Skip to main content

previous disabled Page of 5
and
  1. No Access

    Chapter and Conference Paper

    An Efficient Transformer Inference Engine on DSP

    The transformer is one of the most important algorithms in the Natural Language Processing(NLP) field and widely used in computer vision recently. Due to the huge computation requirements, the current transfor...

    Kangkang Chen, Huayou Su, Chaorun Liu in Algorithms and Architectures for Parallel … (2023)

  2. No Access

    Chapter and Conference Paper

    Methodology-Driven Characteristics of Scientific Research Collaboration Networks in the Field of Economic Management: Mining and Analysis Based on Big Data

    Objective: Research takes the methodological knowledge in the full text of academic literature as a knowledge production element, and divides it into four categories: Theory &Method, Data, Model, and Tool & Softw...

    Hao Xu, Shihui Chen, Mengxue Yi, Ke Feng, ** Ding, Yilin Liu in Big Data and Security (2022)

  3. No Access

    Chapter and Conference Paper

    Research on Optimization of Fuzzing Test of Unknown Protocol Based on Message Type

    In recent years, due to the large number of unknown protocols, it is necessary to study the security of unknown protocols. IFuzzing is a universal method that can be used to study unknown protocols. In unknown...

    WeiQing Fang, Peng Li, YuJie Zhang, Yang Chen in Big Data and Security (2022)

  4. No Access

    Chapter and Conference Paper

    A Survey of Domain Generalization-Based Face Anti-spoofing

    In recent years, remarkable research attention has been attracted to improve the generalization ability of face anti-spoofing methods, and domain generalization techniques have been widely exploited for adapti...

    Fangling Jiang, Yunfan Liu, Bing Liu, **aoliang Chen, Qi Li in Biometric Recognition (2022)

  5. No Access

    Chapter and Conference Paper

    PM2.5 Concentration Prediction Based on mRMR-XGBoost Model

    Air pollution is one of the main environmental pollution, in which air pollution component prediction is an important problem. At present, there have been many studies using machine learning methods to predict...

    Weijian Zhong, **aoqin Lian, Chao Gao in Machine Learning and Intelligent Communica… (2022)

  6. No Access

    Chapter and Conference Paper

    Survey on Deep Learning Based Fusion Recognition of Multimodal Biometrics

    We take multimodal as a new research paradigm. This research paradigm is based on the premise that all human interactions with the outside world required the support of multimodal sensory systems. Deep learnin...

    Qiuling Yang, **aoliang Chen, Zhaofeng He, Le Chang in Biometric Recognition (2022)

  7. No Access

    Chapter and Conference Paper

    Deep Reinforcement Learning Based Mimicry Defense System for IoT Message Transmission

    With the development of 5G and Internet of Everything, IoT has become an essential network infrastructure. The connection between massive devices brings huge convenience and effectiveness, also introducing mor...

    Zhihao Wang, Dingde Jiang, Jianguang Chen, Wei Yang in Simulation Tools and Techniques (2022)

  8. No Access

    Chapter and Conference Paper

    A Dynamic Migration Strategy of SDN Controllers in LEO Networks

    Multiple low earth orbit (LEO) satellites form a constellation that can construct the network to achieve full coverage of the ground. However, the topology of the LEO satellite network is highly dynamic, and e...

    Liuwei Huo, Dingde Jiang, Wei Yang, Jianguang Chen in Simulation Tools and Techniques (2022)

  9. No Access

    Chapter and Conference Paper

    Visual Research and Predictive Analysis of Land Resource Use Type Change

    Land cover change is a hot topic in the interdisciplinary research of global change and land science. The existing spatial visualization methods based on remote sensing images have the advantages of wide detec...

    YuDan Zhao, Wu Zeng, YingGe Zhang in Advances in Artificial Intelligence and Se… (2022)

  10. No Access

    Chapter and Conference Paper

    Image Magnification Network for Vessel Segmentation in OCTA Images

    Optical coherence tomography angiography (OCTA) is a novel non-invasive imaging modality that allows micron-level resolution to visualize the retinal microvasculature. The retinal vessel segmentation in OCTA i...

    Mingchao Li, Weiwei Zhang, Qiang Chen in Pattern Recognition and Computer Vision (2022)

  11. No Access

    Chapter and Conference Paper

    State Machine Inference Method of Unknown Binary Protocol Based on Recurrent Neural Network

    The state machine of binary protocol can effectively reflect the behavior characteristics of the protocol, and its inference results are often not highly influenced by the protocol format information and logic...

    Yang Chen, Peng Li, Yujie Zhang, Weiqing Fang in Big Data and Security (2022)

  12. No Access

    Chapter and Conference Paper

    Unpaired and Self-supervised Optical Coherence Tomography Angiography Super-Resolution

    Optical coherence tomography angiography (OCTA) is usually used to observe the blood flow information of retina and choroid. It is meaningful for clinicians to observe more microvascular details by enhancing t...

    Chaofan Zeng, Songtao Yuan, Qiang Chen in Pattern Recognition and Computer Vision (2022)

  13. No Access

    Chapter and Conference Paper

    Information Lossless Multi-modal Image Generation for RGB-T Tracking

    Visible-Thermal infrared(RGB-T) multimodal target representation is a key issue affecting RGB-T tracking performance. It is difficult to train a RGB-T fusion tracker in an end-to-end way, due to the lack of an...

    Fan Li, Yufei Zha, Lichao Zhang, Peng Zhang in Pattern Recognition and Computer Vision (2022)

  14. No Access

    Chapter and Conference Paper

    Fair Food Delivery Trading System Based on Edge Computing and Stackelberg Game

    Recent years have witnessed Food-as-a-Service (FaaS) facing challenges in delivery pricing. FaaS platform collects orders from restaurants and distributes them to delivery man (DM). The fairness of the pricing...

    Tao Wu, Xuefeng Zan, Lei Xu, Yuang Chen, Kai Liu in Edge Computing – EDGE 2022 (2022)

  15. No Access

    Chapter and Conference Paper

    HotLT: LT Code-Based Secure and Reliable Consortium Blockchain Storage Systems

    The consortium blockchain is deployed in many key industries because decentralization is irreversible and traceable. However, the storage system of the alliance chain usually adopts a full copy method, which l...

    Yang Liu, Boai Yang, Jiabin Wu in Advances in Artificial Intelligence and Se… (2022)

  16. No Access

    Chapter and Conference Paper

    An Energy-Efficient Dynamic Spectrum Access Approach for Internet of Things Applications

    Energy efficiency has become the main problem of the communication network for sustainable development. The highly energy-efficient communication has become research focus and hotspot. Traditional network desi...

    Jianguang Chen, Dingde Jiang, Wei Yang, **aoqian Fan in Simulation Tools and Techniques (2022)

  17. No Access

    Chapter and Conference Paper

    Community Detection Based on Deep Network Embedding with Dual Self-supervised Training

    We propose a community discovery method based on deep auto-encoding (DGAE_DST). Firstly, we use the pre-trained two-layer neural network and k-means algorithm to initialize the centroid vector, and then use th...

    Yunfang Chen, Haotian Mao, Li Wang, Wei Zhang in Big Data and Security (2022)

  18. No Access

    Chapter and Conference Paper

    Fine-Grained Diagnosis Method for Microservice Faults Based on Hierarchical Correlation Analysis

    With the expansion of application scale, the dependence of microservices becomes more and more complex, which makes it difficult to accurately locate the root cause of failure. At present, many microservices f...

    Yusi Tang, Ningjiang Chen, Yu Zhang in Computer Supported Cooperative Work and So… (2022)

  19. No Access

    Chapter and Conference Paper

    A New End-To-End Network Traffic Reconstruction Approach Based on Different Time Granularities

    End-to-end network traffic is an important input parameter for network planning and network monitoring, which plays an important role in network management and design. This paper proposes a new end-to-end netw...

    Wei Yang, Dingde Jiang, Jianguang Chen, Zhihao Wang in Simulation Tools and Techniques (2022)

  20. No Access

    Chapter and Conference Paper

    Rate-Compatible Shortened Polar Codes Based on RM Code-Aided

    The minimum Hamming distance is not considered for the traditional rate-compatible shortened polar (RCSP) codes, which may cause performance degradations. In this paper we propose a hybrid algorithm to constru...

    Chunjie Li, Haiqiang Chen, Zelin Wang in Broadband Communications, Networks, and Sy… (2022)

previous disabled Page of 5