![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
1,982 Result(s)
-
Chapter and Conference Paper
Research on Depth-Adaptive Dual-Arm Collaborative Gras** Method
Among the existing dual-arm cooperative gras** methods, the dual-arm cooperative gras** method based on RGB camera is the mainstream intelligent method. However, these methods often require predefined dept...
-
Chapter and Conference Paper
Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection
Millions of radio frequency identification (RFID) tags are pervasively used all around the globe to identify a wide variety of objects inexpensively. However, the tag cannot use energy-hungry cryptography due ...
-
Chapter and Conference Paper
A Novel Risk Assessment Method Based on Hybrid Algorithm for SCADA
With the frequent occurrence of cyber attacks in recent years, cyber attacks have become a major factor affecting the security and reliability of power SCADA. We urgently need an effective SCADA risk assessmen...
-
Chapter and Conference Paper
Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic
Machine learning algorithms have been widely leveraged in traffic classification tasks to overcome the challenges brought by the enormous encrypted traffic. On the contrary, ML-based classifiers introduce adve...
-
Chapter and Conference Paper
An Adaptive Ensembled Neural Network-Based Approach to IoT Device Identification
The Internet of Things (IoT) has developed rapidly in recent years and has been widely used in our daily life. An online report claimed that the connected IoT devices will reach the scale of 14.4 billion globa...
-
Chapter and Conference Paper
Semantic SLAM for Mobile Robot with Human-in-the-Loop
Mobile robots are an important participant in today’s modern life, and have huge commercial application prospects in the fields of unmanned security inspection, logistics, express delivery, cleaning and medica...
-
Chapter and Conference Paper
Deep Reinforcement Learning for Multi-UAV Exploration Under Energy Constraints
Autonomous exploration is the essential task for various applications of unmanned aerial vehicles (UAVs), but there is currently a lack of available energy-constrained multi-UAV exploration methods. In this pa...
-
Chapter and Conference Paper
ITAR: A Method for Indoor RFID Trajectory Automatic Recovery
With the increasing popularity of Radio Frequency Identification (RFID) technology, indoor applications based on RFID trajectory data analysis are becoming more and more extensive, such as personnel location, ...
-
Chapter and Conference Paper
Facial Expression Recognition Based on Deep Spatio-Temporal Attention Network
Facial expression recognition is extremely critical in the process of human-computer interaction. Existing facial expression recognition tends to focus on a single feature of the face and does not take full ad...
-
Chapter and Conference Paper
Locally Differentially Private Quantile Summary Aggregation in Wireless Sensor Networks
Privacy-preserving data aggregation has been widely recognized as a key enabling functionality in wireless sensor networks to allow the base station to learn valuable statistics of the sensed data while protec...
-
Chapter and Conference Paper
Optimization of Large-Scale Knowledge Forward Reasoning Based on OWL 2 DL Ontology
This paper focuses on the performance of optimized forward reason systems. The main characteristics of forward reasoning are that it is sensitive to the update of data, has a high cost of precomputation closur...
-
Chapter and Conference Paper
A Longitudinal Measurement and Analysis of Pink, a Hybrid P2P IoT Botnet
With the ubiquitous deployment of Internet of Things (IoT) devices in many fields, more and more IoT botnets have taken a variety of penetration methods to infect vulnerable IoT devices. Nowadays, a substantia...
-
Chapter and Conference Paper
Deep-gAnswer: A Knowledge Based Question Answering System
In this demonstration, we present Deep-gAnswer, a knowledge-based question answering system. gAnswer is based on semantic parsing and heuristic rules for entity recognition, relation recognition, and SPARQL ge...
-
Chapter and Conference Paper
DTWSSE: Data Augmentation with a Siamese Encoder for Time Series
Access to labeled time series data is often limited in the real world, which constrains the performance of deep learning models in the field of time series analysis. Data augmentation is an effective way to so...
-
Chapter and Conference Paper
What Have We Learned from OpenReview?
Anonymous peer review is used by the great majority of computer science conferences. OpenReview is such a platform that aims to promote openness in peer review process. The paper, (meta) reviews, rebuttals, an...
-
Chapter and Conference Paper
An Intelligent SDN DDoS Detection Framework
With the development and popularity of computer networks, more and more devices, services and applications are running on the Internet. While it is convenient to the public, more security problems have also br...
-
Chapter and Conference Paper
A Graph Attention Network Model for GMV Forecast on Online Shop** Festival
In this paper, we present a novel Graph Attention Network based framework for GMV (Gross Merchandise Volume) forecast on online festival, called GAT-GF. Based on the well-designed retailer-customer graph and r...
-
Chapter and Conference Paper
Dynamic Environment Simulation for Database Performance Evaluation
The wide popularity and the maturity of cloud platform promote the development of Cloud Native database systems. On-demand resource configuration is an attractive feature of cloud platforms, but its complexity...
-
Chapter and Conference Paper
A Pervasive Multi-physiological Signal-Based Emotion Classification with Shapelet Transformation and Decision Fusion
Emotion classification is a hot pot at present. Since physiological signals are objective ...
-
Chapter and Conference Paper
Simplifying Graph Convolutional Networks as Matrix Factorization
In recent years, substantial progress has been made on Graph Convolutional Networks (GCNs). However, the computing of GCN usually requires a large memory space for kee** the entire graph. In consequence, GCN...