Skip to main content

previous disabled Page of 15
and
  1. No Access

    Chapter

    Information System of China Spallation Neutron Source and High Energy Photon Source and Its Applications

    The China Spallation Neutron Source (CSNS), the fourth pulse spallation neutron source in the world built during China’s 11th Five-Year Plan (2006–2010), has begun its operation after passing the national acce...

    Hesheng Chen, Gang Chen, Fazhi Qi, Hao Hu, Yakang Li in China’s e-Science Blue Book 2023 (2024)

  2. No Access

    Chapter and Conference Paper

    Exploring the Establishment and Implementation of a Teaching Evaluation System Based on Value-Added Assessment

    Value-added assessment (VAA) can effectively solve the existing problems of the excess of outcome-oriented evaluations and the lack of teaching evaluation feedback mechanisms in higher education, which plays a...

    Li Yang, Gang Chen, Jie Chang, **angzi Li in Computer Science and Educational Informati… (2024)

  3. No Access

    Chapter

    Big Earth Data for Sustainable Development

    In 2015, 193 member states of the United Nations adopted the 2030 Agenda for Sustainable Development, in which, 17 Sustainable Development Goals (SDGs), 169 targets, and more than 230 indicators were proposed ...

    Huadong Guo, Dong Liang, Zhongchang Sun, Fang Chen in China’s e-Science Blue Book 2023 (2024)

  4. No Access

    Chapter and Conference Paper

    Highway: A Super Pipelined Parallel BFT Consensus Algorithm for Permissioned Blockchain

    Blockchain technology has recently received widespread attention from academia and industry, and its application scenarios have expanded from digital currency to all walks of life. However, as a crucial compon...

    Zui Luo, Chang Chen, Wangjie Qiu in Machine Learning for Cyber Security (2023)

  5. No Access

    Chapter and Conference Paper

    Overlap** Community Discovery Algorithm Based on Three-Level Neighbor Node Influence

    In view of the high time complexity of the current overlap** community discovery algorithm and the low stability, an overlap** community discovery algorithm OCDITN based on three-level neighbor influence i...

    Shishuang Chen, Guanru Huang, Sui Lin, Wenchao Jiang in Machine Learning for Cyber Security (2023)

  6. No Access

    Chapter and Conference Paper

    Visual Monitoring Method of Digital Computer Room Based on Digital Twin

    With the rapid development of the Internet of things, big data, artificial intelligence and other new generation information technologies, more and more information technologies are applied in actual productio...

    Huang Chao, Zhang Chen, Liao Rongtao in Application of Big Data, Blockchain, and I… (2023)

  7. No Access

    Chapter and Conference Paper

    Data Reconstruction from Gradient Updates in Federated Learning

    Federated learning has become an emerging technology to protect data privacy in the distributed learning area, by kee** each client user’s data locally. However, recent work shows that client users’ data mig...

    **aoxue Zhang, Junhao Li, Jianjie Zhang, Jijie Yan in Machine Learning for Cyber Security (2023)

  8. No Access

    Chapter and Conference Paper

    Data Leakage with Label Reconstruction in Distributed Learning Environments

    Distributed learning is commonly applied for the high demands of computation resources while training models with large-scale data. However, existing solutions revealed that it may lead to information leakage ...

    **aoxue Zhang, **uhua Zhou, Kongyang Chen in Machine Learning for Cyber Security (2023)

  9. No Access

    Chapter and Conference Paper

    An Efficient Transformer Inference Engine on DSP

    The transformer is one of the most important algorithms in the Natural Language Processing(NLP) field and widely used in computer vision recently. Due to the huge computation requirements, the current transfor...

    Kangkang Chen, Huayou Su, Chaorun Liu in Algorithms and Architectures for Parallel … (2023)

  10. No Access

    Chapter and Conference Paper

    Methodology-Driven Characteristics of Scientific Research Collaboration Networks in the Field of Economic Management: Mining and Analysis Based on Big Data

    Objective: Research takes the methodological knowledge in the full text of academic literature as a knowledge production element, and divides it into four categories: Theory &Method, Data, Model, and Tool & Softw...

    Hao Xu, Shihui Chen, Mengxue Yi, Ke Feng, ** Ding, Yilin Liu in Big Data and Security (2022)

  11. No Access

    Chapter and Conference Paper

    PRGAN: A Progressive Refined GAN for Lesion Localization and Segmentation on High-Resolution Retinal Fundus Photography

    Retinal-related diseases are the leading cause of vision loss and even blindness. The automatic methods for retinal disease segmentation based on medical images are essential for timely treatment. Fully superv...

    Ao Chen, **ao Ma, Qiang Chen, Zexuan Ji in Pattern Recognition and Computer Vision (2022)

  12. No Access

    Chapter and Conference Paper

    Research on Optimization of Fuzzing Test of Unknown Protocol Based on Message Type

    In recent years, due to the large number of unknown protocols, it is necessary to study the security of unknown protocols. IFuzzing is a universal method that can be used to study unknown protocols. In unknown...

    WeiQing Fang, Peng Li, YuJie Zhang, Yang Chen in Big Data and Security (2022)

  13. No Access

    Chapter and Conference Paper

    A Survey of Domain Generalization-Based Face Anti-spoofing

    In recent years, remarkable research attention has been attracted to improve the generalization ability of face anti-spoofing methods, and domain generalization techniques have been widely exploited for adapti...

    Fangling Jiang, Yunfan Liu, Bing Liu, **aoliang Chen, Qi Li in Biometric Recognition (2022)

  14. No Access

    Chapter and Conference Paper

    PM2.5 Concentration Prediction Based on mRMR-XGBoost Model

    Air pollution is one of the main environmental pollution, in which air pollution component prediction is an important problem. At present, there have been many studies using machine learning methods to predict...

    Weijian Zhong, **aoqin Lian, Chao Gao in Machine Learning and Intelligent Communica… (2022)

  15. No Access

    Chapter and Conference Paper

    Survey on Deep Learning Based Fusion Recognition of Multimodal Biometrics

    We take multimodal as a new research paradigm. This research paradigm is based on the premise that all human interactions with the outside world required the support of multimodal sensory systems. Deep learnin...

    Qiuling Yang, **aoliang Chen, Zhaofeng He, Le Chang in Biometric Recognition (2022)

  16. No Access

    Chapter and Conference Paper

    Deep Reinforcement Learning Based Mimicry Defense System for IoT Message Transmission

    With the development of 5G and Internet of Everything, IoT has become an essential network infrastructure. The connection between massive devices brings huge convenience and effectiveness, also introducing mor...

    Zhihao Wang, Dingde Jiang, Jianguang Chen, Wei Yang in Simulation Tools and Techniques (2022)

  17. No Access

    Chapter and Conference Paper

    A Dynamic Migration Strategy of SDN Controllers in LEO Networks

    Multiple low earth orbit (LEO) satellites form a constellation that can construct the network to achieve full coverage of the ground. However, the topology of the LEO satellite network is highly dynamic, and e...

    Liuwei Huo, Dingde Jiang, Wei Yang, Jianguang Chen in Simulation Tools and Techniques (2022)

  18. No Access

    Chapter and Conference Paper

    Efficient and Secure Outsourced Image Watermarking in Cloud Computing

    Image watermark has played an important role in image copyright protection. With the development of cloud computing in recent years, more and more people are willing to outsource the watermark embedding proces...

    **ongjie Fang, Ruopan Lai, Zhipeng Zhou in Artificial Intelligence and Security (2022)

  19. No Access

    Chapter and Conference Paper

    An Underwater Image Color Correction Algorithm Based on Underwater Scene Prior and Residual Network

    Color distortion in underwater scenes affect the accuracy of pattern recognition, visual understanding and key feature extraction work of underwater robots. In this paper, we propose a method to correct color ...

    Mengxing Huang, **** Ye, Shenghan Zhu, Yang Chen in Artificial Intelligence and Security (2022)

  20. No Access

    Chapter and Conference Paper

    Visual Research and Predictive Analysis of Land Resource Use Type Change

    Land cover change is a hot topic in the interdisciplinary research of global change and land science. The existing spatial visualization methods based on remote sensing images have the advantages of wide detec...

    YuDan Zhao, Wu Zeng, YingGe Zhang in Advances in Artificial Intelligence and Se… (2022)

previous disabled Page of 15