Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    State of Charge Estimation of Lithium-Ion Battery Based on Multi-Modal Information Interaction and Fusion

    The assessment of the charge status of lithium-ion batteries holds significant importance in the functioning of electric vehicles, particularly when it comes to real-time monitoring and ensuring safety control...

    Chao Wang, Kaixin Zhang, Chao Wu in Cognitive Systems and Information Processi… (2024)

  2. No Access

    Chapter and Conference Paper

    Fault Self-healing Scheme of MMC-DC Distribution Line

    After the short-circuit fault of DC distribution line, the fault develops very fast and the tolerance of power electronic devices is limited. It is necessary to quickly and selectively cut off the fault line f...

    Zhong Liu, Kaixin Zhang, Junyan Zhang in Proceedings of the International Conferenc… (2023)

  3. No Access

    Chapter and Conference Paper

    A WGAN-Based Method for Generating Malicious Domain Training Data

    Domain Generation Algorithm (DGA) is a common method used by malware to generate a large number of domains on a regular basis. These domains can be used for malicious purposes such as botnet construction and d...

    Kaixin Zhang, Bing Huang, Yunfeng Wu, Chuchu Chai in Artificial Intelligence and Security (2022)

  4. No Access

    Chapter and Conference Paper

    Bus Travel-Time Prediction Based on Deep Spatio-Temporal Model

    Bus travel time estimation in urban city is of great importance, which reduces passengers’ waiting time and improves the quality of service of bus transportation. However, the travel time estimation is affecte...

    Kaixin Zhang, Yongxuan Lai, Liying Jiang in Web Information Systems Engineering – WISE… (2020)

  5. No Access

    Chapter and Conference Paper

    Over-Sampling Multi-classification Method Based on Centroid Space

    The problem of unbalanced data generally exists in various application fields of large data and machine learning, such as medical diagnosis, anomaly detection and so on. Researchers have proposed or adopted a ...

    Haiyong Wang, Weizheng Guan, Kaixin Zhang in Big Data and Security (2020)