Skip to main content

previous disabled Page of 95
and
  1. No Access

    Chapter and Conference Paper

    Research on Depth-Adaptive Dual-Arm Collaborative Gras** Method

    Among the existing dual-arm cooperative gras** methods, the dual-arm cooperative gras** method based on RGB camera is the mainstream intelligent method. However, these methods often require predefined dept...

    Hao Zhang, Pengfei Yi, Rui Liu, **g Dong in Collaborative Computing: Networking, Appli… (2022)

  2. No Access

    Chapter and Conference Paper

    Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection

    Millions of radio frequency identification (RFID) tags are pervasively used all around the globe to identify a wide variety of objects inexpensively. However, the tag cannot use energy-hungry cryptography due ...

    Yue Feng, Weiqing Huang, Siye Wang in Collaborative Computing: Networking, Appli… (2022)

  3. No Access

    Chapter and Conference Paper

    A Novel Risk Assessment Method Based on Hybrid Algorithm for SCADA

    With the frequent occurrence of cyber attacks in recent years, cyber attacks have become a major factor affecting the security and reliability of power SCADA. We urgently need an effective SCADA risk assessmen...

    Chen Yenan, Lu Tinghui, Li Linsen, Zhang Han in Collaborative Computing: Networking, Appli… (2022)

  4. No Access

    Chapter and Conference Paper

    Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic

    Machine learning algorithms have been widely leveraged in traffic classification tasks to overcome the challenges brought by the enormous encrypted traffic. On the contrary, ML-based classifiers introduce adve...

    Hanwu Sun, Chengwei Peng, Yafei Sang in Collaborative Computing: Networking, Appli… (2022)

  5. No Access

    Chapter and Conference Paper

    An Adaptive Ensembled Neural Network-Based Approach to IoT Device Identification

    The Internet of Things (IoT) has developed rapidly in recent years and has been widely used in our daily life. An online report claimed that the connected IoT devices will reach the scale of 14.4 billion globa...

    **grun Ma, Yafei Sang, Yongzheng Zhang in Collaborative Computing: Networking, Appli… (2022)

  6. No Access

    Chapter and Conference Paper

    Semantic SLAM for Mobile Robot with Human-in-the-Loop

    Mobile robots are an important participant in today’s modern life, and have huge commercial application prospects in the fields of unmanned security inspection, logistics, express delivery, cleaning and medica...

    Zhenchao Ouyang, Changjie Zhang, Jiahe Cui in Collaborative Computing: Networking, Appli… (2022)

  7. No Access

    Chapter and Conference Paper

    Deep Reinforcement Learning for Multi-UAV Exploration Under Energy Constraints

    Autonomous exploration is the essential task for various applications of unmanned aerial vehicles (UAVs), but there is currently a lack of available energy-constrained multi-UAV exploration methods. In this pa...

    Yating Zhou, Dianxi Shi, Huanhuan Yang in Collaborative Computing: Networking, Appli… (2022)

  8. No Access

    Chapter and Conference Paper

    ITAR: A Method for Indoor RFID Trajectory Automatic Recovery

    With the increasing popularity of Radio Frequency Identification (RFID) technology, indoor applications based on RFID trajectory data analysis are becoming more and more extensive, such as personnel location, ...

    Ziwen Cao, Siye Wang, Degang Sun in Collaborative Computing: Networking, Appli… (2022)

  9. No Access

    Chapter and Conference Paper

    Facial Expression Recognition Based on Deep Spatio-Temporal Attention Network

    Facial expression recognition is extremely critical in the process of human-computer interaction. Existing facial expression recognition tends to focus on a single feature of the face and does not take full ad...

    Shuqin Li, **angwei Zheng, **a Zhang in Collaborative Computing: Networking, Appli… (2022)

  10. No Access

    Chapter and Conference Paper

    Locally Differentially Private Quantile Summary Aggregation in Wireless Sensor Networks

    Privacy-preserving data aggregation has been widely recognized as a key enabling functionality in wireless sensor networks to allow the base station to learn valuable statistics of the sensed data while protec...

    Aishah Aseeri, Rui Zhang in Intelligent Information and Database Systems (2022)

  11. No Access

    Chapter and Conference Paper

    Optimization of Large-Scale Knowledge Forward Reasoning Based on OWL 2 DL Ontology

    This paper focuses on the performance of optimized forward reason systems. The main characteristics of forward reasoning are that it is sensitive to the update of data, has a high cost of precomputation closur...

    Lingyun Cui, Tenglong Ren, **aowang Zhang in Collaborative Computing: Networking, Appli… (2022)

  12. No Access

    Chapter and Conference Paper

    A Longitudinal Measurement and Analysis of Pink, a Hybrid P2P IoT Botnet

    With the ubiquitous deployment of Internet of Things (IoT) devices in many fields, more and more IoT botnets have taken a variety of penetration methods to infect vulnerable IoT devices. Nowadays, a substantia...

    Binglai Wang, Yafei Sang, Yongzheng Zhang in Collaborative Computing: Networking, Appli… (2022)

  13. No Access

    Chapter and Conference Paper

    Deep-gAnswer: A Knowledge Based Question Answering System

    In this demonstration, we present Deep-gAnswer, a knowledge-based question answering system. gAnswer is based on semantic parsing and heuristic rules for entity recognition, relation recognition, and SPARQL ge...

    Yinnian Lin, Minhao Zhang, Ruoyu Zhang, Lei Zou in Web and Big Data (2021)

  14. No Access

    Chapter and Conference Paper

    DTWSSE: Data Augmentation with a Siamese Encoder for Time Series

    Access to labeled time series data is often limited in the real world, which constrains the performance of deep learning models in the field of time series analysis. Data augmentation is an effective way to so...

    **nyu Yang, **nlan Zhang, Zhenguo Zhang, Yahui Zhao, Rongyi Cui in Web and Big Data (2021)

  15. No Access

    Chapter and Conference Paper

    What Have We Learned from OpenReview?

    Anonymous peer review is used by the great majority of computer science conferences. OpenReview is such a platform that aims to promote openness in peer review process. The paper, (meta) reviews, rebuttals, an...

    Gang Wang, Qi Peng, Yanfeng Zhang, Mingyang Zhang in Web and Big Data (2021)

  16. No Access

    Chapter and Conference Paper

    An Intelligent SDN DDoS Detection Framework

    With the development and popularity of computer networks, more and more devices, services and applications are running on the Internet. While it is convenient to the public, more security problems have also br...

    **ang Zhang, Chaokui Zhang, Zhenyang Zhong in Collaborative Computing: Networking, Appli… (2021)

  17. No Access

    Chapter and Conference Paper

    A Graph Attention Network Model for GMV Forecast on Online Shop** Festival

    In this paper, we present a novel Graph Attention Network based framework for GMV (Gross Merchandise Volume) forecast on online festival, called GAT-GF. Based on the well-designed retailer-customer graph and r...

    Qianyu Yu, Shuo Yang, Zhiqiang Zhang, Ya-Lin Zhang, Binbin Hu, Ziqi Liu in Web and Big Data (2021)

  18. No Access

    Chapter and Conference Paper

    Dynamic Environment Simulation for Database Performance Evaluation

    The wide popularity and the maturity of cloud platform promote the development of Cloud Native database systems. On-demand resource configuration is an attractive feature of cloud platforms, but its complexity...

    Chunxi Zhang, Rong Zhang, Qian Su, Aoying Zhou in Web and Big Data (2021)

  19. No Access

    Chapter and Conference Paper

    A Pervasive Multi-physiological Signal-Based Emotion Classification with Shapelet Transformation and Decision Fusion

    Emotion classification is a hot pot at present. Since physiological signals are objective ...

    Shichao Zhang, **angwei Zheng, Mingzhe Zhang in Collaborative Computing: Networking, Appli… (2021)

  20. No Access

    Chapter and Conference Paper

    Simplifying Graph Convolutional Networks as Matrix Factorization

    In recent years, substantial progress has been made on Graph Convolutional Networks (GCNs). However, the computing of GCN usually requires a large memory space for kee** the entire graph. In consequence, GCN...

    Qiang Liu, Haoli Zhang, Zhaocheng Liu in Web and Big Data (2021)

previous disabled Page of 95