Skip to main content

Page of 59
and
  1. No Access

    Chapter and Conference Paper

    Research on Anti-tampering Mechanism of Massive Electric Energy Data Based on Blockchain

    Aiming at the problems of malicious tampering and difficult to identify, single point of failure attacks faced by massive electric energy data storage, a blockchain-based anti-tampering mechanism for massive e...

    Hefang Jiang, **aowei Chen, Fenghui Duan in Advances in Artificial Intelligence and Se… (2022)

  2. Chapter and Conference Paper

    Sound Pressure Field Reconstruction for Ultrasound Phased Array by Linear Synthesis Scheme Optimization

    Ultrasound phased array is a device that is usually used to provide mid air tactile sensations like three-dimensional shape haptics images by generating various specific sound fields. Forming foci for the ultr...

    Jianyu Chen, Shun Suzuki, Tao Morisaki in Haptics: Science, Technology, Applications (2022)

  3. No Access

    Chapter and Conference Paper

    Intelligent Industrial Auxiliary System Based on AR Technology

    The traditional industrial assembly method is inefficient, and it is difficult to meet the needs of rapid production in modern society. Although many virtual assembly systems based on augmented reality technol...

    Tao Wang, **nqi Shen, Junpei Ma, Zhuorui Chang, Linyan Guo in Data Science (2022)

  4. No Access

    Chapter and Conference Paper

    Memory-Based STOMP for Local Path Planning

    Planning and navigation of mobile robots has always been a challenging problem, which has attracted a large number of scholars, especially the research on local path planners. In order to use the past planning...

    Wenjie Li, Tao Cao, Yunfan Wang, **an Guo in Intelligent Robotics and Applications (2022)

  5. No Access

    Chapter and Conference Paper

    Children with ASD Prefer Observing Social Scenarios from Third-Person Perspective

    This study employed visual tracking technology to explore the effects of a third-person perspective on the fixation condition of social scenarioss in children with autism spectrum disorder (ASD). This study se...

    Su Linfei, Lin Zehui, Li Youyuan, Liu Tao in Intelligent Robotics and Applications (2022)

  6. No Access

    Chapter and Conference Paper

    A Novel Gras** Approach with Dynamic Annotation Mechanism

    The Gras** of unknown objects is a challenging but critical problem in the field of robotic research. However, existing studies only focus on the shape of objects and ignore the impact of the differences in ...

    Shuai Yang, Bin Wang, Junyuan Tao, Qifan Duan in Intelligent Robotics and Applications (2022)

  7. No Access

    Chapter and Conference Paper

    A GNN-Enhanced Game Bot Detection Model for MMORPGs

    Game bots are automated programs that assist cheating players in obtaining huge superiority in Massively Multiplayer Online Role-Playing Games (MMORPGs), which has led to an imbalance in the gaming ecosystem a...

    **anyang Qi, Jiashu Pu, Shiwei Zhao in Advances in Knowledge Discovery and Data M… (2022)

  8. No Access

    Chapter and Conference Paper

    A Joint Framework for Explainable Recommendation with Knowledge Reasoning and Graph Representation

    With the development of recommendation systems (RSs), researchers are no longer only satisfied with the recommendation results, but also put forward requirements for the recommendation reasons, which helps imp...

    Luhao Zhang, Ruiyu Fang, Tianchi Yang in Database Systems for Advanced Applications (2022)

  9. No Access

    Chapter and Conference Paper

    Fast Fourier Orthogonalization over NTRU Lattices

    FALCON is an efficient and compact lattice-based signature scheme. It is also one of the round 3 finalists in the NIST PQC standardization process. The core of FALCON is a trapdoor sampling algorithm, which ha...

    Shuo Sun, Yongbin Zhou, Rui Zhang, Yang Tao in Information and Communications Security (2022)

  10. No Access

    Chapter and Conference Paper

    Reconstructing Specific Neural Components for SSVEP Identification

    Brain-computer interfaces (BCIs) enable the brain to communicate directly with external devices. Steady-state visual evoked potential (SSVEP) is periodic response evoked by a continuous visual stimulus at a sp...

    Lijie Wang, **biao Liu, Tao Tang, Linqing Feng in Intelligent Robotics and Applications (2022)

  11. No Access

    Chapter and Conference Paper

    Efficient Attribute-Based Proxy Re-encryption for Secure Deduplication

    More and more data files are stored in cloud servers because of storage space. At the same time, many cryptographic techniques have been proposed to protect data privacy. However, a large amount of duplicate d...

    Tao Zhang, Chen Wang in Security and Privacy in Social Networks an… (2022)

  12. No Access

    Chapter and Conference Paper

    Out-of-Domain Semantics to the Rescue! Zero-Shot Hybrid Retrieval Models

    The pre-trained language model (eg, BERT) based deep retrieval models achieved superior performance over lexical retrieval models (eg, BM25) in many passage retrieval tasks. However, limited work has been done to...

    Tao Chen, Mingyang Zhang, **g Lu, Michael Bendersky in Advances in Information Retrieval (2022)

  13. No Access

    Chapter and Conference Paper

    Gaussian Mixture Model-Based Registration Network for Point Clouds with Partial Overlap

    Mainstream methods of point cloud registration can be divided into two categories: strict point-level correspondence, which is commonly used but incompatible with real-world data; and statistical calculations,...

    **ang Li, Jianwen Sun, Chung-Ming Own in Artificial Neural Networks and Machine Lea… (2022)

  14. No Access

    Chapter and Conference Paper

    Online Continual Learning with Contrastive Vision Transformer

    Online continual learning (online CL) studies the problem of learning sequential tasks from an online data stream without task boundaries, aiming to adapt to new data while alleviating catastrophic forgetting ...

    Zhen Wang, Liu Liu, Ya**g Kong, Jiaxian Guo, Dacheng Tao in Computer Vision – ECCV 2022 (2022)

  15. No Access

    Chapter and Conference Paper

    Trajectory-Based Mobile Game Bots Detection with Gaussian Mixture Model

    Recent developments in mobile games have heightened the need for mobile game bots detection, while related researches are scarce. Compared with PC games, detecting game bots in mobile games is more challenging...

    Yueyang Su, Di Yao, **gwei Li, Baoli Wang in Artificial Neural Networks and Machine Lea… (2022)

  16. No Access

    Chapter and Conference Paper

    ColorFormer: Image Colorization via Color Memory Assisted Hybrid-Attention Transformer

    Automatic image colorization is a challenging task that attracts a lot of research interest. Previous methods employing deep neural networks have produced impressive results. However, these colorization images...

    **aozhong Ji, Boyuan Jiang, Donghao Luo, Guangpin Tao in Computer Vision – ECCV 2022 (2022)

  17. No Access

    Chapter and Conference Paper

    Patch-Based Backdoors Detection and Mitigation with Feature Masking

    Pre-trained models have been employed by substantial downstream tasks, achieving remarkable achievements in transfer learning scenarios. However, poisoning the training samples guides the target model to make ...

    Tao Wang, **aoyu Zhang, Yulin ** in Security and Privacy in Social Networks an… (2022)

  18. No Access

    Chapter and Conference Paper

    Geometry-Aware Single-Image Full-Body Human Relighting

    Single-image human relighting aims to relight a target human under new lighting conditions by decomposing the input image into albedo, shape and lighting. Although plausible relighting results can be achieved,...

    Chaonan Ji, Tao Yu, Kaiwen Guo, **gxin Liu, Yebin Liu in Computer Vision – ECCV 2022 (2022)

  19. No Access

    Chapter and Conference Paper

    Kernel Relative-prototype Spectral Filtering for Few-Shot Learning

    Few-shot learning performs classification tasks and regression tasks on scarce samples. As one of the most representative few-shot learning models, Prototypical Network represents each class as sample average,...

    Tao Zhang, Wu Huang in Computer Vision – ECCV 2022 (2022)

  20. No Access

    Chapter and Conference Paper

    Motion and Appearance Adaptation for Cross-domain Motion Transfer

    Motion transfer aims to transfer the motion of a driving video to a source image. When there are considerable differences between object in the driving video and that in the source image, traditional single do...

    Borun Xu, Biao Wang, **hong Deng, Jiale Tao, Tiezheng Ge in Computer Vision – ECCV 2022 (2022)

Page of 59