Skip to main content

previous disabled Page of 9
and
  1. No Access

    Chapter and Conference Paper

    RLSCNet: A Residual Line-Shaped Convolutional Network for Vanishing Point Detection

    The convolutional neural network (CNN) is an effective model for vanishing point (VP) detection, but its success heavily relies on a massive amount of training data to ensure high accuracy. Without sufficient ...

    Wei Wang, Peng Lu, Xujun Peng, Wang Yin, Zhaoran Zhao in MultiMedia Modeling (2023)

  2. No Access

    Chapter and Conference Paper

    Prevention of GAN-Based Privacy Inferring Attacks Towards Federated Learning

    With the increasing amount of data, data privacy has drawn great concern in machine learning among the public. Federated Learning, which is a new kind of distributed learning framework, enables data providers ...

    Hongbo Cao, Yongsheng Zhu, Yuange Ren in Collaborative Computing: Networking, Appli… (2022)

  3. No Access

    Chapter and Conference Paper

    Defending Use-After-Free via Relationship Between Memory and Pointer

    Existing approaches to defending Use-After-Free (UAF) exploits are usually done using static or dynamic analysis. However, both static and dynamic analysis suffer from intrinsic deficiencies. The existing stat...

    Guangquan Xu, Miao Li, **aotong Li, Kai Chen in Collaborative Computing: Networking, Appli… (2021)

  4. No Access

    Chapter and Conference Paper

    Consistency and Coherency Enhanced Story Generation

    Story generation is a challenging task, which demands to maintain consistency of the plots and characters throughout the story. Previous works have shown that GPT2, a large-scale language model, has achieved a...

    Wei Wang, Piji Li, Hai-Tao Zheng in Advances in Information Retrieval (2021)

  5. No Access

    Chapter and Conference Paper

    Financial Numeral Classification Model Based on BERT

    Numerals contain rich semantic information in financial documents, and they play significant roles in financial data analysis and financial decision making. This paper proposes a model based on the Bidirection...

    Wei Wang, Maofu Liu, Yukun Zhang in NII Testbeds and Community for Information… (2019)

  6. No Access

    Chapter and Conference Paper

    DynGraphGAN: Dynamic Graph Embedding via Generative Adversarial Networks

    Graphs have become widely adopted as a means of representing relationships between entities in many applications. These graphs often evolve over time. Learning effective representations preserving graph topolo...

    Yun **ong, Yao Zhang, Hanjie Fu, Wei Wang in Database Systems for Advanced Applications (2019)

  7. No Access

    Chapter and Conference Paper

    Rules for Inducing Hierarchies from Social Tagging Data

    Automatic generation of hierarchies from social tags is a challenging task. We identified three rules, set inclusion, graph centrality and information-theoretic condition from the literature and proposed two n...

    Hang Dong, Wei Wang, Frans Coenen in Transforming Digital Worlds (2018)

  8. No Access

    Chapter and Conference Paper

    MTSC: An Effective Multiple Time Series Compressing Approach

    As the volume of time series data being accumulated is likely to soar, time series compression has become essential in a wide range of sensor-data applications, like Industry 4.0 and Smart grid. Compressing mu...

    Ningting Pan, Peng Wang, Jiaye Wu, Wei Wang in Database and Expert Systems Applications (2018)

  9. No Access

    Chapter and Conference Paper

    Randomizing SVM Against Adversarial Attacks Under Uncertainty

    Robust machine learning algorithms have been widely studied in adversarial environments where the adversary maliciously manipulates data samples to evade security systems. In this paper, we propose randomized ...

    Yan Chen, Wei Wang, **angliang Zhang in Advances in Knowledge Discovery and Data Mining (2018)

  10. No Access

    Chapter and Conference Paper

    A CRF-Based Stacking Model with Meta-features for Named Entity Recognition

    Named Entity Recognition (NER) is a challenging task in Natural Language Processing. Recently, machine learning based methods are widely used for the NER task and outperform traditional handcrafted rule based ...

    Shifeng Liu, Yifang Sun, Wei Wang in Advances in Knowledge Discovery and Data M… (2018)

  11. Chapter and Conference Paper

    High Capacity Reversible Data Hiding with Contrast Enhancement

    Reversible data hiding aims at recovering exactly the cover image from the marked image after extracting the hidden data. Reversible data hiding with contrast enhancement proposed by Wu et al. achieved a good eff...

    Yonggwon Ri, **g Dong, Wei Wang, Tieniu Tan in Computer Vision (2017)

  12. Chapter and Conference Paper

    Design of Internet Rehabilitation Service System with Individual Assessment Data for Autistic Children

    As a subtype of pervasive development disorder, autism has unknown cause of disease and no completely rehabilitated cases to date. However, in the golden intervention period from 2 to 6 years old, scientific r...

    Lie Zhang, Guobin Wang, Jiarui Wu, Wei Wang in Distributed, Ambient and Pervasive Interac… (2017)

  13. Chapter and Conference Paper

    PreNet: Parallel Recurrent Neural Networks for Image Classification

    Convolutional Neural Networks (CNNs) have made outstanding achievements in computer vision, e.g., image classification and object detection, by modelling the receptive field of visual cortex with convolution a...

    Junbo Wang, Wei Wang, Liang Wang, Tieniu Tan in Computer Vision (2017)

  14. Chapter and Conference Paper

    Relevance and Coherence Based Image Caption

    The attention-based image caption framework has been widely explored in recent years. However, most techniques generate next word conditioned on previous words and current visual contents, while the relationsh...

    Tao Zhang, Wei Wang, Liang Wang, Qinghua Hu in Computer Vision (2017)

  15. Chapter and Conference Paper

    Image Forgery Detection Based on Semantic Image Understanding

    Image forensics has been focusing on low-level visual features, paying little attention to high-level semantic information of the image. In this work, we propose the framework for image forgery detection based...

    Kui Ye, **g Dong, Wei Wang, **dong Xu, Tieniu Tan in Computer Vision (2017)

  16. No Access

    Chapter and Conference Paper

    Efficient Approximate Entity Matching Using Jaro-Winkler Distance

    Jaro-Winkler distance is a measurement to measure the similarity between two strings. Since Jaro-Winkler distance performs well in matching personal and entity names, it is widely used in the areas of record l...

    Yaoshu Wang, Jianbin Qin, Wei Wang in Web Information Systems Engineering – WISE 2017 (2017)

  17. No Access

    Chapter and Conference Paper

    Effect of Linked Rules on Business Process Model Understanding

    Business process models are widely used in organizations by information systems analysts to represent complex business requirements and by business users to understand business operations and constraints. This...

    Wei Wang, Marta Indulska, Shazia Sadiq, Barbara Weber in Business Process Management (2017)

  18. No Access

    Chapter and Conference Paper

    A Social Stability Analysis System Based on Web Sensitive Information Mining

    Researches on domestic social stability analysis mainly focus on construction of social stability theory, architecture and index, while few pay attention on quantitative analysis. In this paper, a social stabi...

    Wei Wang in Big Data Technology and Applications (2016)

  19. No Access

    Chapter and Conference Paper

    A Novel Load Balancing Algorithm Based on Improved Particle Swarm Optimization in Cloud Computing Environment

    In the area of cloud computing load balancing, the Particle Swarm Optimization (PSO) algorithm is neoteric and now praised highly, but recently a more neoteric algorithm which deploys the classifier into load ...

    Yongfei Zhu, Di Zhao, Wei Wang, Haiwu He in Human Centered Computing (2016)

  20. Chapter and Conference Paper

    Survey on Campus Landscape Construction and Study on Suitability Comprehensive Evaluation

    Scientific and rational designing and construction of green infrastructure is an important part of the sustainable urbanization of China. In view of this, deeper insights into the actual condition of campus la...

    Wei Wang, Zhongwei Shen, Huayi Zhou in Cross-Cultural Design (2016)

previous disabled Page of 9