Skip to main content

and
  1. Article

    Open Access

    Online Learner Categories Recognition Based on MoE-LSTM Model

    Online learner behaviour patterns are comprehensive indicators reflecting the learning status and learning outcomes of online learners, which have a guiding role in the design, implementation and improvement o...

    Minghu Wang, Yanhua Gong, Zhikui Shi in International Journal of Computational Int… (2024)

  2. No Access

    Chapter and Conference Paper

    Fiber-Missing Tensor Completion for DOA Estimation with Sensor Failure

    In this paper, we propose a fiber-missing tensor completion-based method for direction-of-arrival (DOA) estimation in sensor failure scenario, where the completion of a three-dimensional (3-D) incomplete tenso...

    Fei Cheng, Hang Zheng, Zhiguo Shi in Proceedings of 2022 International Conferen… (2023)

  3. No Access

    Chapter and Conference Paper

    A Configuration Design Method for the Redundant Inertial Measurement Unit Based on the Distributed Salp Swarm Algorithm

    In the redundant inertial measurement unit (RIMU), the sensors configuration is the essential factor to determine the performance. This paper proposes a novel configuration design method to optimize the precis...

    Binhan Du, Zhifei Ke, Mingkuan Ding in Proceedings of 2021 International Conferen… (2022)

  4. No Access

    Chapter and Conference Paper

    Complex Shape Formation Control for Swarms Using Artificial Potentials

    In this paper, we propose a decentralized control algorithm to solve the problem of shape formation in homogeneous swarms, which enables a swarm of agents to achieve a specific shape formation without collisio...

    Anna Duan, Rui Zhou, Zhiguang Shi in Proceedings of 2021 Chinese Intelligent Sy… (2022)

  5. No Access

    Chapter and Conference Paper

    Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement

    Deep learning plays a vital role in malware detection. The Malconv is a well-known deep learning-based open source malware detection framework and is trained on raw bytes for malware binary detection. Research...

    Jiapeng Zhao, Zhong** Liu, **aoling Zhang in Wireless Algorithms, Systems, and Applicat… (2022)

  6. No Access

    Chapter and Conference Paper

    Multi-strategy Parallel Phasmatodea Population Evolution Algorithm for Public Transport Scheduling

    The phasmatodea population evolution algorithm (PPE) is a novel algorithm to simulate population evolution. In this paper, a multi-strategy parallel phasmatodea population evolution algorithm (MPPPE) is propos...

    Yunxiang Zhu, Fengting Yan, Jeng-Shyang Pan in Advances in Intelligent Information Hiding… (2022)

  7. No Access

    Chapter and Conference Paper

    A Novel Self-supervised Few-shot Network Intrusion Detection Method

    Supervised models for network intrusion detection usually rely on many training samples, but the annotation costs are very high. Unlabeled network traffic data is relatively easy to obtain. However, there are ...

    **g Zhang, Zhixin Shi, Hao Wu, Mengyan **ng in Wireless Algorithms, Systems, and Applicat… (2022)

  8. No Access

    Chapter and Conference Paper

    Drone Detection with Visual Transformer

    The rapid growth of drones presents potential threats to public security and personal privacy, and it is vital to effectively detect the intruding drones. Prior work on visual-based drone detection using convo...

    **ngjian Wang, Chengwei Zhou, Jiayang **e in Proceedings of 2021 International Conferen… (2022)

  9. No Access

    Chapter and Conference Paper

    HIMALIA: Recovering Compiler Optimization Levels from Binaries by Deep Learning

    Compiler optimization levels are important for binary analysis, but they are not available in COTS binaries. In this paper, we present the first end-to-end system called HIMALIA which recovers compiler optimiz...

    Yu Chen, Zhiqiang Shi, Hong Li, Weiwei Zhao in Intelligent Systems and Applications (2019)

  10. No Access

    Chapter and Conference Paper

    Research on the Representation Methods for Rough Knowledge

    Now there exists a lot of information from Internet and the information implies abundant knowledge. But the information is usually uncertain, imprecise, incomplete, coarse, and vague. So it is very difficult t...

    Zhicai Shi, **zu Zhou, Chaogang Yu in Knowledge Engineering and Management (2014)

  11. No Access

    Chapter

    Linguistic Expression Based Image Description Framework and its Application to Image Retrieval

    Content-based image retrieval (CBIR) has been researched for many years, but there are quite a few problems affecting the development of the CBIR. Most of the disappointments with early CBIR systems come from ...

    Qingyong Li, Zhi** Shi, Zhongzhi Shi in Soft Computing in Image Processing (2007)