Skip to main content

previous disabled Page of 36
and
  1. No Access

    Article

    HyperTuner: a cross-layer multi-objective hyperparameter auto-tuning framework for data analytic services

    Hyperparameters optimization (HPO) is vital for machine learning models. Besides model accuracy, other tuning intentions such as model training time and energy consumption are also worthy of attention from dat...

    Hui Dou, Shanshan Zhu, Yiwen Zhang, Pengfei Chen in The Journal of Supercomputing (2024)

  2. No Access

    Article

    Saliency guided progressive fusion of infrared and polarization for military images with complex backgrounds \(^{\star }\)

    Thermal targets stand out on infrared light images but infrared imaging is vulnerable to thermal noise, thus the edges of targets in infrared images are often blurred. On the other hand, visible polarized imag...

    Yukai Lao, Huan Zhang, Xu Zhang, Jiazhen Dou in Multimedia Tools and Applications (2024)

  3. No Access

    Article

    ADLNet: an adaptive network for arrhythmia classification based on deformable convolution and LSTM

    Detecting arrhythmia through electrocardiogram (ECG) signals is a challenging task, and some methods based on deep neural networks have been proposed to assist in the diagnosis of arrhythmia. However, the perf...

    **nwu Yang, Hongxiao Yang, Mengfei Dou in Signal, Image and Video Processing (2024)

  4. No Access

    Article

    XRL-SHAP-Cache: an explainable reinforcement learning approach for intelligent edge service caching in content delivery networks

    Content delivery networks (CDNs) play a pivotal role in the modern internet infrastructure by enabling efficient content delivery across diverse geographical regions. As an essential component of CDNs, the edg...

    **aolong Xu, Fan Wu, Muhammad Bilal, **aoyu **a in Science China Information Sciences (2024)

  5. No Access

    Article

    Modified correlated total variation regularization for low-rank matrix recovery

    Image data often suffer from evident degradation like corruptions and missing values due to the defects of image acquisition equipment. Low-Rank Matrix Recovery (LRMR) is an effective technique to address this...

    **nling Liu, Yi Dou, Jianjun Wang in Signal, Image and Video Processing (2024)

  6. No Access

    Article

    Categorization of ECG signals based on the dense recurrent network

    Electrocardiograph (ECG) signals are an important source of data on human heart health and are widely used to detect different types of arrhythmias. With the development of deep learning, end-to-end ECG classi...

    **nwu Yang, Aoxiang Zhang, Congrui Zhao in Signal, Image and Video Processing (2024)

  7. No Access

    Article

    An adversarial pedestrian detection model based on virtual fisheye image training

    Fisheye camera is an important sensor in on-board systems and surveillance systems. However, the current fisheye image pedestrian detection still exists problems such as large distortions are difficult to dete...

    **dong Zhang, Jian Dou in Signal, Image and Video Processing (2024)

  8. No Access

    Article

    Position-category-aware attention network for next-item recommendation

    The next-item recommendation can extract critical information from the historical sequence and predict the next actions of users. To better extract users’ interests, some sequential recommender methods propose...

    Liqing Qiu, Mingjian Dou, Caixia **g, Yuying Liu in Knowledge and Information Systems (2024)

  9. No Access

    Article

    How to personalize and whether to personalize? Candidate documents decide

    Personalized search plays an important role in satisfying users’ information needs owing to its ability to build user profiles based on users’ search histories. Most of the existing personalized methods built ...

    Wenhan Liu, Yujia Zhou, Yutao Zhu, Zhicheng Dou in Knowledge and Information Systems (2024)

  10. No Access

    Article

    Re-ID-leak: Membership Inference Attacks Against Person Re-identification

    Person re-identification (Re-ID) has rapidly advanced due to its widespread real-world applications. It poses a significant risk of exposing private data from its training dataset. This paper aims to quantify ...

    Junyao Gao, **nyang Jiang, Shuguang Dou in International Journal of Computer Vision (2024)

  11. No Access

    Article

    Adaptive Discriminative Regularization for Visual Classification

    How to improve discriminative feature learning is central in classification. Existing works address this problem by explicitly increasing inter-class separability and intra-class compactness by constructing po...

    Qingsong Zhao, Yi Wang, Shuguang Dou, Chen Gong in International Journal of Computer Vision (2024)

  12. No Access

    Article

    Balanced complement loss for long-tailed image classification

    Long-tailed image classification is a significant research direction in the computer vision community, since many real-world image datasets exhibit an obvious long-tailed distribution. For a long-tailed datase...

    Luyu Hu, Zhao Yang, Yamei Dou, Jiahao Li in Multimedia Tools and Applications (2024)

  13. No Access

    Article

    Enhancing trust and privacy in distributed networks: a comprehensive survey on blockchain-based federated learning

    While centralized servers pose a risk of being a single point of failure, decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities. Mer...

    Ji Liu, Chunlu Chen, Yu Li, Lin Sun, Yulun Song in Knowledge and Information Systems (2024)

  14. Article

    Open Access

    Cross-chain asset trading scheme for notaries based on edge cloud storage

    Blockchain has penetrated in various fields, such as finance, healthcare, supply chain, and intelligent transportation, but the value exchange between different blockchains limits their expansion. Cross-chain ...

    Lang Chen, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou in Journal of Cloud Computing (2024)

  15. No Access

    Article

    Robust conjugate ambiguity functions and application for strictly noncircular signals in correlated impulsive noise

    The assumption of independent and identically distributed noise is often used in basic research, but the correlation between two additive noises cannot be ignored. Based on the characteristic of noncircular si...

    Yuzi Dou, Omer M. Abdelrhman, Yabo Ding, Sen Li in Signal, Image and Video Processing (2024)

  16. Article

    Open Access

    Accurate and fast congestion feedback in MEC-enabled RDMA datacenters

    Mobile edge computing (MEC) is a novel computing paradigm that pushes computation and storage resources to the edge of the network. The interconnection of edge servers forms small-scale data centers, enabling ...

    **n He, Feifan Liang, Weibei Fan, Junchang Wang, Lei Han in Journal of Cloud Computing (2024)

  17. Article

    Open Access

    Edge intelligence empowered delivery route planning for handling changes in uncertain supply chain environment

    Traditional delivery route planning faces challenges in reducing logistics costs and improving customer satisfaction with growing customer demand and complex road traffic, especially in uncertain supply chain ...

    Gaoxian Peng, Yi** Wen, Wanchun Dou, Tiancai Li in Journal of Cloud Computing (2024)

  18. No Access

    Article

    Adaptive fitness enhancement model: Improving exercise feedback and outcomes through tailored independent physical education plan

    Intelligent technologies have great potential for advancing physical education (PE), thus finding an appropriate independent PE plan (IPEP) is a key step in improving undergraduates’ physical fitness (PF) leve...

    Xu Li, Wee Hoe Tan, Zhidu Li, Dan Dou, Qing Zhou in Education and Information Technologies (2024)

  19. No Access

    Article

    DA-ResNet: dual-stream ResNet with attention mechanism for classroom video summary

    It is important to generate both diverse and representative video summary for massive videos. In this paper, a convolution neural network based on dual-stream attention mechanism(DA-ResNet) is designed to obta...

    Yuxiang Wu, **aoyan Wang, Tianpan Chen, Yan Dou in Pattern Analysis and Applications (2024)

  20. No Access

    Article

    Optimization of the parallel semi-Lagrangian scheme to overlap computation with communication based on grou** levels in YHGSM

    In the semi-Lagrangian interpolation scheme of Yin-he Global Spectral model (YHGSM), communication needs to be performed before interpolation, resulting in significant communication overhead. To solve this pro...

    Dazheng Liu, Wenjuan Liu, Liangrui Pan in CCF Transactions on High Performance Compu… (2024)

previous disabled Page of 36