Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    Adaptive multi-object tracking algorithm based on split trajectory

    Multi-object tracking (MOT) has wide-ranging applications in unmanned vehicles, military reconnaissance, and video surveillance. However, real-world scenes present significant challenges to the tracking proces...

    Lifan Sun, Bingyu Li, Dan Gao, Bo Fan in The Journal of Supercomputing (2024)

  2. No Access

    Article

    Exert Diversity and Mitigate Bias: Domain Generalizable Person Re-identification with a Comprehensive Benchmark

    Person re-identification (ReID), aiming at retrieving persons of the same identity across non-overlap** cameras, holds immense practical significance for security and surveillance applications. In pursuit of...

    Bingyu Hu, Jiawei Liu, Yufei Zheng in International Journal of Computer Vision (2024)

  3. Article

    Open Access

    Mental imagery scaffolding: The effects of detail richness and text load on geography learning

    The growing importance of 3D animations in current teaching approaches becomes increasingly apparent, offering an effective way to visualize complex spatial concepts and processes in geography learning through...

    Yun Zhou, Fanqi Yi, Bingyu Dong, Guangli Zhang in Education and Information Technologies (2024)

  4. No Access

    Chapter and Conference Paper

    Fill the K-Space and Refine the Image: Prompting for Dynamic and Multi-Contrast MRI Reconstruction

    The key to dynamic or multi-contrast magnetic resonance imaging (MRI) reconstruction lies in exploring inter-frame or inter-contrast information. Currently, the unrolled model, an approach combining iterative ...

    Bingyu **n, Meng Ye, Leon Axel in Statistical Atlases and Computational Mode… (2024)

  5. No Access

    Chapter and Conference Paper

    IKE: Threshold Key Escrow Service with Intermediary Encryption

    Blockchain has gained significant attention for its potential to revolutionize various fields. The security of the blockchain system heavily relies on private key management, and traditional key management sch...

    Yang Yang, Bingyu Li, Shihong **ong, Bo Qin in Algorithms and Architectures for Parallel … (2024)

  6. No Access

    Chapter and Conference Paper

    A Moderated Mediation Analysis of Meaningfulness and Positive Intergroup Outcomes Through Prosocial Gameplay

    This study examines how the meaningfulness of a story influences empathy and attitudes towards racial or ethnic outgroups through a prosocial video game that features meaningful dialogic encounters with a fict...

    Valerie Yu, Gabrielle C. Ibasco, Bingyu Chen in Simulation and Gaming for Social Impact (2023)

  7. No Access

    Chapter and Conference Paper

    Cross-Camera Prototype Learning for Intra-camera Supervised Person Re-identification

    Person Re-Identification (ReID) aims at retrieving images of the specific pedestrian across disjoint cameras. However, the annotations are extremely costly as the number of cameras increases, which derives a n...

    Bingyu Duan, Wanqian Zhang, Dayan Wu in Artificial Neural Networks and Machine Lea… (2023)

  8. No Access

    Article

    Small-signal stability and robustness analysis for microgrids under time-constrained DoS attacks and a mitigation adaptive secondary control method

    With the close integration of cyber and power systems, the consensus-based secondary frequency control in a microgrid is increasingly vulnerable to communication failures such as transmission delays and denial...

    Qiuye Sun, Bingyu Wang, **aomeng Feng, Shiyan Hu in Science China Information Sciences (2022)

  9. No Access

    Chapter and Conference Paper

    Continuous Weighted Neural Cognitive Diagnosis Method for Online Education

    With the rapid development of online education, extensive data records from online education are accumulated in large quantities, therefore the educational evaluation industry is of great potential. Cognitive ...

    Shunfeng Wang, Peng Fu, Muhui Fu, Bingke Li in Advances in Artificial Intelligence and Se… (2022)

  10. No Access

    Chapter and Conference Paper

    Tracking Multi-objects with Anchor-Free Siamese Network

    Single object tracker based on siamese neural network have become one of the most popular frameworks in this field for its strong discrimination ability and high efficiency. However, when the task switch to mu...

    Bingyu Hui, Jie Feng, Quanhe Yao, **g Gu, Licheng Jiao in Intelligence Science IV (2022)

  11. No Access

    Chapter and Conference Paper

    PEPEC: Precomputed ECC Points Embedded in Certificates and Verified by CT Log Servers

    Elliptic curve cryptography (ECC) is respected in public key infrastructures (PKIs) due to its high performance and small key size. However, for some client devices with limited computing resources, signature ...

    Guangshen Cheng, Jiankuo Dong, **nyi Ji in Applied Cryptography and Network Security … (2022)

  12. No Access

    Chapter and Conference Paper

    X-FTPC: A Fine-Grained Trust Propagation Control Scheme for Cross-Certification Utilizing Certificate Transparency

    Cross-certification plays a fundamental role in facilitating the interconnection between different root stores in public key infrastructure (PKI). However, the existing trust management schemes (e.g., certificate...

    Shushang Wen, Bingyu Li, Ziqiang Ma in Applied Cryptography in Computer and Commu… (2022)

  13. Article

    Open Access

    Privacy preserving divisible double auction with a hybridized TEE-blockchain system

    Double auction mechanisms have been designed to trade a variety of divisible resources (e.g., electricity, mobile data, and cloud resources) among distributed agents. In such divisible double auction, all the ...

    Bingyu Liu, Shangyu **e, Yuanzhou Yang, Rujia Wang, Yuan Hong in Cybersecurity (2021)

  14. No Access

    Article

    Deep representation-based packetized predictive compensation for networked nonlinear systems

    The design of networked nonlinear control system is a very challenging problem due to the coupling of the system uncertainties (e.g., model accuracy, noise, nonlinearity) and network effects (e.g., packet drop...

    Shaofeng Chen, Yang Cao, Yu Kang, Bingyu Sun in Neural Computing and Applications (2021)

  15. No Access

    Chapter and Conference Paper

    Multi Beam Forming Algorithms of LEO Constellation Satellite

    Since the 21st century, the development of mobile Internet and Internet of things technology has introduced new development opportunities for the field of communication satellites. A large number of researcher...

    Bingyu **e, Mingchuan Yang in Machine Learning and Intelligent Communications (2021)

  16. No Access

    Chapter and Conference Paper

    Massive Flights Real-Time Rerouting Planning Based on Parallel Discrete Potential Field Method

    Severe weather is an important reason that threatens the safety of air transportation. As the flights grow, path planning for massive aircraft is becoming an important problem for rerouting. This paper propose...

    Yang Ding, Zelin Li, Bingyu Li, Ruheng **e in Artificial Intelligence in China (2021)

  17. No Access

    Chapter and Conference Paper

    PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitor

    Certificate Transparency (CT) is proposed to detect maliciously or mistakenly issued certificates by recording all certificates in publicly-visible logs. CT assumes that any individual can undertake the role o...

    Aozhuo Sun, Bingyu Li, Huiqing Wan in Applied Cryptography and Network Security … (2021)

  18. No Access

    Chapter and Conference Paper

    Efficient and Private Divisible Double Auction in Trusted Execution Environment

    Auction mechanisms for exchanging divisible resources (e.g., electricity, cloud resources, and network bandwidth) among distributed agents have been extensively studied. In particular, divisible double auction...

    Bingyu Liu, Shangyu **e, Yuan Hong in Applied Cryptography in Computer and Communications (2021)

  19. No Access

    Article

    Fine-grained management of I/O optimizations based on workload characteristics

    With the advent of new computing paradigms, parallel file systems serve not only traditional scientific computing applications but also non-scientific computing applications, such as financial computing, busin...

    Bing Wei, Limin **ao, Bingyu Zhou, Guangjun Qin in Frontiers of Computer Science (2020)

  20. No Access

    Chapter and Conference Paper

    Elaphurus: Ensemble Defense Against Fraudulent Certificates in TLS

    Recent security incidents indicate that certificate authorities (CAs) might be compromised to sign certificates with fraudulent information. The fraudulent certificates are exploited to launch successful TLS m...

    Bingyu Li, Wei Wang, Lingjia Meng, **gqiang Lin in Information Security and Cryptology (2020)

previous disabled Page of 3