Skip to main content

previous disabled Page of 8
and
  1. No Access

    Chapter and Conference Paper

    Efficient Chinese Relation Extraction with Multi-entity Dependency Tree Pruning and Path-Fusion

    Relation Extraction (RE) is a crucial task in natural language processing that aims to predict the relationship between two given entities. In recent years, a large majority of approaches utilized syntactic in...

    Weichuan **ng, Weike You, Linna Zhou, Zhongliang Yang in Neural Information Processing (2024)

  2. No Access

    Chapter and Conference Paper

    Identification and Statistical Study of Key Characteristics of Effective Mushroom Quantity of Sea Mushrooms

    Before the ripening period of seafood mushrooms, it is usually necessary to judge the growth status of seafood mushrooms from the effective amount of seafood mushrooms, and then adjust environmental parameters...

    Jiali Shen, Peichao Li, Zhong Yang, Wanhe Du in Advanced Manufacturing and Automation XIII (2024)

  3. No Access

    Chapter and Conference Paper

    CATS: Connection-Aware and Interaction-Based Text Steganalysis in Social Networks

    The generative linguistic steganography in social networks have potential huge abuse and regulatory risks, with serious implications for information security, especially in the era of large language models. Ma...

    Kaiyi Pang, **shuai Yang, Yue Gao, Minhao Bai in Neural Information Processing (2024)

  4. No Access

    Chapter and Conference Paper

    Hi-Stega: A Hierarchical Linguistic Steganography Framework Combining Retrieval and Generation

    Due to the widespread use of social media, linguistic steganography which embeds secret message into normal text to protect the security and privacy of secret message, has been widely studied and applied. Howe...

    Huili Wang, Zhongliang Yang, **shuai Yang, Yue Gao in Neural Information Processing (2024)

  5. No Access

    Chapter and Conference Paper

    VStego800K: Large-Scale Steganalysis Dataset for Streaming Voice

    In recent years, more and more steganographic methods based on streaming voice have appeared, which poses a great threat to the security of cyberspace. In this paper, in order to promote the development of str...

    Xuan Xu, Shengnan Guo, Zhengyang Fang, Pengcheng Zhou in Digital Forensics and Watermarking (2024)

  6. No Access

    Chapter and Conference Paper

    Genetic-A* Algorithm-Based Routing for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare

    In the field of intelligent digital healthcare, Continuous-flow microfluidic biochip (CFMB) has become a research direction of widespread concern. CFMB integrates a large number of microvalves and large-scale ...

    Huichang Huang, Zhongliao Yang, Jiayuan Zhong in Green, Pervasive, and Cloud Computing (2024)

  7. No Access

    Chapter and Conference Paper

    On Half Guarding Polygons

    Given a polygon P and a set of potential guard locations \(G \in P\) G ...

    Erik Krohn, Alex Pahlow, Zhongxiu Yang in Combinatorial Optimization and Applications (2024)

  8. No Access

    Chapter and Conference Paper

    Distributed Super-Twisting Sliding Mode Adaptive Fault-Tolerant Control for Multiple UAVs with Prescribed Performance

    In this paper, the super-twisting sliding mode-based distributed adaptive fault-tolerant attitude tracking control strategy is proposed for multiple unmanned aerial vehicles (UAVs) with prescribed performance....

    Pengyue Sun, Jiaxu Li, Zhongyu Yang in Proceedings of 2023 7th Chinese Conference… (2024)

  9. No Access

    Chapter and Conference Paper

    IGBT Health Monitoring of Traction Converter Based on Self-Excited Short-Circuit Current Function of Drive Circuit

    The aging fault of insulated gate bipolar transistor (IGBT) is mainly reflected in the fracture of bonding wire. The health status of the module can be monitored by short-circuit current. For the traction inve...

    Li Zhu, **n Wang, **gwen Jia, Guangang Gao in The Proceedings of 2023 International Conf… (2024)

  10. No Access

    Chapter and Conference Paper

    Coupling Environment Experiment Technique of Radiation and Convection Aerodynamic Heating in Wind Tunnel

    A coupling environment experiment capability has been developed that incorporates mutual interactions between radiative heating and convective heating on FD-04 arc-heating wind tunnel of China Academy of Aeros...

    Yuxiang Liu, Denghao Jiang, Zhongkai Yang in 2023 Asia-Pacific International Symposium … (2024)

  11. No Access

    Chapter and Conference Paper

    Mask Reconstruction Augmentation and Attention Aggregation for Stereo Matching

    Stereo matching is a significant task in computer vision and is widely used for depth prediction. Although deep learning stereo matching networks have achieved impressive results in recent years, the current m...

    Zhaokui Li, Zhongxin Yang, **en Zhang in Intelligence Computation and Applications (2024)

  12. No Access

    Chapter and Conference Paper

    Research of Rural Landscape Evaluation System Based on AHP: A Case Study of Zhao Chengwan in Wuhan

    Based on the combination of stratified analysis and fuzzy comprehensive evaluation, Zhao Chengwan rural landscape characteristics and expert opinions, the rural landscape evaluation system in this region was c...

    Zhonggui Yang, Wei Tian, Yangyi Yu in Advances in Energy Resources and Environme… (2024)

  13. No Access

    Chapter and Conference Paper

    Design and Analysis of Energy Storage Converters for Regenerative Braking Energy Absorption in Urban Rail Transit

    Nowadays, the development of urban rail transit is getting faster and faster, but its consequent electric consumption problem is getting more attention, and how to better solve the problem of regenerative brak...

    Yong **, Weijie Pu, in Proceedings of the 6th International Confe… (2024)

  14. No Access

    Chapter and Conference Paper

    A Study on Deformation Mechanisms of Ti2AlNb-Based Alloy Under Plane Strain Compression

    As a superalloy, Ti2AlNb-based alloy faces a great challenge due to the commonly existent centimeter-level coarse grains in as-cast material, which severely deteriorate their mechanical property. In-depth underst...

    Zhongyuan Yang, Haowei Liu, Haiming Zhang in Proceedings of the 14th International Conf… (2024)

  15. No Access

    Chapter and Conference Paper

    Optimization Design of High-Pressure Simulated Rotor

    Combined elastic support which include squirrel cage and squeeze film damper (SFD) are widely used in aero-engines, gas turbine, and steam turbine. Squirrel cage can vary the critical speed and strain energy d...

    Zhongyu Yang, Jiali Chen, Yinli Feng in Advances in Applied Nonlinear Dynamics, Vi… (2024)

  16. No Access

    Chapter and Conference Paper

    Refinement Mechanism of Centimeter-Grade Coarse Grains in As-Cast Ti2AlNb-Based Alloy Through Uniaxial and Multi-axial Compressions

    Ti2AlNb-based alloy has great application potential in the aerospace industry due to its low density, high service temperature, and excellent mechanical properties. However, the ingots of this material are usuall...

    Haowei Liu, Zhongyuan Yang, Zhenshan Cui in Proceedings of the 14th International Conf… (2024)

  17. No Access

    Chapter and Conference Paper

    Resource Binding and Module Placement Algorithms for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare

    Continuous-Flow Microfluidic Biochip (CFMB), with their integrated features, bring traditional biochemical experiments on a single chip to accomplish complex operations and reactions through precise control, e...

    Zhongliao Yang, Huichang Huang, Zeyi Liu in Green, Pervasive, and Cloud Computing (2024)

  18. No Access

    Chapter and Conference Paper

    DNA Steganalysis Based on Multi-dimensional Feature Extraction and Fusion

    Steganalysis, as an adversarial technique to steganography, aims to uncover potential concealed information transmission, holding significant research implications and value in maintaining societal peace and s...

    Zhuang Wang, **yi **a, Kaibo Huang, Shengnan Guo in Digital Forensics and Watermarking (2024)

  19. No Access

    Chapter and Conference Paper

    Linguistic Steganalysis Based on Clustering and Ensemble Learning in Imbalanced Scenario

    With the rapid development of the Internet, more and more methods of text steganography have emerged. However, these methods are easily abused in public networks for malicious purposes, which poses a great thr...

    Shengnan Guo, Xuekai Chen, Zhuang Wang in Digital Forensics and Watermarking (2024)

  20. No Access

    Chapter and Conference Paper

    Secure Steganography Scheme Based on Steganography Generative Adversarial Network

    Taking into consideration the security concerns surrounding steganography due to the infiltration of dense images during the image stealth process, this article proposes the addition of a noise layer between t...

    Guangxu Pan, Zhongpeng Yang, Yong Ma in Frontiers in Cyber Security (2024)

previous disabled Page of 8