Skip to main content

and
  1. No Access

    Article

    Electoral manipulation via influence: probabilistic model

    We consider a natural generalization of the fundamental electoral manipulation problem, where a briber can change the opinion or preference of voters through influence. This is motivated by modern political ca...

    Liangde Tao, Lin Chen, Lei Xu, Shouhuai Xu in Autonomous Agents and Multi-Agent Systems (2023)

  2. No Access

    Chapter and Conference Paper

    A Method for Data Exchange and Management in the Military Industry Field

    With the ongoing integration of industrialization and informatization, enterprise information infrastructure has been steadily advancing, leading to a substantial surge in data volume generated within organiza...

    ** Wu, **ngqiao Wang, **n Zhang, Zhimin Gao in Advanced Data Mining and Applications (2023)

  3. No Access

    Chapter and Conference Paper

    Focal and Global Spatial-Temporal Transformer for Skeleton-Based Action Recognition

    Despite great progress achieved by transformer in various vision tasks, it is still underexplored for skeleton-based action recognition with only a few attempts. Besides, these methods directly calculate the p...

    Zhimin Gao, Peitao Wang, Pei Lv, **aoheng Jiang, Qidong Liu in Computer Vision – ACCV 2022 (2023)

  4. No Access

    Article

    FT-HID: a large-scale RGB-D dataset for first- and third-person human interaction analysis

    Analysis of human interaction is one important research topic of human motion analysis. It has been studied either using first-person vision (FPV) or third-person vision (TPV). However, the joint learning of b...

    Zihui Guo, Yonghong Hou, Pichao Wang, Zhimin Gao in Neural Computing and Applications (2023)

  5. No Access

    Chapter and Conference Paper

    Research on Image Segmentation Algorithm Based on Level Set

    Digital image processing has garnered significant attention and extensive research in both civilian and military domains. Image segmentation serves as a fundamental component of image processing, directly infl...

    ** Wu, Mingkun Zhang, Qing Yue, Zhimin Gao in Advanced Data Mining and Applications (2023)

  6. No Access

    Chapter and Conference Paper

    Hardness and Algorithms for Electoral Manipulation Under Media Influence

    In this paper, we study a generalization of the classic bribery problem known as electoral manipulation under media influence (EMMI). This model is motivated by modern political campaigns where candidates try ...

    Liangde Tao, Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao in Frontiers of Algorithmics (2022)

  7. No Access

    Article

    Transformer guided geometry model for flow-based unsupervised visual odometry

    Existing unsupervised visual odometry (VO) methods either match pairwise images or integrate the temporal information using recurrent neural networks over a long sequence of images. They are either not accurat...

    **angyu Li, Yonghong Hou, Pichao Wang, Zhimin Gao in Neural Computing and Applications (2021)

  8. No Access

    Article

    A Review of Dynamic Maps for 3D Human Motion Recognition Using ConvNets and Its Improvement

    RGB-D based action recognition is attracting more and more attention in both the research and industrial communities. However, due to the lack of training data, pre-training based methods are popular in this f...

    Zhimin Gao, Pichao Wang, Huogen Wang, Mingliang Xu, Wanqing Li in Neural Processing Letters (2020)

  9. No Access

    Article

    MDSSD: multi-scale deconvolutional single shot detector for small objects

    Lisha Cui, Rui Ma, Pei Lv, **aoheng Jiang, Zhimin Gao in Science China Information Sciences (2020)

  10. No Access

    Chapter and Conference Paper

    KCRS: A Blockchain-Based Key Compromise Resilient Signature System

    Digital signatures are widely used to assure authenticity and integrity of messages (including blockchain transactions). This assurance is based on assumption that the private signing key is kept secret, whic...

    Lei Xu, Lin Chen, Zhimin Gao, **nxin Fan in Blockchain and Trustworthy Systems (2020)

  11. No Access

    Chapter and Conference Paper

    Computational Complexity Characterization of Protecting Elections from Bribery

    The bribery problem in election has received considerable attention in the literature, upon which various algorithmic and complexity results have been obtained. It is thus natural to ask whether we can protect...

    Lin Chen, Ahmed Sunny, Lei Xu, Shouhuai Xu, Zhimin Gao in Computing and Combinatorics (2020)

  12. No Access

    Chapter and Conference Paper

    The Game Among Bribers in a Smart Contract System

    Blockchain has been used to build various applications, and the introduction of smart contracts further extends its impacts. Most of existing works consider the positive usage of smart contracts but ignore the...

    Lin Chen, Lei Xu, Zhimin Gao, Nolan Shah in Financial Cryptography and Data Security (2019)

  13. No Access

    Article

    CoC: A Unified Distributed Ledger Based Supply Chain Management System

    Modern supply chain is a complex system and plays an important role for different sectors under the globalization economic integration background. Supply chain management system is proposed to handle the incre...

    Zhimin Gao, Lei Xu, Lin Chen, ** Zhao in Journal of Computer Science and Technology (2018)

  14. No Access

    Chapter and Conference Paper

    Dual Long Short-Term Memory Networks for Sub-Character Representation Learning

    Characters have commonly been regarded as the minimal processing unit in Natural Language Processing (NLP). But many non-latin languages have hieroglyphic writing systems, involving a big alphabet with thousan...

    Han He, Lei Wu, **aokun Yang, Hua Yan in Information Technology - New Generations (2018)

  15. No Access

    Chapter and Conference Paper

    Decentralized Execution of Smart Contracts: Agent Model Perspective and Its Implications

    Smart contracts are one of the most important applications of the blockchain. Most existing smart contract systems assume that for executing contract over a network of decentralized nodes, the outcome in accor...

    Lin Chen, Lei Xu, Nolan Shah, Zhimin Gao in Financial Cryptography and Data Security (2017)

  16. No Access

    Chapter and Conference Paper

    On Security Analysis of Proof-of-Elapsed-Time (PoET)

    As more applications are built on top of blockchain and public ledger, different approaches are developed to improve the performance of blockchain construction. Recently Intel proposed a new concept of proof-o...

    Lin Chen, Lei Xu, Nolan Shah, Zhimin Gao in Stabilization, Safety, and Security of Dis… (2017)

  17. No Access

    Article

    A novel rate control algorithm for video coding based on fuzzy-PID controller

    Rate control algorithms (RCAs) aim to achieve the best visual quality under the minimum bit rate and the limited buffer size. A self-parameter-tuning fuzzy-PID controller is proposed to reduce the deviation be...

    Yonghong Hou, Pichao Wang, Wei **ang, Zhimin Gao in Signal, Image and Video Processing (2015)

  18. No Access

    Chapter and Conference Paper

    Eye Contact Conditioning in Autistic Children Using Virtual Reality Technology

    Children afflicted with developmental disabilities, namely autism, suffer from a natural aversion to dyadic (i.e., eye-to-eye) contact. Research has shown this aversion to be an early indicator of slower devel...

    ** Wang, Nicholas Desalvo, Zhimin Gao in Pervasive Computing Paradigms for Mental H… (2014)