Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Bridging Recommendations Across Domains: An Overview of Cross-Domain Recommendation

    As the Internet has become increasingly ubiquitous and information has experienced explosive growth, recommendation systems have evolved to become an indispensable component across various fields. Traditional ...

    **aopeng Gu, Peili **, Lei Yan, **aocheng Hu in Digital Multimedia Communications (2024)

  2. No Access

    Article

    Safeguarding text generation API’s intellectual property through meaning-preserving lexical watermarks

    We aim to protect text generation APIs in this work. Previous LW methods compromised text quality and made watermarks easy to detect through error analysis due to not considering polysemy. To fit this, we prop...

    Shiyu Zhu, Yun Li, **aoye Ouyang, **aocheng Hu in Frontiers of Computer Science (2023)

  3. No Access

    Article

    The enhancement of magnetism and the occurrence of phase transition in Fe doped g-C3N4 nanoribbons

    Two-dimensional graphene-like materials have numerous pores, large surface areas, and other excellent properties. And two-dimensional graphene-like materials have great potential in magnetic and spintronic dev...

    Zhihao Wang, Xue Jiang, Dong Fan, Hengshuai Li in The European Physical Journal B (2023)

  4. No Access

    Article

    Design and optimization of novel transceiver device for one-way single-wire power transfer

    The further development of wireless power transfer technology is hindered by the limiting relationship between transmission distance, transmission efficiency, and size of the coupling mechanism. Thus, a feasib...

    Yang Li, Taocheng Hu, Xueliang Wang, Yujie Zhai, Yao Li in Journal of Power Electronics (2023)

  5. No Access

    Chapter and Conference Paper

    Adsorption Behaviors of Hydrogen on Equal Atomic Ratio TiZrV Film Applied in AB-BNCT by Density Functional Theory Study

    For accelerator-based boron neutron capture therapy (AB-BNCT), the stable operation of the beam in vacuum is very important. Vacuum instability may affect the efficiency and accuracy of cancer treatments. The ...

    Yaocheng Hu, Jie Wang, Yaqiong Su, Qiuyu Sun in Proceedings of the 23rd Pacific Basin Nucl… (2023)

  6. No Access

    Chapter and Conference Paper

    Hydrogen Adsorption Mechanism of Non-equal Atomic Ratio TiZrV NEG Films Surface

    Boron neutron capture therapy (BNCT) is a radiotherapy that destroys cancer cells using heavy ions produced by the nuclear reaction of neutrons with boron in the tumors. With the development of accelerator tec...

    Qiuyu Sun, Jie Wang, Yaqiong Su, Yaocheng Hu in Proceedings of the 23rd Pacific Basin Nucl… (2023)

  7. No Access

    Chapter and Conference Paper

    STL-FNN: An Intelligent Prediction Model of Daily Theft Level

    Theft is a long-standing crime against property, which exists alongside the development of private ownership. If the time pattern of thefts could be found out well, police officers can take preventive measures...

    Shaochong Shi, Peng Chen, Zhaolong Zeng in Proceedings of the 9th International Confe… (2021)

  8. No Access

    Chapter and Conference Paper

    A Gradient Invariant DCT-Based Image Watermarking Scheme for Object Detection

    In this paper, we proposed a novel DCT-based watermarking scheme for grayscale images, which utilizes the connection between discrete cosine transform (DCT) and the Histogram of Oriented Gradient (HOG) feature...

    **aocheng Hu, Bo Zhang, Huibo Li, **g Guo in Communications, Signal Processing, and Sys… (2020)

  9. No Access

    Chapter and Conference Paper

    Pedestrian Detection Based on Deep Neural Network in Video Surveillance

    Pedestrian detection is an essential and challenging problem in machine vision and video surveillance signal processing. To handle the high cost of training-specific discriminative classifier for pedestrian de...

    Bo Zhang, Ke Guo, Yunxiang Yang, **g Guo in Communications, Signal Processing, and Sys… (2020)

  10. No Access

    Chapter and Conference Paper

    Survey of Big Data Application Technology on Multimedia Data of Public Security

    The era of multimedia big data has a profound and extensive impact on the field of public security. The application of multimedia data and big data technology has brought new opportunities to the construction ...

    Huibo Li, Yinan Jiang, Yunxiang Yang in Communications, Signal Processing, and Sys… (2020)

  11. No Access

    Article

    Inclusion Size Effect on Mechanical Properties of Particle Hydrogel Composite

    Particle hydrogel composite (PHC) combines the characteristics of at least two materials and has potential applications in many fields. Different functions require the particle size to range from nanometer to ...

    **aocheng Hu, Shaoxing Qu in Acta Mechanica Solida Sinica (2019)

  12. No Access

    Article

    Building an Optimal Point-Location Structure in \(O( sort (n))\) I/Os

    We revisit the problem of constructing an external memory data structure on a planar subdivision formed by n segments to answer point location queries optimally in

    **aocheng Hu, Cheng Sheng, Yufei Tao in Algorithmica (2019)

  13. No Access

    Article

    Semi-Group Range Sum Revisited: Query-Space Lower Bound Tightened

    Let \(\mathcal {D}\) D ...

    **aocheng Hu, Yufei Tao, Yi Yang, Shuigeng Zhou in Algorithmica (2018)

  14. No Access

    Article

    Stream sampling over windows with worst-case optimality and \(\ell \) -overlap independence

    Sampling provides fundamental support to numerous applications that cannot afford to materialize all the objects arriving at a rapid speed. Existing stream sampling algorithms guarantee small space and query o...

    Yufei Tao, **aocheng Hu, Miao Qiao in The VLDB Journal (2017)

  15. No Access

    Article

    Optimal structural similarity constraint for reversible data hiding

    Until now, most reversible data hiding techniques have been evaluated by peak signal-to-noise ratio(PSNR), which based on mean squared error(MSE). Unfortunately, MSE turns out to be an extremely poor measure w...

    Jiajia Xu, Weiming Zhang, Ruiqi Jiang, **aocheng Hu in Multimedia Tools and Applications (2017)

  16. No Access

    Article

    Improving visual quality of reversible data hiding by twice sorting

    In most literatures on reversible data hiding (RDH), the visual quality of marked images is only assessed by PSNR, and the smoothness-priority-based sorting technique is efficient for improving PSNR. However, ...

    Yang Yang, Weiming Zhang, **aocheng Hu, Nenghai Yu in Multimedia Tools and Applications (2016)

  17. No Access

    Chapter and Conference Paper

    Incremental Max-Margin Learning for Semi-Supervised Multi-Class Problem

    In this paper, proposed an max-margin model for semi-supervised multi-classification learning, where efficient and accuracy need to be considered. Three notable properties are introduced: (1) the model pre...

    Taocheng Hu, **hui Yu in Software Engineering, Artificial Intellige… (2016)

  18. No Access

    Chapter and Conference Paper

    Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

    Recently, a novel reversible data hiding scheme is proposed for contrast enhancement by Wu (IEEE Signal Process Lett 22.1:81–85, 2015). Instead of pursuing the traditional high PSNR value, he designs the message ...

    Ruiqi Jiang, Weiming Zhang, Jiajia Xu in Advanced Multimedia and Ubiquitous Enginee… (2016)

  19. No Access

    Article

    Instance-level worst-case query bounds on R-trees

    Even with its significant impacts on the database area, the R-tree is often criticized by its lack of good worst-case guarantees. For example, in range search (where we want to report all the data points in a que...

    Yufei Tao, Yi Yang, **aocheng Hu, Cheng Sheng, Shuigeng Zhou in The VLDB Journal (2014)

  20. No Access

    Chapter and Conference Paper

    Shortest Unique Queries on Strings

    Let D be a long input string of n characters (from an alphabet of size up to 2 w , where w is the number of bits in a machine word). Given a substring q of D, a shortest unique q...

    **aocheng Hu, Jian Pei, Yufei Tao in String Processing and Information Retrieval (2014)