Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Muscle Fatigue Classification Based on GA Optimization of BP Neural Network

    The application of medical big data and artificial intelligence algorithms are majorly popular in biomedical field. In this paper, BP neural network optimized by genetic algorithm was used to study the classif...

    Mengjie Zang, Lidong **ng, Zhiyu Qian, Liuye Yao in Big Data and Security (2023)

  2. No Access

    Chapter and Conference Paper

    Prediction of Game Result in Chinese Football Super League

    Football is one of the dominant sports in the world and has become a trillion-dollar industry. The top professional football league in China, the Chinese Super League (CSL) with tons of room to grow, is respon...

    Guo Yu, **gyong Yang, **ongda Chen in Methods and Applications for Modeling and … (2022)

  3. No Access

    Chapter and Conference Paper

    A New 3D Printed Passive Flexible Prosthesis Based on the Human Foot

    The existing passive foot prostheses do not contain all the joints of the foot, so they cannot fully simulate the natural human gait. They can induce various secondary injuries and require extra energy consump...

    Jianqiao **, Kunyang Wang, Lei Ren, Zhihui Qian in Intelligent Robotics and Applications (2022)

  4. No Access

    Chapter and Conference Paper

    EgoBody: Human Body Shape and Motion of Interacting People from Head-Mounted Devices

    Understanding social interactions from egocentric views is crucial for many applications, ranging from assistive robotics to AR/VR. Key to reasoning about interactions is to understand the body pose and motion of...

    Siwei Zhang, Qianli Ma, Yan Zhang, Zhiyin Qian, Taein Kwon in Computer Vision – ECCV 2022 (2022)

  5. No Access

    Chapter and Conference Paper

    Aerial Image Object Detection Based on Superpixel-Related Patch

    Aerial image object detection and recognition has attracted increasing attention in recent years. Many excellent detectors have been proposed. However, due to the high-resolution of aerial images, these detect...

    Jiehua Lin, Yan Zhao, Shigang Wang, Meimei Chen, Hongbo Lin in Image and Graphics (2021)

  6. No Access

    Chapter and Conference Paper

    When the Attacker Knows a Lot: The GAGA Graph Anonymizer

    When releasing graph data (e.g., social network) to public or third parties, data privacy becomes a major concern. It has been shown that state-of-the-art graph anonymization techniques suffer from a lack of s...

    Arash Alavi, Rajiv Gupta, Zhiyun Qian in Information Security (2019)

  7. No Access

    Chapter and Conference Paper

    Diversified Spatial Keyword Query on Topic Coverage

    Spatial keyword queries are widely used in location based service systems nowadays to find the spatial web object people need. The returned objects usually are relevant to the query but not diversified each ot...

    Zhihu Qian, Ling Zhang, Haifeng Zhu, Jiajie Xu in Web and Big Data (2018)

  8. No Access

    Chapter and Conference Paper

    RARE: A Systematic Augmented Router Emulation for Malware Analysis

    How can we analyze and profile the behavior of a router malware? This is the motivating question behind our work focusing on router. Router-specific malware has emerged as a new vector for hackers, but has rec...

    Ahmad Darki, Chun-Yu Chuang, Michalis Faloutsos in Passive and Active Measurement (2018)

  9. Chapter and Conference Paper

    Skeleton-Based 3D Tracking of Multiple Fish From Two Orthogonal Views

    This paper proposes a skeleton-based method for tracking multiple fish in 3D space. First, skeleton analysis is performed to simplify object into feature point representation according to shape characteristics...

    Zhiming Qian, Meiling Shi, Meijiao Wang, Tianrui Cun in Computer Vision (2017)

  10. No Access

    Chapter and Conference Paper

    Where Is the Weakest Link? A Study on Security Discrepancies Between Android Apps and Their Website Counterparts

    As we move into the mobile era, many functionalities in standard web services are being re-implemented in mobile apps and services, including many security-related functionalities. However, it has been observe...

    Arash Alavi, Alan Quach, Hang Zhang, Bryan Marsh in Passive and Active Measurement (2017)

  11. No Access

    Chapter and Conference Paper

    On Efficient Spatial Keyword Querying with Semantics

    The fast development of GPS equipped devices has aroused widespread use of spatial keyword querying in location based services nowadays. Existing spatial keyword indexing and querying methodologies mainly focu...

    Zhihu Qian, Jiajie Xu, Kai Zheng, Wei Sun in Database Systems for Advanced Applications (2016)

  12. Chapter and Conference Paper

    Dynamic Learning of SCRF for Feature Selection and Classification of Hyperspectral Imagery

    This paper investigates the feature selection and contextual classification of hyperspectral images through the sparse conditional random field (SCRF) model. To relieve the heavy degeneration of classification...

    ** Zhong, Zhiming Qian, Runsheng Wang in Structural, Syntactic, and Statistical Pat… (2012)

  13. No Access

    Chapter and Conference Paper

    Curriculum System for Postgraduates Focused on Emerging Communication Technologies

    The curriculum system is a core of framework systems of talent cultivation for postgraduates. Therefore, exploring and establishing a high-level postgraduate curriculum system is a very important aspect of pro...

    Zhihong Qian, ** Huang, **aohang Shang in Information and Business Intelligence (2012)

  14. No Access

    Chapter and Conference Paper

    M/I Adaptation Layer Network Protocol for IoT Based on 6LoWPAN

    The four-layer network protocol architecture for Internet of Things is proposed based on 6LoWPAN, and the M/I adaptation layer, as the key of the protocol architecture, achieve the integration between underlyi...

    Zhihong Qian, Yijun Wang, Xue Wang, Shuang Zhu in Internet of Things (2012)

  15. No Access

    Chapter and Conference Paper

    Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks

    Managing numerous security vulnerabilities has long been a difficult and daunting task especially due to the complexity, heterogeneity, and various operational constraints of the network. In this paper, we foc...

    Zhiyun Qian, Z. Morley Mao, Ammar Rayes in Security and Privacy in Communication Netw… (2012)

  16. No Access

    Chapter and Conference Paper

    GML Data Management: Framework and Prototype

    Geography Markup Language (GML) with the feature of XML-encoding and full-formed specification has been widely used in various application systems as internal representation of geo-spatial data for its efficie...

    Weili Wang, Fabiao Wang, Zhi** Qian in Database Systems for Adanced Applications (2011)

  17. No Access

    Chapter and Conference Paper

    Importing MB-OFDM Synchronization Approach into Core Curriculums for Postgraduates Education

    Postgraduate education is currently engaged in curriculum reform in China. With the on-going reform, many potential problems are exposed gradually. In this paper, the ideas and methods of reforming the postgra...

    Zhihong Qian, **aohang Shang, ** Huang, Xue Wang in Information Computing and Applications (2011)

  18. No Access

    Chapter and Conference Paper

    Ensemble: Community-Based Anomaly Detection for Popular Applications

    A major challenge in securing end-user systems is the risk of popular applications being hijacked at run-time. Traditional measures do not prevent such threats because the code itself is unmodified and local a...

    Feng Qian, Zhiyun Qian, Z. Morley Mao in Security and Privacy in Communication Netw… (2009)