Skip to main content

previous disabled Page of 322
and
  1. No Access

    Chapter and Conference Paper

    InDNI: An Infection Time Independent Method for Diffusion Network Inference

    Diffusion network inference aims to reveal the message propagation process among users and has attracted many research interests due to the fundamental role it plays in some real applications, such as rumor-sp...

    Guoxin Chen, Yongqing Wang, Jiangli Shao, Boshen Shi, Huawei Shen in Information Retrieval (2023)

  2. No Access

    Chapter and Conference Paper

    Spline-Based Dense Medial Descriptors for Image Simplification Using Saliency Maps

    Medial descriptors have attracted increasing interest in image representation, simplification, and compression. Recently, such descriptors have been separately used to (a) increase the local quality of represe...

    Jieying Wang, Leonardo de Melo in Computer Vision, Imaging and Computer Grap… (2023)

  3. No Access

    Chapter and Conference Paper

    Recognition of Blinding Diseases from Ocular OCT Images Based on Deep Learning

    Age-Related Macular Degeneration (AMD) and Diabetes Macular Edema (DME) are eye diseases with the highest blinding rate. Optical Coherence Tomography (OCT) is widely used to diagnose different eye diseases. Ho...

    Rong Wang, Yaqi Wang, Weiquan Yu, Suiyu Zhang in Intelligent Robotics and Applications (2022)

  4. No Access

    Chapter and Conference Paper

    Prevention of GAN-Based Privacy Inferring Attacks Towards Federated Learning

    With the increasing amount of data, data privacy has drawn great concern in machine learning among the public. Federated Learning, which is a new kind of distributed learning framework, enables data providers ...

    Hongbo Cao, Yongsheng Zhu, Yuange Ren in Collaborative Computing: Networking, Appli… (2022)

  5. No Access

    Chapter and Conference Paper

    CO-AutoML: An Optimizable Automated Machine Learning System

    In recent years, many automated machine learning (AutoML) techniques are proposed for the automatic selection or design machine learning models. They bring great convenience to the use of machine learning techniq...

    Chunnan Wang, Hongzhi Wang, Bo Xu in Database Systems for Advanced Applications (2022)

  6. No Access

    Chapter and Conference Paper

    Deepfake Video Detection Exploiting Binocular Synchronization

    How to accurately figure out Deepfake face video has recently been a popular research topic. The normal genuine faces exhibit binocular synchronization phenomenon of eye movements, either blinking or saccade....

    Wenjie Wang, Zhongyuan Wang, Guangcheng Wang in Artificial Neural Networks and Machine Lea… (2022)

  7. No Access

    Chapter and Conference Paper

    A Review of Crop Recognition Methods Based on Multi-source Remote Sensing Data

    How to identify crop types faster and more accurately by integrating multiple sources Remote Sensing (hereafter RS) data has become a key technique in topographic regions, yet few literatures has addressed on ...

    Lei Wang, **a Zhao, Bernard Engel, Lu Wang in Advances in Artificial Intelligence and Se… (2022)

  8. No Access

    Chapter and Conference Paper

    Context Reasoning Attention Network: Generating Plausible Distractors for Multi-choice Questions

    Distractor generation, which aims to generate the wrong option part of multi-choice questions, has been proposed to assist educators to test the examinees’ reading comprehension and reasoning ability. Recently...

    Mingchao Li, Liuyin Wang, Haozhuang Liu in Artificial Neural Networks and Machine Lea… (2022)

  9. No Access

    Chapter and Conference Paper

    Research on the Design and Education of Serious Network Security Games

    Through the correct teaching and game design, not only can innovation be carried out, but the highly effective network security teaching and the training solution countermeasure can also develop the student’s ...

    Keyong Wang, Pei Wang, Yuanheng Zhang, Dequan Yang in Data Science (2022)

  10. No Access

    Chapter and Conference Paper

    Brain Network Connectivity Analysis of Different ADHD Groups Based on CNN-LSTM Classification Model

    Attention deficit hyperactivity disorder (ADHD), as a common disease of adolescents, is characterized by the inability to concentrate and moderate impulsive behavior. Since the clinical level mostly depends on...

    Yuchao He, Cheng Wang, **n Wang, Mingxing Zhu in Intelligent Robotics and Applications (2022)

  11. No Access

    Chapter and Conference Paper

    Quantum Entanglement Inspired Correlation Learning for Classification

    Correlation is an important information resource, which is often used as a fundamental quantity for modeling tasks in machine learning. Since correlation between quantum entangled systems often surpasses that ...

    Junwei Zhang, Zhao Li, Juan Wang in Advances in Knowledge Discovery and Data M… (2022)

  12. No Access

    Chapter and Conference Paper

    Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption

    Blockchain has been widely used in many fields because it can solve the problem of information asymmetry and enable users who do not trust each other to collaborate without the participation of third-party int...

    Yang Li, Baoyue Qi, Mengmeng Wang, Jianming Zhu, **uli Wang in Data Science (2022)

  13. No Access

    Chapter and Conference Paper

    Bi-level Optimization Method for Automatic Reward Sha** of Reinforcement Learning

    The key to lowering the threshold of the application of reinforcement learning is the simplicity and convenience of reward function design. At present, reinforcement learning with good performance mostly adopt...

    Ludi Wang, Zhaolei Wang, Qinghai Gong in Artificial Neural Networks and Machine Lea… (2022)

  14. No Access

    Chapter and Conference Paper

    An Eye Movement Study of Joint Attention Deficits in Children with Autism Spectrum Disorders

    Using eye tracking technology to explore the underlying processing mechanisms of joint attention in children with autism spectrum disorders (ASD). The experiment selected 32 ASD children and 34 IQ-matched typi...

    Wang **g, Lin Zehui, Wang Yifan, Wei Ling in Intelligent Robotics and Applications (2022)

  15. No Access

    Chapter and Conference Paper

    Enhancing Document-Level Relation Extraction by Entity Knowledge Injection

    Document-level relation extraction (RE) aims to identify the relations between entities throughout an entire document. It needs complex reasoning skills to synthesize various knowledge such as coreferences and...

    **nyi Wang, Zitao Wang, Weijian Sun, Wei Hu in The Semantic Web – ISWC 2022 (2022)

  16. No Access

    Chapter and Conference Paper

    Perceptual Image Hashing with Bidirectional Generative Adversarial Networks for Copy Detection

    The traditional perceptual hashing algorithm is generally achieved by artificially extracting features from an image and quantizing them into a hash code. However, it is often hard to capture the inherent feat...

    Bin Ma, Yili Wang, Chunpeng Wang, Jian Li in Advances in Artificial Intelligence and Se… (2022)

  17. No Access

    Chapter and Conference Paper

    ECCKG: An Eventuality-Centric Commonsense Knowledge Graph

    Eventuality-centric knowledge graphs are essential resources for many downstream applications. However, current knowledge graphs mainly focus on knowledge about entities while ignoring the real-world eventuali...

    Ya Wang, Cungen Cao, Zhiwen Chen, Shi Wang in Knowledge Science, Engineering and Management (2022)

  18. No Access

    Chapter and Conference Paper

    A Flexible Rod-Driven Multimode Spatial Variable Geometry Truss Manipulator for Morphing Wings

    In this paper, a flexible rod-driven VGTM for morphing wings is designed. The mechanism contains two parts: flexible parallel mechanism and VGTM. The flexible drive reduces the drives’ number and weight of the...

    Yingzhong Tian, ** Yu, Long Li, Wenbin Wang in Intelligent Robotics and Applications (2022)

  19. No Access

    Chapter and Conference Paper

    Effects of Different Resistance Schemes Applied by Hip Exoskeleton on Lower-Limb Muscle Recruitment and Coordination

    Lower-limb exoskeletons are used in a wide range of scenarios. The extensive applications are based on the effective intervention on people, which relies on the understanding of the effect of the exoskeleton i...

    Zilu Wang, Zhihao Zhou, Qining Wang in Intelligent Robotics and Applications (2022)

  20. No Access

    Chapter and Conference Paper

    Reversible Data Hiding for JPEG Image Based on Paillier Encryption

    With the convenient and rapid development of cloud storage, data privacy violations have become increasingly prominent. Reversible Data Hiding (RDH) can be used to embed additional data in encrypted data store...

    Bin Ma, Baona Zhang, Chunpeng Wang, Jian Li in Advances in Artificial Intelligence and Se… (2022)

previous disabled Page of 322