Skip to main content

previous disabled Page of 12
and
  1. No Access

    Chapter and Conference Paper

    Context Reasoning Attention Network: Generating Plausible Distractors for Multi-choice Questions

    Distractor generation, which aims to generate the wrong option part of multi-choice questions, has been proposed to assist educators to test the examinees’ reading comprehension and reasoning ability. Recently...

    Mingchao Li, Liuyin Wang, Haozhuang Liu in Artificial Neural Networks and Machine Lea… (2022)

  2. No Access

    Chapter and Conference Paper

    Reliability Evaluation of Smart DC Microgrid

    Nowadays, one of the main contributors of air pollution is thermal power plant. China want to develop renewable energy to solve the problem [1]. In many areas, roof photovoltaic (PV) energy systems, wind energy s...

    Kai Zheng, **ang Yao, Wei Wang in Advances in Artificial Intelligence and Security (2022)

  3. No Access

    Chapter and Conference Paper

    Prevention of GAN-Based Privacy Inferring Attacks Towards Federated Learning

    With the increasing amount of data, data privacy has drawn great concern in machine learning among the public. Federated Learning, which is a new kind of distributed learning framework, enables data providers ...

    Hongbo Cao, Yongsheng Zhu, Yuange Ren in Collaborative Computing: Networking, Appli… (2022)

  4. No Access

    Chapter and Conference Paper

    Modeling Uncertainty in Neural Relation Extraction

    Previous work on neural relation extraction mainly focus on point-based methods and ignores uncertainty within the bag, thus making poor predictions when there are insufficient instances of the bag. To solve t...

    Yu Hong, Yanghua **ao, Wei Wang, Yunwen Chen in Database Systems for Advanced Applications (2022)

  5. No Access

    Chapter and Conference Paper

    DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay

    Many practical secure systems have been designed to prevent real-world attacks via maximizing the attacking cost so as to reduce attack intentions. Inspired by this philosophy, we propose a new concept named d...

    Yubo Zheng, Peng Xu, Wei Wang, Tianyang Chen in Computer Security – ESORICS 2022 (2022)

  6. No Access

    Chapter and Conference Paper

    Cross-Domain Cross-Set Few-Shot Learning via Learning Compact and Aligned Representations

    Few-shot learning (FSL) aims to recognize novel queries with only a few support samples through leveraging prior knowledge from a base dataset. In this paper, we consider the domain shift problem in FSL and ai...

    Wentao Chen, Zhang Zhang, Wei Wang, Liang Wang, Zilei Wang in Computer Vision – ECCV 2022 (2022)

  7. No Access

    Chapter and Conference Paper

    A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis

    GIFT-64 is a 64-bit block cipher with a 128-bit key that is more lightweight than PRESENT. This paper provides a detailed analysis of GIFT-64 against differential and linear attacks. Our work complements automati...

    Ling Sun, Bart Preneel, Wei Wang, Meiqin Wang in Advances in Cryptology – EUROCRYPT 2022 (2022)

  8. No Access

    Chapter and Conference Paper

    3D-Aware Semantic-Guided Generative Model for Human Synthesis

    Generative Neural Radiance Field (GNeRF) models, which extract implicit 3D representations from 2D images, have recently been shown to produce realistic images representing rigid/semi-rigid objects, such as hu...

    Jichao Zhang, Enver Sangineto, Hao Tang, Aliaksandr Siarohin in Computer Vision – ECCV 2022 (2022)

  9. No Access

    Chapter and Conference Paper

    Research on Network Security Situation Assessment Model Based on Double AHP

    Network security situation assessment is an important part of the situational awareness research process and the most important thing. Situation assessment refers to the assessment of the current security stat...

    Wei Wang, Xuqiu Chen, Wei Gan, Yi Yang in Advances in Artificial Intelligence and Se… (2022)

  10. No Access

    Chapter and Conference Paper

    A Safety Helmet Detection Method Based on the Combination of SSD and HSV Color Space

    Wearing safety helmet is a protective measure, operators must wear them when they entering the construction area. Safety helmet can significantly reduce the probability of brain injury of workers, it ensures t...

    Wei Wang, Song Gao, Renjie Song, Ziming Wang in IT Convergence and Security (2021)

  11. No Access

    Chapter and Conference Paper

    Research on Far Field Calculation of Antenna with Conductor Interference

    In a two-dimensional space, the conductor outline is approximated by a triangular column, and an array antenna is simulated with a set of infinitely long line current sources. The calculation is carried out us...

    Wei Wang, Li Wang, Boni Liu in Artificial Intelligence for Communications and Networks (2021)

  12. No Access

    Chapter and Conference Paper

    Prediction of Excessive Cadmium in Rice Based on Weighted Bayesian Fusion Model

    Soil Cd pollution directly affects the safety of agricultural products. Frequent Cd pollution incidents have repeatedly reminded that soil Cd pollution in China is not optimistic. In this paper, the linear reg...

    Baohua Zhang, Wei Wang, Yi An, Yuan Jiao in New Developments of IT, IoT and ICT Applie… (2021)

  13. No Access

    Chapter and Conference Paper

    Node-Image CAE: A Novel Embedding Method via Convolutional Auto-encoder and High-Order Proximities

    The network embedding method, which mainly aims to generate low-dimensional embedding vectors for nodes in a network, has received great passion from researchers and provides excellent tools for application an...

    Di Qiao, Wu Yang, Wei Wang in Knowledge Science, Engineering and Management (2021)

  14. No Access

    Chapter and Conference Paper

    A Comparative Study on Autism Spectrum Disorder Detection via 3D Convolutional Neural Networks

    The prevalence of Autism Spectrum Disorder (ASD) in the United States has increased by 178% from 2000 to 2016. However, due to the lack of well-trained specialists and the time-consuming diagnostic process, ma...

    Kaijie Zhang, Wei Wang, Yijun Guo in Pattern Recognition. ICPR International Wo… (2021)

  15. No Access

    Chapter and Conference Paper

    An Immune Clone Particle Swarm Optimization Algorithm for Sparse Representation of Hyperspectral Images

    The sparse representation of hyperspectral images can reduce the amount of data and facilitate image classification and interpretation processing. An immune clone particle swarm optimization algorithm (ICPSO) ...

    Li Wang, Wei Wang, Boni Liu in Artificial Intelligence for Communications and Networks (2021)

  16. No Access

    Chapter and Conference Paper

    Bestie: Very Practical Searchable Encryption with Forward and Backward Security

    Dynamic searchable symmetric-key encryption (DSSE) is a promising crypto-tool that enables secure keyword searching over dynamically added or deleted ciphertexts. Currently, many works on DSSE devote their effort...

    Tianyang Chen, Peng Xu, Wei Wang, Yubo Zheng in Computer Security – ESORICS 2021 (2021)

  17. No Access

    Chapter and Conference Paper

    Designing the Security Enhancement Features in the Future Headphone Experience

    In recent years, headphones are becoming a more and more essential personal electronic device to carry cutting-edge consumer technology into everyday life. Hence, it’s an urgent need to enhance security featur...

    Fangli Song, Wei Wang in Design, User Experience, and Usability: D… (2021)

  18. No Access

    Chapter

    Crop Information Sensing Technology

    Precision agricultural practice requires getting aware of crop growth situation via sensitive, accurate, economical, and fast sensing means to improve decision-making for production management. Supported by Io...

    Fei Liu, Yong He, Qin Zhang, Wei Wang, Tingting Shen in Agricultural Internet of Things (2021)

  19. No Access

    Chapter and Conference Paper

    Joint Scheduling of Spectrum and Storage Resources for Content Distribution in Space-Ground Integrated Information Network

    Aiming at the problem of spectrum resource shortage caused by the rapid increase of multimedia data traffic in terrestrial network, a joint scheduling of storage resources and spectrum resources (JSSS) algorit...

    Yang Cao, Disheng Wu, Yulong Chen, Wei Wang in Space Information Network (2021)

  20. No Access

    Chapter and Conference Paper

    Study on Steady-State Output Characteristics of Three-Level Boost Converter

    The application of the three-level boost converter (TLBC) is able to reduce the voltage stress of power switches and diodes in the back-end circuit, also can reduce the volume and weight of energy storage comp...

    Chengwei Kang, Wei Wang, Guoqin Zhang in Proceedings of the 4th International Confe… (2020)

previous disabled Page of 12