Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    Sign language translation with hierarchical memorized context in question answering scenarios

    Vision-based sign language translation (SLT) targets to translate sign language videos into understandable natural language sentences. Current SLT methods ignore the utilization of contextual information in sp...

    Liqing Gao, Wei Feng, Peng Shi, Ruize Han, Di Lin in Neural Computing and Applications (2024)

  2. No Access

    Chapter and Conference Paper

    Simulation Calculation of Atomization Dust Removal Process for the Nozzle in the Iron Exchange Zone of the Converter

    The use of appropriate dust suppressants for nozzle atomization dust removal technology is an important method for the treatment of unorganized emissions in the steel industry, which can effectively reduce dus...

    Hongliang Zhang, Baoshan Wang in Environmental Governance, Ecological Remed… (2024)

  3. No Access

    Chapter and Conference Paper

    A Study of RF Fingerprint Feature Dimensionality Expansion for I/Q Signal Data Extraction

    Security research based on RF fingerprints has received extensive attention in recent years. Traditional RF fingerprint identification technology is first based on feature engineering method to extract signal ...

    Han Zhou, Di Liu, MengJuan Wang, Di Lin in Communications, Signal Processing, and Sys… (2024)

  4. No Access

    Chapter and Conference Paper

    Research on Non-reference Text Image Blur Assessment System

    The non-reference image blur assessment (NR-TIBA) system is significant in text image processing. Due to the high cost of subjective evaluation and the unavailability of reference images in the natural environ...

    **n Li, Di Lin, Zixu Tao, Jikang Mo in Communications, Signal Processing, and Sys… (2024)

  5. No Access

    Chapter and Conference Paper

    An RF Fingerprint Data Enhancement Method Based on WGAN

    RF fingerprinting is an emerging technology in the field of IoT security and is widely used in many areas, such as management, wireless device authentication, and interference source determination (Hall et al....

    Bingtao Li, Di Liu, Jun Yang, Han Zhou in Communications, Signal Processing, and Sys… (2024)

  6. No Access

    Chapter and Conference Paper

    RF Fingerprinting Based on Contrastive Learning and Convolutional Neural Networks

    Hardware differences create a unique fingerprint of the radiation source and are attached to the radio signal, and this unique property of the radiation source can be used for RF fingerprinting. The RF fingerp...

    Jun Yang, Di Liu, Bingtao Li, Han Zhou in Communications, Signal Processing, and Sys… (2024)

  7. No Access

    Chapter and Conference Paper

    Research on IR-RGB Image Fusion Method Based on Target Perception and Hue Correction

    In this paper, a hue-corrected IR-RGB fusion method is proposed based on object perception. We use the salient object detection network to detect the original IR image to obtain the salient regions in the imag...

    Qianjun Jiang, Di Lin, Zongbo Hao, He Chang in Communications, Signal Processing, and Sys… (2024)

  8. No Access

    Article

    Few-shot RF fingerprinting recognition for secure satellite remote sensing and image processing

    Di Lin, Su Hu, Weiwei Wu, Gang Wu in Science China Information Sciences (2023)

  9. No Access

    Article

    Spatial refinement based method for small-sized target detection

    To detect small-sized targets in long-distance images, we propose a spatial refinement-based method by fusing features of small-sized targets. Specifically, we add a spatial refinement module (SRM) into the st...

    Wei Yu, Yang Guo, Di Lin, He Chang in Wireless Networks (2023)

  10. No Access

    Chapter and Conference Paper

    A RF Fingerprint Clustering Method Based on Automatic Feature Extractor

    RF fingerprint technology has received extensive attention and research in recent years due to its immutable nature. RF fingerprinting technology can be used as a wireless network security mechanism alone or c...

    Pinhong **ao, Di Lin, Mengjuan Wang in Machine Learning and Intelligent Communication (2023)

  11. No Access

    Chapter and Conference Paper

    A Weakly Supervised Text Classification Method Based on Vocabulary Construction

    Text classification is an important research direction in natural language processing. The computer can automatically classify and label texts according to certain classification standards through text classif...

    Peidong Li, Di Lin, Zijian Li in Machine Learning and Intelligent Communication (2023)

  12. No Access

    Chapter and Conference Paper

    Across Online Social Network User Identification Based on Usernames

    Cross social network user identification aims to identify the same entity on various online social networks to enhance the completeness and accuracy of the persona. There are three broad categories of cross-so...

    Zijian Li, Di Lin, Peidong Li in Machine Learning and Intelligent Communication (2023)

  13. Article

    Open Access

    Growth, physiological, and temperature characteristics in chinese cabbage pakchoi as affected by Cd- stressed conditions and identifying its main controlling factors using PLS model

    Although hormesis induced by heavy metals is a well-known phenomenon, the involved biological mechanisms are not fully understood. Cadmium (Cd) is a prevalent heavy metal in the environment. Exposure of Cd, vi...

    Lantao Li, Binglin Guo, Chenchen Feng, Haitao Liu, Di Lin in BMC Plant Biology (2022)

  14. Article

    Open Access

    High-Efficient Spin Injection in GaN at Room Temperature Through A Van der Waals Tunnelling Barrier

    Achieving high-efficient spin injection in semiconductors is critical for develo** spintronic devices. Although a tunnel spin injector is typically used, the construction of a high-quality tunnel barrier rem...

    Di Lin, Wenyu Kang, Qipeng Wu, Anke Song, Xuefeng Wu in Nanoscale Research Letters (2022)

  15. No Access

    Article

    Reliable resource allocation with RF fingerprinting authentication in secure IoT networks

    The unprecedented growth of the Internet of Things (IoT) has led to a huge amount of wireless resource consumption in a network. Due to limited wireless resources, a network can only guarantee the quality of s...

    Weiwei Wu, Su Hu, Di Lin, Gang Wu in Science China Information Sciences (2022)

  16. No Access

    Article

    Exogenous ascorbic acid application alleviates cadmium toxicity in seedlings of two wheat (Triticum aestivum L.) varieties by reducing cadmium uptake and enhancing antioxidative capacity

    The aggravation of soil cadmium (Cd) pollution is a serious threat to human food health and safety. To reduce Cd uptake and alleviate Cd toxicity in staple food of wheat, a completely random experiment was per...

    Zhen Zhou, Chang Wei, Haitao Liu in Environmental Science and Pollution Resear… (2022)

  17. No Access

    Chapter and Conference Paper

    LSTM-Based MACD Strategy Parameter Restructuring

    Moving average convergence divergence (MACD) strategy has been applied in much research in financial area. Studies has demonstrated the excellent performance of the MACD strategy in quantitative investment. Ho...

    Huan Deng, Jiali Liu, Yu Tang, Di Lin, Bo Chen in 6GN for Future Wireless Networks (2022)

  18. No Access

    Chapter and Conference Paper

    Using Generative Adversarial Networks for Network Intrusion Detection

    The network intrusion detection system is an essential guarantee for network security. Most research on network intrusion detection systems focuses on using supervised learning algorithms, which require a larg...

    XuDong Li, Di Lin, Yu Tang, Weiwei Wu, Zijian Li in 6GN for Future Wireless Networks (2022)

  19. No Access

    Chapter and Conference Paper

    A Survey of Few-Shot Learning for Radio Frequency Fingerprint Identification

    With the development of the Internet of Things technology, the radio frequency (RF) fingerprint identification technology of wireless communication equipment has also risen, providing new ideas for network sec...

    Hao Li, Yu Tang, Di Lin, Yuan Gao, Jiang Cao in Artificial Intelligence for Communications… (2021)

  20. No Access

    Chapter and Conference Paper

    Reciprocal Learning for Semi-supervised Segmentation

    Semi-supervised learning has been recently employed to solve problems from medical image segmentation due to challenges in acquiring sufficient manual annotations, which is an important prerequisite for buildi...

    **angyun Zeng, Rian Huang, Yuming Zhong in Medical Image Computing and Computer Assis… (2021)

previous disabled Page of 3