Skip to main content

previous disabled Page of 39
and
  1. No Access

    Article

    Indexing spatiotemporal trajectory data streams on key-value storage

    In a trajectory management system, moving objects are typically equipped with GPS devices to report their locations to a data store. Given the potentially high frequency of location updates by multiple moving ...

    **aofei Zhao, Kam-Yiu Lam, Tei-Wei Kuo in Computing (2024)

  2. No Access

    Article

    Community anomaly detection in attribute networks based on refining context

    With the widespread use of attribute networks, anomalous node detection on attribute networks has received increasing attention. By utilizing communities as reference contexts for local anomaly node detection,...

    Yonghui Lin, Li Xu, Wei Lin, Jiayin Li in Computing (2024)

  3. No Access

    Article

    An improved indicator-based two-archive algorithm for many-objective optimization problems

    The large number of objectives in many-objective optimization problems (MaOPs) has posed significant challenges to the performance of multi-objective evolutionary algorithms (MOEAs) in terms of convergence and...

    Weida Song, Shanxin Zhang, Wenlong Ge, Wei Wang in Computing (2024)

  4. No Access

    Article

    TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things

    With the popularity of the Internet of Things (IoT), massive amounts of data are generated every second. By analyzing this data, attackers can launch kinds of attacks for their own profits, such as data tamper...

    Hui **e, Jun Zheng, Zhengyuan Zhang, Shengjun Wei, Changzhen Hu in Computing (2024)

  5. No Access

    Article

    A fast and accurate coupled meshless algorithm for the 2D/3D Gross–Pitaevskii equations on two GPUs

    This paper first presents a high-efficient and accurate coupled meshless algorithm for solving the multi-dimensional Gross–Pitaevskii equation (GPE) in unbounded domain, which is implemented on CUDA-program-ba...

    Tao Jiang, **ang-Yang Wei, Yue Li, Deng-Shan Wang, **-Yun Yuan in Computing (2023)

  6. No Access

    Article

    A framework for data anomaly detection based on iterative optimization in IoT systems

    With the advent of 5 G, the Internet of Things (IoT) makes many basic applications possible. In IoT applications, sensors are widely deployed to collect various data. Due to the dynamic nature of the wireless ...

    Zhongmin Wang, Zhihao Wei, Cong Gao, Yan** Chen, Fengwei Wang in Computing (2023)

  7. No Access

    Article

    Signed directed attention network

    Network embedding has facilitated lots of network analytical tasks by representing nodes as low-dimensional vectors. As an extension of convolutional neural networks from Euclidean data to irregular data, Grap...

    Yong Wu, Binjun Wang, Wei Li, Wenmao Liu in Computing (2023)

  8. No Access

    Article

    Combining unsupervised and supervised classification for customer value discovery in the telecom industry: a deep learning approach

    Customer behaviour analysis in a telecom market is a challenging task in the customer relationship management area. In this paper, we propose a customer behaviour recognition model that combines unsupervised c...

    Yang Zhao, Zhen Shao, Wei Zhao, Jun Han, Qingru Zheng, Ran **g in Computing (2023)

  9. No Access

    Article

    A Prior-mask-guided Few-shot Learning for Skin Lesion Segmentation

    The incidence of skin cancer, which has high mortality, is growing rapidly worldwide. Early detection of skin lesions is crucial for timely diagnosis and treatment to improve the patient survival rate. Compute...

    Junsheng **ao, Huahu Xu, Wei Zhao, Chen Cheng, HongHao Gao in Computing (2023)

  10. No Access

    Article

    Trust on wheels: Towards secure and resource efficient IoV networks

    The emerging yet promising paradigm of Internet-of-Vehicles (IoV) has received considerable attention in the recent years as an integral and indispensable constituent of the modern intelligent transportation s...

    Adnan Mahmood, Sarah Ali Siddiqui, Quan Z. Sheng, Wei Emma Zhang in Computing (2022)

  11. No Access

    Article

    Network structure optimization for social networks by minimizing the average path length

    Network structure plays an important role in the natural and social sciences. Optimization of network structure in achieving specified goals has been a major research focus. In this paper, we focus on structur...

    Wei Du, Gang Li, **aochen He in Computing (2022)

  12. No Access

    Chapter and Conference Paper

    Calibrating Histopathology Image Classifiers Using Label Smoothing

    The classification of histopathology images fundamentally differs from traditional image classification tasks because histopathology images naturally exhibit a range of diagnostic features, resulting in a dive...

    Jerry Wei, Lorenzo Torresani, Jason Wei in Artificial Intelligence in Medicine (2022)

  13. No Access

    Chapter and Conference Paper

    RShield: A Refined Shield for Complex Multi-step Attack Detection Based on Temporal Graph Network

    Complex multi-step attacks (i.e., CMA) have caused severe damage to core information infrastructures of many organizations. The graph-based methods are well known as the ability for learning complex interactio...

    Weiyong Yang, Peng Gao, Hao Huang in Database Systems for Advanced Applications (2022)

  14. No Access

    Book and Conference Proceedings

    Collaborative Computing: Networking, Applications and Worksharing

    18th EAI International Conference, CollaborateCom 2022, Hangzhou, China, October 15-16, 2022, Proceedings, Part II

    Honghao Gao, **nheng Wang, Wei Wei in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (2022)

  15. No Access

    Chapter and Conference Paper

    Research on Network Security Situation Assessment Model Based on Double AHP

    Network security situation assessment is an important part of the situational awareness research process and the most important thing. Situation assessment refers to the assessment of the current security stat...

    Wei Wang, Xuqiu Chen, Wei Gan, Yi Yang in Advances in Artificial Intelligence and Se… (2022)

  16. No Access

    Chapter and Conference Paper

    Research on Size System of Disposable PE Gloves Based on Hand Contour Measurement

    Disposable PE gloves are in great demand in the catering industry, and although their use accuracy is not high, disposable PE gloves of inconsistent size will still cause great discomfort to consumers. Therefo...

    **aoju Wang, Zhou Yang, Wei Yu in HCI International 2022 Posters (2022)

  17. No Access

    Chapter and Conference Paper

    Detecting Depression, Anxiety and Mental Stress in One Sequential Model with Multi-task Learning

    Recent studies employing mobile data to detect psychological disorders have made great progress. Mobile devices record user’s behavior data and physical signals continuously. Such data are able to detect sympt...

    Shen Zhang, Mei Tu, Yueru Yan, Yimeng Zhuang in HCI International 2022 – Late Breaking Pap… (2022)

  18. No Access

    Chapter and Conference Paper

    Fast Locomotion of Microrobot Swarms with Ultrasonic Stimuli in Large Scale

    In recent years, the acitve motion of micro-nano machines has received wide attention due to its potential applications in biomedicine, biosensing, pollution control and other fields. However, the rapid manipu...

    Cong Zhao, **aolong Lu, Ying Wei, Huan Ou in Intelligent Robotics and Applications (2022)

  19. No Access

    Chapter and Conference Paper

    Reliability Evaluation of Smart DC Microgrid

    Nowadays, one of the main contributors of air pollution is thermal power plant. China want to develop renewable energy to solve the problem [1]. In many areas, roof photovoltaic (PV) energy systems, wind energy s...

    Kai Zheng, **ang Yao, Wei Wang in Advances in Artificial Intelligence and Security (2022)

  20. No Access

    Chapter and Conference Paper

    Prevention of GAN-Based Privacy Inferring Attacks Towards Federated Learning

    With the increasing amount of data, data privacy has drawn great concern in machine learning among the public. Federated Learning, which is a new kind of distributed learning framework, enables data providers ...

    Hongbo Cao, Yongsheng Zhu, Yuange Ren in Collaborative Computing: Networking, Appli… (2022)

previous disabled Page of 39