Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    A Cellular Automaton Approach for Efficient Computing on Surface Chemical Reaction Networks

    A surface chemical reaction network (sCRN, Qian and Winfree in DNA Computing and Molecular Programming: 20th International Conference, DNA 20, Kyoto, Japan, September 22–26, 2014. Proceedings 20. Springer, 201...

    Sihai Yu, Wenli Xu, Jia Lee, Teijiro Isokawa in New Generation Computing (2024)

  2. No Access

    Article

    Universality of a surface chemical reaction network using only bi-molecular reactions

    In recent years, a novel molecular computation model known as surface chemical reaction network (Qian, In: DNA computing and molecular programming: 20th international conference, DNA 20, Proceedings, 2014) has...

    Sihai Yu, Jia Lee, Teijiro Isokawa in Journal of Membrane Computing (2024)

  3. Article

    Correction to: Multibranch multilevel federated learning for a better feature extraction and a plug-and-play dynamic-adjusting double flow personalization approach

    Maoye Ren, **nhai Yu in Applied Intelligence (2023)

  4. No Access

    Article

    Multibranch multilevel federated learning for a better feature extraction and a plug-and-play dynamic-adjusting double flow personalization approach

    Federated learning (FL) is an emerging technique used to preserve the privacy of users’ data in training by a distributed machine learning approach. Previously, a client-edge-cloud hierarchical federated learn...

    Maoye Ren, **nhai Yu in Applied Intelligence (2023)

  5. No Access

    Chapter and Conference Paper

    Revisiting TENT for Test-Time Adaption Semantic Segmentation and Classification Head Adjustment

    Test-time adaption is very effective at solving the domain shift problem where the training data and testing data are sampled from different domains. However, most test-time adaption methods made their success...

    Xuanpu Zhao, Qi Chu, Changtao Miao, Bin Liu, Nenghai Yu in Image and Graphics (2023)

  6. No Access

    Chapter and Conference Paper

    Semi-supervised Learning with Nearest-Neighbor Label and Consistency Regularization

    Semi-supervised learning, a system dedicated to making networks less dependent on labeled data, has become a popular paradigm due to its strong performance. A common approach is to use pseudo-labels with unlab...

    Guolin Zheng, Zuoyong Li, Wenkai Hu, Haoyi Fan in Machine Learning for Cyber Security (2023)

  7. No Access

    Chapter and Conference Paper

    Enhancing Adversarial Transferability from the Perspective of Input Loss Landscape

    The transferability of adversarial examples enables the black-box attacks and poses a threat to the application of deep neural networks in real-world, which has attracted great attention in recent years. Regar...

    Yinhu Xu, Qi Chu, Haojie Yuan, Zixiang Luo, Bin Liu, Nenghai Yu in Image and Graphics (2023)

  8. No Access

    Chapter and Conference Paper

    Eventually-Consistent Replicated Relations and Updatable Views

    Distributed systems have to live with weak consistency, such as eventual consistency, if high availability is the primary goal and network partitioning is unexceptional. Local-first applications are examples o...

    Joachim Thomassen, Weihai Yu in New Trends in Database and Information Systems (2023)

  9. No Access

    Chapter and Conference Paper

    Neural Watermarking for 3D Morphable Models

    3D morphable models (3DMMs) have been widely used in computer graphics applications. Therefore, digital watermarking for 3DMMs can also become a valuable research direction in the near future. However, previou...

    Feng Wang, Hang Zhou, Weiming Zhang in Advances in Artificial Intelligence and Se… (2022)

  10. No Access

    Chapter and Conference Paper

    Capturing the Lighting Inconsistency for Deepfake Detection

    The rapid development and widely spread of deepfake techniques have raised severe societal concerns. Thus detecting such forgery contents has become a hot research topic. Many deepfake detection methods have b...

    Wenxuan Wu, Wenbo Zhou, Weiming Zhang, Han Fang in Artificial Intelligence and Security (2022)

  11. No Access

    Chapter and Conference Paper

    Bootstrapped Masked Autoencoders for Vision BERT Pretraining

    We propose bootstrapped masked autoencoders (BootMAE), a new approach for vision BERT pretraining. BootMAE improves the original masked autoencoders (MAE) with two core designs: 1) momentum encoder that provid...

    **aoyi Dong, Jianmin Bao, Ting Zhang, Dongdong Chen in Computer Vision – ECCV 2022 (2022)

  12. No Access

    Chapter and Conference Paper

    Noise Simulation-Based Deep Optical Watermarking

    Digital watermarking is an important branch of information hiding, which effectively guarantees the robustness of embedded watermarks in distorted channels. To embed the watermark into the host carrier, tradit...

    Feng Wang, Hang Zhou, Han Fang, Weiming Zhang in Artificial Intelligence and Security (2022)

  13. No Access

    Chapter and Conference Paper

    PTAC: Privacy-Preserving Time and Attribute Factors Combined Cloud Data Access Control with Computation Outsourcing

    Cloud storage service has significant advantages on both cost reduction and convenient data sharing. It frees data owners from technical management. However, it poses new challenges on privacy and security pro...

    Rui Luo, Yuanzhi Yao, Weihai Li, Nenghai Yu in Advances in Artificial Intelligence and Se… (2022)

  14. No Access

    Chapter and Conference Paper

    Supporting Undo and Redo for Replicated Registers in Collaborative Applications

    A collaborative application supporting eventual consistency may temporarily violate global invariant. Users may make mistakes. Undo and redo are a generic tool to restore global invariant and correct mistakes....

    Eric Brattli, Weihai Yu in Cooperative Design, Visualization, and Engineering (2021)

  15. No Access

    Chapter and Conference Paper

    Bone Marrow Cell Segmentation Based on Improved U-Net

    Automatic segmentation of bone marrow cells plays an important role in the diagnosis of many blood diseases such as anemia and leukemia. Due to the complex morphology and wide variety of bone marrow cells, the...

    Lingmin **, Zhaochai Yu, Haoyi Fan, Shenghua Teng, Zuoyong Li in Data Mining and Big Data (2021)

  16. No Access

    Chapter and Conference Paper

    Talking Face Video Generation with Editable Expression

    In rencent years, the convolutional neural network have been proved to be a great success in generating talking face. Existing methods have combined a single face image with speech to generate talking face vid...

    Luchuan Song, Bin Liu, Nenghai Yu in Image and Graphics (2021)

  17. No Access

    Chapter and Conference Paper

    Augmenting SQLite for Local-First Software

    Local-first software aims at both the ability to work offline on local data and the ability to collaborate across multiple devices. CRDTs (conflict-free replicated data types) are abstractions for offline and ...

    Iver Toft Tomter, Weihai Yu in New Trends in Database and Information Systems (2021)

  18. No Access

    Chapter and Conference Paper

    Towards More Powerful Multi-column Convolutional Network for Crowd Counting

    Scale variation has always been one of the most challenging problems for crowd counting. By using multi-column convolutions with different receptive fields to deal with different scales in the scene, the multi...

    Jiabin Zhang, Qi Chu, Weihai Li, Bin Liu, Weiming Zhang, Nenghai Yu in Image and Graphics (2021)

  19. No Access

    Chapter and Conference Paper

    Using GitHub Open Sources and Database Methods Designed to Auto-Generate Chinese Tang Dynasty Poetry

    Writing a Tang-Dynasty poetry in Chinese is very popular and useful in the tradition Chinese culture education field, In this paper we use GitHub open sources “jieba” Algorithm for text segmentation of Chinese...

    Hai Yu, Zi-Xuan Li, Yu-Yan Jiang in Big Data and Security (2020)

  20. No Access

    Chapter and Conference Paper

    Reset Attack: An Attack Against Homomorphic Encryption-Based Privacy-Preserving Deep Learning System

    In some existing privacy-preserving deep learning systems, additively homomorphic encryption enables ciphertext computation across the gradients. Therefore, many learning participants can perform neural networ...

    **aofeng Wu, Yuanzhi Yao, Weihai Li, Nenghai Yu in Artificial Intelligence and Security (2020)

previous disabled Page of 3