Skip to main content

previous disabled Page of 10
and
  1. Article

    Retraction Note: Periodic multimedia spectrum sensing method based on high-order anti-jamming mechanism in cognitive wireless networks

    Yanli Ji, Weidong Wang, Yinghai Zhang in Multimedia Tools and Applications (2024)

  2. No Access

    Article

    JoCaD: a joint training method by combining consistency and diversity

    Noisy labels due to mistakes in manual labeling or data collecting are challenging for the expansion of deep neural network applications. Current robust network learning methods such as Decoupling, Co-teaching...

    Heyan Yang, Hui Yin, Zhengze Yang, Yingjun Zhang in Multimedia Tools and Applications (2024)

  3. No Access

    Chapter and Conference Paper

    Efficient Maximum Relative Fair Clique Computation in Attributed Graphs

    Cohesive subgraph mining is a fundamental problem in attributed graph analysis. However, the existing models on attributed graphs ignore the fairness of attributes. In this paper, we propose a novel model, cal...

    Yufeng Zhang, Shiyuan Liu, Yan** Wu, Lu Qin in Databases Theory and Applications (2024)

  4. No Access

    Chapter and Conference Paper

    Discovering Densest Subgraph over Heterogeneous Information Networks

    Densest Subgraph Discovery (DSD) is a fundamental and challenging problem in the field of graph mining in recent years. The DSD aims to determine, given a graph G, the subgraph with the maximum density according ...

    Haozhe Yin, Kai Wang, Wenjie Zhang, Dong Wen in Databases Theory and Applications (2024)

  5. No Access

    Chapter and Conference Paper

    Balanced Hop-Constrained Path Enumeration in Signed Directed Graphs

    Hop-constrained path enumeration, which aims to output all the paths from two distinct vertices within the given hops, is one of the fundamental tasks in graph analysis. Previous works about this problem mainl...

    Zhiyang Tang, **ghao Wang, Yan** Wu, **aoyang Wang in Databases Theory and Applications (2024)

  6. No Access

    Chapter and Conference Paper

    DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection

    Among indoor localization services, WiFi fingerprint technology has attracted much attention because of its wide coverage area and high positioning accuracy. However, concerns arise regarding the vulnerability...

    Yinghui Zhang, Haorui Du, ** Cao, Gang Han in Information Security and Cryptology (2024)

  7. No Access

    Chapter and Conference Paper

    C2FC: Coarse-to-fine Contour-Based Method for Interactive Medical Image Segmentation

    Existing contour-based methods for interactive segmentation of medical images have achieved great success. However, these methods neglect the large shape error between the initial contour and the ground truth....

    Wenrui Luo, Yingxuan Zhang, Bohua Wang, Lei Sun in Artificial Intelligence and Robotics (2024)

  8. No Access

    Chapter and Conference Paper

    A Checklist for the Usability Evaluation of Artificial Intelligence (AI) mHealth Applications Graphical User Interface

    The download rate of AI mobile health (mHealth) apps has increased rapidly, and there are many usability evaluation studies based on mobile apps, but few studies have been conducted on the usability of AI mHea...

    Chanjuan Tu, Alessia Russo, Ying Zhang in Design, User Experience, and Usability (2024)

  9. No Access

    Article

    Reversible data hiding in enhanced images with anti-detection capability

    Reversible data hiding (RDH) technique has been widely used for content authentication. However, most conventional RDH schemes generally concentrates on the rate-and-distortion performance (namely high capacit...

    Junxiang Wang, Ying Zhang, Lin Huang, Chuntao Wang in Multimedia Tools and Applications (2024)

  10. No Access

    Chapter and Conference Paper

    An Android Malware Detection Method Based on Optimized Feature Extraction Using Graph Convolutional Network

    With the development of the mobile Internet, mobile devices have been extensively promoted and popularized. Android, as the current popular mobile intelligent operating system, has encountered problems such as...

    Zhiqiang Wang, Zhuoyue Wang, Ying Zhang in Digital Forensics and Cyber Crime (2024)

  11. No Access

    Article

    An algorithm of non-negative matrix factorization with the nearest neighbor after per-treatments

    Clustering is a hot topic in machine learning. For high dimension data, nonnegative matrix factorization (NMF) is a crucial technology in clustering. However, NMF has some disadvantages. First, NMF clusters da...

    Mengxue Jia, **angli Li, Ying Zhang in Multimedia Tools and Applications (2023)

  12. Article

    Construction of high-dimensional cyclic symmetric chaotic map with one-dimensional chaotic map and its security application

    Classical one-dimensional chaotic map has many ideal characteristics which is quite suitable for many different kinds of scientific fields, especially cryptography. In this paper, we propose an idea of constru...

    Yingpeng Zhang, Hongyue **ang, Shijie Zhang in Multimedia Tools and Applications (2023)

  13. No Access

    Chapter and Conference Paper

    Research on Folk Belief Space in Fengzhou Ancient Town Based on GIS

    Folk belief space is the concrete embodiment of folk belief in the settlement space, and it is also an important activity space of folk belief. For a long time, the study of folk belief is mainly based on qual...

    Yue Cui, Jie Zhang, Ying Zhang, Chenglin He, Dashuai Liu in HCI International 2023 Posters (2023)

  14. No Access

    Chapter and Conference Paper

    Based on Data-Driven Research on the Emotional Experience of Electric Vehicle Users

    Under the global goal of "dual carbon", rich and diversified new energy vehicle products continue to meet market demand, and new energy vehicles are increasingly recognized by consumers, but the current evalua...

    Ying Zhang, Jie Zhang, Yue Cui, Chenglin He, Dashuai Liu in HCI International 2023 Posters (2023)

  15. No Access

    Chapter and Conference Paper

    Research on Protection of Village Cultural Heritage Based on Residents’ Perception and Experience—A Case Study of Fengzhou Ancient Town, Nan’an City, Fujian Province

    In recent years, the protection of traditional village cultural heritage and sustainable tourism development have gradually received high attention from the state, society, and enterprises, while the residents...

    Chenglin He, Jie Zhang, Dashuai Liu, Yue Cui, Ying Zhang in HCI International 2023 Posters (2023)

  16. No Access

    Chapter and Conference Paper

    Research on Demand Evaluation of Live Broadcast Interface of Agricultural Product Based on Factor Analysis and CRITIC Method

    To solve the problems that the existing live broadcast interface of agricultural product (LBIAP) can’t meet the diverse needs of users, the demand elements of LBIAP were analyzed from several dimensions, so as...

    Dashuai Liu, Jie Zhang, Chenglin He, Chenlu Wang, Yue Cui in HCI International 2023 Posters (2023)

  17. No Access

    Chapter and Conference Paper

    FBG Tactile Sensor Integrated on Bronchoscope for Force and Contact Position Sensing

    During the transbronchial lung biopsy (TBLB), the bronchoscope may easily collide with the airway, which can cause damage. In order to improve the safety of the surgery, this paper puts forward a tactile senso...

    Yingxuan Zhang, Qi Jiang, Feiwen Wang, Jie Wang in Intelligent Robotics and Applications (2023)

  18. No Access

    Chapter and Conference Paper

    Illuminance Affecting Factors Analysis for Classroom Environments

    The reasonable placement of lamps in the classroom will play a vital role in the classroom lighting environment of the classroom, in which the classroom lights and blackboard lights, as the two most important ...

    Zihang Wei, Nianyu Zou, Yingjie Zhang, JiayuanLin, Fan Cao in Sensor Systems and Software (2023)

  19. No Access

    Chapter and Conference Paper

    Investigating the Relationship Between Programming Experience and Debugging Behaviors in an Introductory Computer Science Course

    Debugging is a challenging task for novice programmers in computer science courses and calls for specific investigation and support. Although the debugging process has been explored with qualitative methods an...

    Juan D. Pinto, Qianhui Liu, Luc Paquette in Advances in Quantitative Ethnography (2023)

  20. No Access

    Chapter and Conference Paper

    An Improved Lightweight Network Based on YOLOv5s for Object Detection in Autonomous Driving

    Object detection with high accuracy and fast inference speed based on camera sensors is important for autonomous driving. This paper develops a lightweight object detection network based on YOLOv5s which is on...

    Guofa Li, Yingjie Zhang, Delin Ouyang, **ngda Qu in Computer Vision – ECCV 2022 Workshops (2023)

previous disabled Page of 10