Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Image denoising via deep network based on edge enhancement

    Existing methods for image denoising mainly focused on noise and visual artifacts too much but rarely mentioned the loss of edge information. In this paper, we propose a deep denoising network based on the res...

    ** Chen, Shu Zhan, Dong Ji, Liangfeng Xu in Journal of Ambient Intelligence and Humani… (2023)

  2. No Access

    Article

    Multi-information fusion based on dual attention and text embedding network for local citation recommendation

    Local citation recommendation is a list of references that researchers need to cite based on a given context, so it could help researchers produce high-quality academic writing quickly and efficiently. However...

    Shanshan Wang, **aohong Li, ** Yao, Ben You in Advances in Computational Intelligence (2023)

  3. No Access

    Article

    Extreme Learning Machine with Kernels for Solving Elliptic Partial Differential Equations

    Finding solutions for partial differential equations based on machine learning methods is an ongoing challenge in applied mathematics. Although machine learning methods have been successfully applied to solve...

    Shaohong Li, Guoguo Liu, Shiguo **ao in Cognitive Computation (2023)

  4. No Access

    Chapter and Conference Paper

    Candidate-Aware Attention Enhanced Graph Neural Network for News Recommendation

    Facing the daily explosive growth of the news quantity, personalized news recommendation for users becomes an increasingly challenging problem. Modeling user interests is critical for accurate news recommendat...

    **aohong Li, Ruihong Li, Qixuan Peng in Knowledge Science, Engineering and Managem… (2023)

  5. No Access

    Article

    SCC-rFMQ: a multiagent reinforcement learning method in cooperative Markov games with continuous actions

    Although many multiagent reinforcement learning (MARL) methods have been proposed for learning the optimal solutions in continuous-action domains, multiagent cooperation domains with independent learners (ILs)...

    Chengwei Zhang, Zhuobing Han, Bingfu Liu in International Journal of Machine Learning … (2022)

  6. No Access

    Chapter and Conference Paper

    Using Multi-level Attention Based on Concept Embedding Enrichen Short Text to Classification

    Aiming at the defects of short text, which lack context information and weak ability to describe topic, this paper proposes an attention network based solution for enriching topic information of short text, wh...

    Ben You, **aoHong Li, QiXuan Peng, RuiHong Li in Intelligent Information Processing XI (2022)

  7. No Access

    Chapter and Conference Paper

    A CNN-Based HEVC Video Steganalysis Against DCT/DST-Based Steganography

    The development of video steganography has sparked ever-increasing concerns over video steganalysis. In this paper, a novel steganalysis approach against Discrete Cosine/Sine Transform (DCT/DST) based steganog...

    Zhenzhen Zhang, Henan Shi, **nghao Jiang, Zhaohong Li in Digital Forensics and Cyber Crime (2022)

  8. No Access

    Chapter and Conference Paper

    A Local-Global Self-attention Interaction Network for RGB-D Cross-Modal Person Re-identification

    RGB-D cross-modal person re-identification (Re-ID) task aims to match the person images between the RGB and depth modalities. This task is rather challenging for the tremendous discrepancy between these two mo...

    Chuanlei Zhu, **aohong Li, Meibin Qi, Yimin Liu in Pattern Recognition and Computer Vision (2022)

  9. No Access

    Chapter and Conference Paper

    A HEVC Steganalysis Algorithm Based on Relationship of Adjacent Intra Prediction Modes

    Currently, many High Efficiency Video Coding (HEVC) video steganography algorithms based on Intra Prediction Mode (IPM) have been proposed. However, the existing IPM-based steganalysis algorithms designed for ...

    Henan Shi, Tanfeng Sun, Zhaohong Li in Digital Forensics and Watermarking (2022)

  10. No Access

    Article

    Is the simple assignment enough? Exploring the interpretability for community detection

    The maximum likelihood estimation is a probabilistic inferencing model of community connectivity in large networks. In general, only the adjacency matrix is utilized to perform community structure parameter in...

    Qiqi Zhao, Huifang Ma, **aohong Li in International Journal of Machine Learning … (2021)

  11. Article

    Open Access

    3D Printing of Well Dispersed Electrospun PLGA Fiber Toughened Calcium Phosphate Scaffolds for Osteoanagenesis

    Although the toughening of Calcium phosphate (CaP) scaffold by the addition of fiber has been well recognized, integrated mechanical, structural and functional considerations have been neglected in the design ...

    Guoru Zhao, Rongwei Cui, You Chen, Sijie Zhou, Chen Wang in Journal of Bionic Engineering (2020)

  12. Chapter and Conference Paper

    Multi-label Classification of Short Text Based on Similarity Graph and Restart Random Walk Model

    A multi-label classification method of short text based on similarity graph and restart random walk model is proposed. Firstly, the similarity graph is created by using data and labels as the node, and the wei...

    **aohong Li, Fanyi Yang, Yuyin Ma, Huifang Ma in Intelligent Information Processing X (2020)

  13. Chapter and Conference Paper

    Overlap** Community Detection Combining Topological Potential and Trust Value of Nodes

    Aiming at the problems of existing algorithms, such as instability, neglecting interaction between nodes and neglecting attributes of node, an overlap** community discovery algorithm combining topological po...

    **aohong Li, Weiying Kong, Weiyi Wei, Enli Fu in Intelligent Information Processing X (2020)

  14. No Access

    Article

    SA-IGA: a multiagent reinforcement learning method towards socially optimal outcomes

    In multiagent environments, the capability of learning is important for an agent to behave appropriately in face of unknown opponents and dynamic environment. From the system designer’s perspective, it is desi...

    Chengwei Zhang, **aohong Li, Jianye Hao in Autonomous Agents and Multi-Agent Systems (2019)

  15. No Access

    Chapter and Conference Paper

    DCT: Differential Combination Testing of Deep Learning Systems

    Deep learning (DL) systems are increasingly used in security-related fields, where the accuracy and predictability of DL systems are critical. However the DL models are difficult to test and existing DL testin...

    Chunyan Wang, Weimin Ge, **aohong Li in Artificial Neural Networks and Machine Lea… (2019)

  16. No Access

    Chapter and Conference Paper

    Latency-Aware Deployment of IoT Services in a Cloud-Edge Environment

    Efficient scheduling of data elements and computation units can help to reduce the latency of processing big IoT stream data. In many cases, moving computation turns out to be more cost-effective than moving ...

    Shouli Zhang, Chen Liu, Jianwu Wang, Zhongguo Yang, Yanbo Han in Service-Oriented Computing (2019)

  17. No Access

    Chapter and Conference Paper

    Embedding and Predicting Software Security Entity Relationships: A Knowledge Graph Based Approach

    Software security knowledge involves heterogeneous security concepts (e.g., software weaknesses and attack patterns) and security instances (e.g., the vulnerabilities of a particular software product), which c...

    Hongbo **ao, Zhenchang **ng, **aohong Li, Hao Guo in Neural Information Processing (2019)

  18. No Access

    Chapter and Conference Paper

    An Efficient Mutual Authentication Framework with Conditional Privacy Protection in VANET

    Vehicular Ad Hoc Network (VANET) is a special application of traditional Mobile Ad Hoc Network (MANET) in traffic roads, which has attracted extensive attention due to its important role in intelligent traffic...

    Ying Wang, **g Hu, **aohong Li in Collaborative Computing: Networking, Appli… (2019)

  19. No Access

    Chapter and Conference Paper

    Curve-Registration-Based Feature Extraction for Predictive Maintenance of Industrial Equipment

    With the growing adoption of Internet of Things (IoT), predictive maintenance is gaining momentum for ensuring the reliability of industrial equipment. A common practice of predictive maintenance is to conduct...

    Shouli Zhang, **aohong Li, Jianwu Wang in Collaborative Computing: Networking, Appli… (2018)

  20. Chapter and Conference Paper

    Microblog Hot Event Detection Based on Restart Random Walk and Modularity

    Using traditional method to extract semantic relations between words hardly applied to micro-blog, which make finding hot event not sensitive. We propose a new method based on restart random walk and Modulari...

    **aoHong Li, JiHeng Gong, Yuyin Ma, HuiFang Ma in Intelligent Information Processing IX (2018)

previous disabled Page of 2