Skip to main content

previous disabled Page of 4
and
  1. No Access

    Chapter and Conference Paper

    Visual Monitoring Method of Digital Computer Room Based on Digital Twin

    With the rapid development of the Internet of things, big data, artificial intelligence and other new generation information technologies, more and more information technologies are applied in actual productio...

    Huang Chao, Zhang Chen, Liao Rongtao in Application of Big Data, Blockchain, and I… (2023)

  2. No Access

    Chapter and Conference Paper

    Data Reconstruction from Gradient Updates in Federated Learning

    Federated learning has become an emerging technology to protect data privacy in the distributed learning area, by kee** each client user’s data locally. However, recent work shows that client users’ data mig...

    **aoxue Zhang, Junhao Li, Jianjie Zhang, Jijie Yan in Machine Learning for Cyber Security (2023)

  3. No Access

    Chapter and Conference Paper

    Data Leakage with Label Reconstruction in Distributed Learning Environments

    Distributed learning is commonly applied for the high demands of computation resources while training models with large-scale data. However, existing solutions revealed that it may lead to information leakage ...

    **aoxue Zhang, **uhua Zhou, Kongyang Chen in Machine Learning for Cyber Security (2023)

  4. No Access

    Chapter and Conference Paper

    Efficient and Secure Outsourced Image Watermarking in Cloud Computing

    Image watermark has played an important role in image copyright protection. With the development of cloud computing in recent years, more and more people are willing to outsource the watermark embedding proces...

    **ongjie Fang, Ruopan Lai, Zhipeng Zhou in Artificial Intelligence and Security (2022)

  5. No Access

    Chapter and Conference Paper

    An Underwater Image Color Correction Algorithm Based on Underwater Scene Prior and Residual Network

    Color distortion in underwater scenes affect the accuracy of pattern recognition, visual understanding and key feature extraction work of underwater robots. In this paper, we propose a method to correct color ...

    Mengxing Huang, **** Ye, Shenghan Zhu, Yang Chen in Artificial Intelligence and Security (2022)

  6. No Access

    Chapter and Conference Paper

    BDCuckoo: an Efficient Cuckoo Hash for Block Device

    Hash is widely used in various storage systems due to its excellent insertion and search performance. However, existing hash designs are not friendly for block devices because they will generate a lot of rando...

    **anqi Zheng, Jia Ma, Yubo Liu, Zhiguang Chen in Network and Parallel Computing (2022)

  7. No Access

    Chapter and Conference Paper

    EBANet: Efficient Boundary-Aware Network for RGB-D Semantic Segmentation

    Semantic segmentation is widely used in robot perception and can be used for various subsequent tasks. Depth information has been proven to be a useful clue in the semantic segmentation of RGB-D images for pro...

    Ruiquan Wang, Qingxuan Jia, Yue Shen in Cognitive Systems and Information Processi… (2022)

  8. No Access

    Chapter and Conference Paper

    Thoughts on the Application of Low-Interactive Honeypot Based on Raspberry Pi in Public Security Actual Combat, LIHRP

    With development of the network, more and more information elements have been integrated into people’s daily life. However, the seriousness of the network security problem has become increasingly apparent, too...

    **g Shi, Mingyang Chen, Jiazheng Jiao in Artificial Intelligence and Security (2022)

  9. No Access

    Chapter and Conference Paper

    Variations of Solar Radiation in Typical Resource Regions of China During 1961–2016

    Based on the total solar radiation, horizontal direct radiation and scattered radiation data of six typical resource regions in China from 1961 to 2016, this paper focuses on analyzing the variation trend of s...

    Wenzheng Yu, Mingxuan Zhu, Aodi Fu, Li Shao in Artificial Intelligence and Security (2022)

  10. No Access

    Chapter and Conference Paper

    Research on Business Travel Problem Based on Simulated Annealing and Tabu Search Algorithms

    In logistics and transportation, it is usually necessary to take into account the distance, route, time, transportation cost, and human resources. In this paper, the coordinates of 31 cities are used as data s...

    Jianan Chen, Fang Chen, Chao Guo, Yan Sun in Artificial Intelligence and Security (2021)

  11. No Access

    Chapter and Conference Paper

    Texture-Guided U-Net for OCT-to-OCTA Generation

    As a new imaging modality, optical coherence tomography angiography (OCTA) can fully explore the characteristics of retinal blood flow. Considering the inconvenience of acquiring OCTA images and inevitable mec...

    Ziyue Zhang, Zexuan Ji, Qiang Chen, Songtao Yuan in Pattern Recognition and Computer Vision (2021)

  12. No Access

    Chapter and Conference Paper

    Hole Detection with Texture-Suppression on Wooden Plate Surfaces

    We devote to the detection of holes on the surface of household panels. Due to the wide variety of furniture panel patterns, the most critical problem is to eliminate the interference of the texture attached t...

    **aojie An, **aohua **e, **ang Chen in Image and Graphics (2021)

  13. No Access

    Chapter and Conference Paper

    Regulation of Space Manipulators with Free-Swinging Joint Failure Based on Iterative Learning Control

    To ensure that tasks can be completed after a free-swinging joint failure occurs, an iterative learning control method for the space manipulator is proposed in this paper. First, the dynamics coupling relation...

    Yingzhuo Fu, Qingxuan Jia, Gang Chen, Yifan Wang in Intelligent Robotics and Applications (2021)

  14. No Access

    Chapter and Conference Paper

    MSC-Fuse: An Unsupervised Multi-scale Convolutional Fusion Framework for Infrared and Visible Image

    Lacking the labeled data, how to establish an unsupervised learning method is essential for the infrared and visible image fusion task. As such, this article introduces a novel unsupervised learning fusion fra...

    Guo-Yang Chen, **ao-Jun Wu, Hui Li, Tian-Yang Xu in Image and Graphics (2021)

  15. No Access

    Chapter and Conference Paper

    Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition

    Many advanced halftone steganographic schemes focus only on the distortion of human visual perception or the distortion according to statistics. In this paper, a halftone image steganography based on minimizin...

    Mujian Yu, Junwei Luo, Bozhi Xu, Guoliang Chen in Artificial Intelligence and Security (2021)

  16. No Access

    Chapter and Conference Paper

    A Resource-Saving Multi-layer Fault-Tolerant Low Orbit Satellite Network

    Low-orbit satellites have the advantages of low latency, low cost, and flexible launching. They are the main direction for the development of next-generation satellite communications. Based on the STK analysis...

    Tianjiao Zhang, Fang Chen, Yan Sun, Chao Guo in Artificial Intelligence and Security (2021)

  17. No Access

    Chapter and Conference Paper

    Research on Mobile Robot Processing System Based on Shape and Position Measurement

    Aiming at the problem of on-line inspection and processing due to the alignment errors in the assembly process of large aeronautical components, an adaptive digital processing and assembly method is proposed, ...

    Zhanxi Wang, Yongnian Han, Gang Wang, Yiming Zhang in Intelligent Robotics and Applications (2021)

  18. No Access

    Chapter and Conference Paper

    Using Conv-LSTM to Refine Features for Lightweight Image Super-Resolution Network

    In this paper, we propose a lightweight network that uses conv-LSTM for feature fusion (LFN) to improve image super-resolution performance and save the number of parameters. The network extracts features of di...

    Jiangtao Zhang, Yanyun Qu, Liang Chen in Image and Graphics (2021)

  19. No Access

    Chapter and Conference Paper

    The Regional Clusting Effect of the Blockchain Industry Base on Unsupervised Learning Methods

    The blockchain industry has developed rapidly in China last years, but in an extremely uneven pattern, especially in different regions. This paper adopts unsupervised learning methods to delineate the uneven r...

    Yuxi Zhang, Muran Su, Zhen Wu, **ang Chen in Blockchain and Trustworthy Systems (2021)

  20. No Access

    Chapter and Conference Paper

    Selective Multi-scale Learning for Object Detection

    Pyramidal networks are standard methods for multi-scale object detection. Current researches on feature pyramid networks usually adopt layer connections to collect features from certain levels of the feature h...

    Junliang Chen, Weizeng Lu, Linlin Shen in Artificial Neural Networks and Machine Lea… (2021)

previous disabled Page of 4