-
Article
Open AccessOnline Learner Categories Recognition Based on MoE-LSTM Model
Online learner behaviour patterns are comprehensive indicators reflecting the learning status and learning outcomes of online learners, which have a guiding role in the design, implementation and improvement o...
-
Chapter and Conference Paper
Fiber-Missing Tensor Completion for DOA Estimation with Sensor Failure
In this paper, we propose a fiber-missing tensor completion-based method for direction-of-arrival (DOA) estimation in sensor failure scenario, where the completion of a three-dimensional (3-D) incomplete tenso...
-
Chapter and Conference Paper
A Configuration Design Method for the Redundant Inertial Measurement Unit Based on the Distributed Salp Swarm Algorithm
In the redundant inertial measurement unit (RIMU), the sensors configuration is the essential factor to determine the performance. This paper proposes a novel configuration design method to optimize the precis...
-
Chapter and Conference Paper
Complex Shape Formation Control for Swarms Using Artificial Potentials
In this paper, we propose a decentralized control algorithm to solve the problem of shape formation in homogeneous swarms, which enables a swarm of agents to achieve a specific shape formation without collisio...
-
Chapter and Conference Paper
Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement
Deep learning plays a vital role in malware detection. The Malconv is a well-known deep learning-based open source malware detection framework and is trained on raw bytes for malware binary detection. Research...
-
Chapter and Conference Paper
Multi-strategy Parallel Phasmatodea Population Evolution Algorithm for Public Transport Scheduling
The phasmatodea population evolution algorithm (PPE) is a novel algorithm to simulate population evolution. In this paper, a multi-strategy parallel phasmatodea population evolution algorithm (MPPPE) is propos...
-
Chapter and Conference Paper
A Novel Self-supervised Few-shot Network Intrusion Detection Method
Supervised models for network intrusion detection usually rely on many training samples, but the annotation costs are very high. Unlabeled network traffic data is relatively easy to obtain. However, there are ...
-
Chapter and Conference Paper
Drone Detection with Visual Transformer
The rapid growth of drones presents potential threats to public security and personal privacy, and it is vital to effectively detect the intruding drones. Prior work on visual-based drone detection using convo...
-
Chapter and Conference Paper
HIMALIA: Recovering Compiler Optimization Levels from Binaries by Deep Learning
Compiler optimization levels are important for binary analysis, but they are not available in COTS binaries. In this paper, we present the first end-to-end system called HIMALIA which recovers compiler optimiz...
-
Chapter and Conference Paper
Research on the Representation Methods for Rough Knowledge
Now there exists a lot of information from Internet and the information implies abundant knowledge. But the information is usually uncertain, imprecise, incomplete, coarse, and vague. So it is very difficult t...
-
Chapter
Linguistic Expression Based Image Description Framework and its Application to Image Retrieval
Content-based image retrieval (CBIR) has been researched for many years, but there are quite a few problems affecting the development of the CBIR. Most of the disappointments with early CBIR systems come from ...