Skip to main content

previous disabled Page of 4
and
  1. No Access

    Article

    Deployment algorithms of multi-UAV-BS networks with frequency reuse and power optimization

    Deploying unmanned aerial vehicle base stations (UAV-BSs) to provide wireless access for terrestrial users is an alternative solution in emergency scenarios. Due to the dynamic nature of UAV-BSs and strong lin...

    Yanzhi Hu, Chunyuan Tian, Dawei Ma, Zhiyong Shi, Fengbin Zhang in Telecommunication Systems (2024)

  2. Article

    Open Access

    Online Learner Categories Recognition Based on MoE-LSTM Model

    Online learner behaviour patterns are comprehensive indicators reflecting the learning status and learning outcomes of online learners, which have a guiding role in the design, implementation and improvement o...

    Minghu Wang, Yanhua Gong, Zhikui Shi in International Journal of Computational Int… (2024)

  3. No Access

    Article

    Adaptive vertical federated learning via feature map transferring in mobile edge computing

    To bring more intelligence to edge systems, Federated Learning (FL) is proposed to provide a privacy-preserving mechanism to train a globally shared model by utilizing a massive amount of user-generated data o...

    Yuanzhang Li, Tianchi Sha, Thar Baker, **ao Yu, Zhiwei Shi, Sikang Hu in Computing (2024)

  4. No Access

    Chapter and Conference Paper

    Reform and Practice of Programming Courses’ Construction

    The design of course group is an important part of major construction. The construction of course group should be closely focused on the professional talent training objectives. The cultivation of talents for ...

    **aohui Tan, Zhi** Shi, Na Jiang, Jun Li in Computer Science and Education. Teaching a… (2024)

  5. No Access

    Chapter and Conference Paper

    SeHBPL: Behavioral Semantics-Based Patch Presence Test for Binaries

    Patch presence testing is a critical component of risk and loss assessment for software vulnerabilities. By determining whether a patch has been applied to their software, organizations can better understand t...

    **tao Huang, Gaosheng Wang, Zhiqiang Shi in Dependable Software Engineering. Theories,… (2024)

  6. No Access

    Article

    Knowledge distilled pre-training model for vision-language-navigation

    Vision-language-navigation(VLN) is a challenging task that requires a robot to autonomously move to a destination based on visual observation following a human’s natural language instructions. To improve the p...

    Bo Huang, Shuai Zhang, Jitao Huang, Yijun Yu, Zhicai Shi in Applied Intelligence (2023)

  7. No Access

    Chapter and Conference Paper

    An Efficient Approach to Wireless Firmware Update Based on Erasure Correction Coding

    Updating the firmware of the deployed nodes in a large sensor network can be time consuming and challenging. One way to perform these updates is through an over-the-air (OTA) protocol that utilizes repeated ro...

    Berk Kivilcim, Daniel Zhou, Zhijie Shi in ITNG 2023 20th International Conference on… (2023)

  8. No Access

    Chapter and Conference Paper

    Fiber-Missing Tensor Completion for DOA Estimation with Sensor Failure

    In this paper, we propose a fiber-missing tensor completion-based method for direction-of-arrival (DOA) estimation in sensor failure scenario, where the completion of a three-dimensional (3-D) incomplete tenso...

    Fei Cheng, Hang Zheng, Zhiguo Shi in Proceedings of 2022 International Conferen… (2023)

  9. No Access

    Chapter and Conference Paper

    A Configuration Design Method for the Redundant Inertial Measurement Unit Based on the Distributed Salp Swarm Algorithm

    In the redundant inertial measurement unit (RIMU), the sensors configuration is the essential factor to determine the performance. This paper proposes a novel configuration design method to optimize the precis...

    Binhan Du, Zhifei Ke, Mingkuan Ding in Proceedings of 2021 International Conferen… (2022)

  10. No Access

    Chapter and Conference Paper

    Complex Shape Formation Control for Swarms Using Artificial Potentials

    In this paper, we propose a decentralized control algorithm to solve the problem of shape formation in homogeneous swarms, which enables a swarm of agents to achieve a specific shape formation without collisio...

    Anna Duan, Rui Zhou, Zhiguang Shi in Proceedings of 2021 Chinese Intelligent Sy… (2022)

  11. No Access

    Chapter and Conference Paper

    A Multi-modal System for Video Semantic Understanding

    This paper proposes a video semantic understanding system based on multi-modal data fusion. The system includes two sub-models, the video classification tag model (VCT) and the video semantic tag model (VST), ...

    Zhengwei Lv, Tao Lei, **ao Liang, Zhizhong Shi, Duoxing Liu in CCKS 2021 - Evaluation Track (2022)

  12. No Access

    Chapter and Conference Paper

    Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement

    Deep learning plays a vital role in malware detection. The Malconv is a well-known deep learning-based open source malware detection framework and is trained on raw bytes for malware binary detection. Research...

    Jiapeng Zhao, Zhong** Liu, **aoling Zhang in Wireless Algorithms, Systems, and Applicat… (2022)

  13. No Access

    Chapter and Conference Paper

    Multi-strategy Parallel Phasmatodea Population Evolution Algorithm for Public Transport Scheduling

    The phasmatodea population evolution algorithm (PPE) is a novel algorithm to simulate population evolution. In this paper, a multi-strategy parallel phasmatodea population evolution algorithm (MPPPE) is propos...

    Yunxiang Zhu, Fengting Yan, Jeng-Shyang Pan in Advances in Intelligent Information Hiding… (2022)

  14. No Access

    Chapter and Conference Paper

    A Novel Self-supervised Few-shot Network Intrusion Detection Method

    Supervised models for network intrusion detection usually rely on many training samples, but the annotation costs are very high. Unlabeled network traffic data is relatively easy to obtain. However, there are ...

    **g Zhang, Zhixin Shi, Hao Wu, Mengyan **ng in Wireless Algorithms, Systems, and Applicat… (2022)

  15. No Access

    Chapter and Conference Paper

    Drone Detection with Visual Transformer

    The rapid growth of drones presents potential threats to public security and personal privacy, and it is vital to effectively detect the intruding drones. Prior work on visual-based drone detection using convo...

    **ngjian Wang, Chengwei Zhou, Jiayang **e in Proceedings of 2021 International Conferen… (2022)

  16. No Access

    Chapter and Conference Paper

    Clustering-Enhanced Knowledge Graph Embedding

    Knowledge graph embedding (KGE) is a task to transform the symbolic entities and relations in Knowledge Graphs (KGs) into low-dimensional vectors, which facilitates the use of KGs in downstream applications. H...

    Fuwei Zhang, Zhao Zhang, Fuzhen Zhuang, **g**g Gu, Zhi** Shi, Qing He in Big Data (2022)

  17. No Access

    Chapter and Conference Paper

    Feature Map Transfer: Vertical Federated Learning for CNN Models

    Federated learning provides a privacy-preserving mechanism for multiple participants to collaboratively train machine learning models without exchanging private data with each other. Existing federated learnin...

    Tianchi Sha, **ao Yu, Zhiwei Shi, Yuan Xue, Shouxin Wang in Data Mining and Big Data (2021)

  18. No Access

    Chapter and Conference Paper

    Research on Off-Path Exploits of Network Protocols

    With the rapid development of the Internet industry, from a global perspective, the risks brought by network security are becoming increasingly prominent, and continue to penetrate into political, economic, cu...

    Falin Hou, **ao Yu, Kefan Qiu, Junli Liu, Zhiwei Shi in Data Mining and Big Data (2021)

  19. No Access

    Chapter and Conference Paper

    A Robust IoT Device Identification Method with Unknown Traffic Detection

    Internet of Things (IoT) device identification plays a basic and essential role in network management and cyberspace security. Previous device identification methods perform poorly in real-world networks where...

    **ao Hu, Hong Li, Zhiqiang Shi, Nan Yu in Wireless Algorithms, Systems, and Applicat… (2021)

  20. No Access

    Chapter and Conference Paper

    Reasoning About Iteration and Recursion Uniformly Based on Big-Step Semantics

    A reliable technique for deductive program verification should be proven sound with respect to the semantics of the programming language. For each different language, the construction of a separate soundness p...

    **meng Li, Qianying Zhang, Guohui Wang in Dependable Software Engineering. Theories,… (2021)

previous disabled Page of 4