Skip to main content

previous disabled Page of 27
and
  1. No Access

    Article

    M2BIST-SPNet: RUL prediction for railway signaling electromechanical devices

    Railway signaling electromechanical devices (RSEDs) play a pivotal role in the railway industry. Normal wear and tear of these devices occur during day-and-night operation and even progressively develop into f...

    **aoxi Hu, Lei Tan, Tao Tang in The Journal of Supercomputing (2024)

  2. No Access

    Article

    SPD-YOLOv8: an small-size object detection model of UAV imagery in complex scene

    Traditional camera sensors rely on human observation. However, in complex scenes, people often experience fatigue when observing objects of various sizes. Moreover, human cognitive abilities have inherent limi...

    Rui Zhong, Ende Peng, Ziqiang Li, Qing Ai, Tao Han in The Journal of Supercomputing (2024)

  3. Article

    Open Access

    Threshold ring signature: generic construction and logarithmic size instantiation

    A ring signature is a variant of normal digital signature and protects the privacy of a specific signer in the sense that a ring signature can be verified, but the signer’s identity can only be traced to a lim...

    Huizhuo Wang, Yang Tao, Rui Zhang in Cybersecurity (2024)

  4. Article

    Open Access

    Robust and privacy-preserving collaborative training: a comprehensive survey

    Increasing numbers of artificial intelligence systems are employing collaborative machine learning techniques, such as federated learning, to build a shared powerful deep model among participants, while keepin...

    Fei Yang, Xu Zhang, Shangwei Guo, Daiyuan Chen, Yan Gan in Artificial Intelligence Review (2024)

  5. No Access

    Article

    RaBFT: an improved Byzantine fault tolerance consensus algorithm based on raft

    To address the limitations of the Raft consensus algorithm, such as the lack of support for Byzantine fault tolerance, performance bottleneck of the leader single node, and high leader election delay, an impro...

    Fenhua Bai, Fushuang Li, Tao Shen, Kai Zeng, **aohui Zhang in The Journal of Supercomputing (2024)

  6. No Access

    Article

    meTMQI: multi-task and exposure-prior learning for Tone-Mapped Quality Index

    With limited dynamic range in consumer-level photographs and electronic displays, high dynamic range images can be rendered as the standard dynamic range image by tone map** algorithms. To quantify the disto...

    Mingxing Jiang, Liquan Shen, **angyu Hu, Min Hu, ** An, Tao Tian in The Visual Computer (2024)

  7. No Access

    Article

    A CUDA-based parallel optimization method for SM3 hash algorithm

    Hash algorithms are among the most crucial algorithms in cryptography. The SM3 algorithm is a hash cryptographic standard of China. Because of the strong collision resistance and irreversibility of hash algori...

    Jichang Han, Tao Peng, Xuesong Zhang in The Journal of Supercomputing (2024)

  8. No Access

    Article

    DEAR: a novel deep-level semantics feature reinforce framework for Infrared Small Object Segmentation

    Infrared Small Object Segmentation (ISOS) faces challenges in isolating small and faint objects from infrared images due to their limited texture details and small spatial presence. Existing deep learning meth...

    Yihe Nie, **ngbo Zhao, Yongxiang Li, Qianwen Lu, Qingchuan Tao in The Visual Computer (2024)

  9. Article

    Open Access

    Atomic cross-chain swap based on private key exchange

    Atomic Cross-Chain Swap (ACCS) is one important topic in cryptocurrency, where users can securely and trustlessly exchange assets between two different blockchains. However, most known ACCS schemes assume spec...

    Zeshuo Zhu, Rui Zhang, Yang Tao in Cybersecurity (2024)

  10. No Access

    Article

    Collective Movement Simulation: Methods and Applications

    Collective movement simulations are challenging and important in many areas, including life science, mathematics, physics, information science and public safety. In this survey, we provide a comprehensive revi...

    Hua Wang, **ng-Yu Guo, Hao Tao, Ming-Liang Xu in Machine Intelligence Research (2024)

  11. Article

    Open Access

    HSS: enhancing IoT malicious traffic classification leveraging hybrid sampling strategy

    Using deep learning models to deal with the classification tasks in network traffic offers a new approach to address the imbalanced Internet of Things malicious traffic classification problems. However, the em...

    Yuantu Luo, Jun Tao, Yuehao Zhu, Yifan Xu in Cybersecurity (2024)

  12. No Access

    Article

    Optimal Strategy for Aircraft Pursuit-evasion Games via Self-play Iteration

    In this paper, the pursuit-evasion game with state and control constraints is solved to achieve the Nash equilibrium of both the pursuer and the evader with an iterative self-play technique. Under the conditio...

    **n Wang, Qing-Lai Wei, Tao Li, Jie Zhang in Machine Intelligence Research (2024)

  13. No Access

    Article

    On Robust Cross-view Consistency in Self-supervised Monocular Depth Estimation

    Remarkable progress has been made in self-supervised monocular depth estimation (SS-MDE) by exploring cross-view consistency, e.g., photometric consistency and 3D point cloud consistency. However, they are ver...

    Haimei Zhao, **g Zhang, Zhuo Chen, Bo Yuan, Dacheng Tao in Machine Intelligence Research (2024)

  14. Article

    Open Access

    Optimizing sparse general matrix–matrix multiplication for DCUs

    Sparse general matrix–matrix multiplication (SpGEMM) is a crucial and complex computational task in many practical applications. Improving the performance of SpGEMM on SIMT processors like modern GPUs is chall...

    Hengliang Guo, Haolei Wang, Wanting Chen, Congxiang Zhang in The Journal of Supercomputing (2024)

  15. Article

    Open Access

    Deep learning implementation of image segmentation in agricultural applications: a comprehensive review

    Image segmentation is a crucial task in computer vision, which divides a digital image into multiple segments and objects. In agriculture, image segmentation is extensively used for crop and soil monitoring, p...

    Lian Lei, Qiliang Yang, Ling Yang, Tao Shen, Ruoxi Wang in Artificial Intelligence Review (2024)

  16. No Access

    Article

    Joint super-resolution-based fast face image coding for human and machine vision

    As the Internet of Things continues to grow and thrive, more and more data are consumed by machines for intelligent analysis. How to simultaneously support fast machine vision analysis and obtain high-quality ...

    Wuzhen Shi, Fei Tao, Yang Wen in The Visual Computer (2024)

  17. No Access

    Article

    Face photo-sketch portraits transformation via generation pipeline

    Portrait sketching is widely used in digital art, forensic security and other fields with its unique value. However, existing portrait sketch style transfer techniques often focus on overall style transformati...

    Mengsi Guo, Mingfu **ong, ** Huang, **nrong Hu, Tao Peng in The Visual Computer (2024)

  18. Article

    Coordination of networking and computing: toward new information infrastructure and new services mode

    **aoyun Wang 王晓云, Tao Sun 孙滔, Yong Cui 崔勇 in Frontiers of Information Technology & Elec… (2024)

  19. No Access

    Article

    SNCL: a supernode OpenCL implementation for hybrid computing arrays

    Heterogeneous computing has been develo** continuously in the field of high-performance computing because of its high performance and energy efficiency. More and more accelerators have emerged, such as GPU, ...

    Tao Tang, Kai Lu, Lin Peng, Yingbo Cui, Jianbin Fang in The Journal of Supercomputing (2024)

  20. No Access

    Article

    A survey of energy-efficient strategies for federated learning inmobile edge computing

    With the booming development of fifth-generation network technology and Internet of Things, the number of end-user devices (EDs) and diverse applications is surging, resulting in massive data generated at the ...

    Kang Yan 颜康, Nina Shu 束妮娜, Tao Wu 吴韬 in Frontiers of Information Technology & Elec… (2024)

previous disabled Page of 27