paper

    Conversations in the Cloud: Crafting Harmony in AliCloud Computing Interaction Design

    With the rapid development of cloud services, it has become the core driving force for innovation and business development in the digital era. The emerging technology of cloud computing has transformed cloud s...

    **ntong Huang, Yiqi Chen, Dan Qiu, Xuan Zhou in Design, User Experience, and Usability (2024)

  8. Article

    Open Access

    Probabilistic linguistic evolutionary game with risk perception in applications to carbon emission reduction decision making

    Carbon emission reduction, an effective way to facilitate carbon neutrality, has gained increasing attention in government policy and scientific research. However, the establishment of a sustainable carbon emi...

    Zhinan Hao, **ang Wang, Yaojia Zhang, Ren Zhang in Applied Intelligence (2023)

  9. Article

    Open Access

    Minimum Power Adversarial Attacks in Communication Signal Modulation Classification with Deep Learning

    Integrating cognitive radio (CR) technique with wireless networks is an effective way to solve the increasingly crowded spectrum. Automatic modulation classification (AMC) plays an important role in CR. AMC si...

    Da Ke, **ang Wang, Kaizhu Huang, Haoyuan Wang, Zhitao Huang in Cognitive Computation (2023)

  10. No Access

    Article

    A fast second-order scheme for nonlinear Riesz space-fractional diffusion equations

    In this paper, the fractional centered difference formula is employed to discretize the Riesz derivative, while the Crank-Nicolson scheme is approximated the time derivative, and the explicit linearized techni...

    Chun-Hua Zhang, Jian-Wei Yu, **ang Wang in Numerical Algorithms (2023)

  11. No Access

    Article

    A robust reversible watermarking scheme overcomes the misalignment problem of generalized histogram shifting

    There are a lot of reversible watermarking (RW) methods have been proposed to losslessly embed watermarks. However, the embedding process of reversible watermarks is fragile, i.e., the hiding data can not resi...

    Qianwen Li, **ang Wang, Qingqi Pei in Multimedia Tools and Applications (2023)

  12. No Access

    Chapter and Conference Paper

    A SAR Image Preprocessing Algorithm Based on Improved Homomorphic Wavelet Transform and Retinex

    Synthetic Aperture Radar (SAR) imaging technology is gradually applied in the field of security inspection. However, the existence of speckle noise in SAR image will seriously affect its image interpretation a...

    Jianchao Wang, Hainan Cheng, **ang Wang, Yi** Zhao in Machine Learning for Cyber Security (2023)

  13. No Access

    Chapter and Conference Paper

    EIMDC: A New Model for Designing Digital Twin Applications

    With the development of communications and big data, digital twin as a novel paradigm has been received insentive attentions. However, there are some huge challenges in designing digital twins due to the compl...

    **ang Wang, Haimin Hong, **g Zeng, Yongming Sun in Internet of Things – ICIOT 2022 (2023)

  14. No Access

    Chapter and Conference Paper

    Adaptive Cost Aggregation in Iterative Depth Estimation for Efficient Multi-view Stereo

    The deep multi-view stereo (MVS) approaches generally construct 3D cost volumes to regularize and regress the depth map. These methods are limited with high-resolution outputs since the memory and time costs g...

    **ang Wang, **ao Bai, Chen Wang in Image and Graphics (2023)

  15. No Access

    Chapter and Conference Paper

    Semi-supervised Learning Enabled Fault Analysis Method for Power Distribution Network Based on LSTM Autoencoder and Attention Mechanism

    By upgrading the existing distribution network fault statistical analysis system of Shanghai Institute of Electrical Science and Technology, comprehensive research is needed to investigate the hardware configu...

    Haining **e, Liming Zhuang, **ang Wang in Big Data and Security (2023)

  16. No Access

    Chapter and Conference Paper

    ISP-FESAN: Improving Significant Wave Height Prediction with Feature Engineering and Self-attention Network

    In coastal cities, accurate wave forecasting provides vital safety for the marine operations of ships and the construction of coastal projects. However, it is challenging to accurately forecast ocean waves due...

    Jiaming Tan, **aoyong Li, Junxing Zhu, **ang Wang in Neural Information Processing (2023)

  17. No Access

    Article

    Reconstruction of permutations distorted by single Kendall τ-errors

    Levenshtein first put forward the sequence reconstruction problem in 2001. This problem sets a model in which a sequence from some set is transmitted over multiple channels, and the decoder receives the differ...

    **ang Wang in Cryptography and Communications (2023)

  18. No Access

    Chapter and Conference Paper

    Multi-task Adversarial Learning for Semi-supervised Trajectory-User Linking

    Trajectory-User Linking (TUL), which aims to link the trajectories to the users who have generated them, is critically important to many real applications. Existing approaches generally consider TUL as a super...

    Sen Zhang, Senzhang Wang, **ang Wang in Machine Learning and Knowledge Discovery i… (2023)

  19. No Access

    Chapter and Conference Paper

    A Robot Foreign Object Inspection Algorithm for Transmission Line Based on Improved YOLOv5

    Aiming at the problems of slow detection rate and low accuracy of traditional transmission line inspection methods, a transmission line target detection model based on improved YOLOv5 is proposed in this paper...

    Zhenzhou Wang, **aoyue **e, **ang Wang, Yi** Zhao in Machine Learning for Cyber Security (2023)

  20. No Access

    Article

    Rumor detection with self-supervised learning on texts and social graph

    Rumor detection has become an emerging and active research field in recent years. At the core is to model the rumor characteristics inherent in rich information, such as propagation patterns in social network ...

    Yuan Gao, **ang Wang, **angnan He, Huamin Feng in Frontiers of Computer Science (2022)

previous disabled Page of 5