Skip to main content

and
  1. No Access

    Article

    Scalable multi-view clustering with graph filtering

    With the explosive growth of multi-source data, multi-view clustering has attracted great attention in recent years. Most existing multi-view methods operate in raw feature space and heavily depend on the qual...

    Liang Liu, Peng Chen, Guangchun Luo, Zhao Kang in Neural Computing and Applications (2022)

  2. No Access

    Article

    Learning Chinese word representation better by cascade morphological n-gram

    Word embedding refers to map** words or phrases to vectors of real numbers. This is the precondition of text classification, sentiment analysis and text mining in natural language processing using deep neura...

    Zongyang **ong, Ke Qin, Haobo Yang, Guangchun Luo in Neural Computing and Applications (2021)

  3. No Access

    Article

    Learning evolving user’s behaviors on location-based social networks

    With the popularity of smart phones, users’ activities on location-based social networks (LBSNs) evolve faster than traditional social networks. Existing models focus on modeling users’ long-term preferences, ...

    Ruizhi Wu, Guangchun Luo, Qi **, Junming Shao, Chang-Tien Lu in GeoInformatica (2020)

  4. No Access

    Article

    Application of hyperspectral image anomaly detection algorithm for Internet of things

    Hyperspectral image(HSI) anomaly detection, as one of the hottest topics in current remote sensing information processing and image processing,has important theoretical value and has been widely used in milita...

    **njian Wang, Guangchun Luo, Ling Tian in Multimedia Tools and Applications (2019)

  5. No Access

    Chapter and Conference Paper

    Anomaly Detection via Trajectory Representation

    Trajectory anomaly detection is a vital task in real scene, such as road surveillance and marine emergency survival system. Existing trajectory anomaly detection methods focus on exploring the density, shapes ...

    Ruizhi Wu, Guangchun Luo, Qing Cai in Advanced Multimedia and Ubiquitous Enginee… (2019)

  6. No Access

    Chapter and Conference Paper

    Behavior of Social Network Users to Privacy Leakage: An Agent-Based Approach

    As the rapid development of online social networks, the service providers collect a tremendous amount of personal data. They have the potential motivation to sell the users’ data for extra profits. To figure o...

    Kaiyang Li, Guangchun Luo, Huaigu Wu in Advanced Multimedia and Ubiquitous Enginee… (2019)

  7. No Access

    Article

    Common and distinct changes of default mode and salience network in schizophrenia and major depression

    Brain imaging reveals schizophrenia as a disorder of macroscopic brain networks. In particular, default mode and salience network (DMN, SN) show highly consistent alterations in both interacting brain activity...

    Junming Shao, Chun Meng, Masoud Tahmasian, Felix Brandl in Brain Imaging and Behavior (2018)

  8. No Access

    Article

    A parallel image encryption algorithm based on chaotic Duffing oscillators

    Image encryption has been a popular research field in recent decades. This paper presents a novel parallel image encryption algorithm, which is based on the chaotic duffing oscillators. Image encryption system...

    Chunhu Li, Guangchun Luo, Chunbao Li in Multimedia Tools and Applications (2018)

  9. Article

    Open Access

    RTGOR: Reliability and Timeliness Guaranteed Opportunistic Routing in wireless sensor networks

    Cyber-physical systems (CPSs) connect physical equipment and the information system to realize real-time perception and intelligent control of the equipment. With the rapid development of wireless sensors, wir...

    Aiguo Chen, Xuemei Li, Xueting Ni in EURASIP Journal on Wireless Communications… (2018)

  10. Article

    Open Access

    Hybrid connectivity restoration in wireless sensor and actor networks

    Wireless sensor and actor networks are becoming more and more popular in the recent years. Each WSAN consists of numerous sensors and a few actors working collaboratively to carry out specific tasks. Unfortuna...

    Ke Yan, Guangchun Luo, Ling Tian, Qi Jia in EURASIP Journal on Wireless Communications… (2017)

  11. Article

    Open Access

    An algorithm based on logistic regression with data fusion in wireless sensor networks

    A decision fusion rule using the total number of detections reported by the local sensors for hypothesis testing and the total number of detections that report “1” to the fusion center (FC) is studied for a wi...

    Longgeng Liu, Guangchun Luo, Ke Qin in EURASIP Journal on Wireless Communications… (2017)

  12. No Access

    Article

    An image encryption scheme based on chaotic tent map

    Image encryption has been an attractive research field in recent years. The chaos-based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. This p...

    Chunhu Li, Guangchun Luo, Ke Qin, Chunbao Li in Nonlinear Dynamics (2017)

  13. No Access

    Chapter and Conference Paper

    A Hybrid PSO and SVM Algorithm for Content Based Image Retrieval

    In order to improve the speed and accuracy of image retrieval, This paper presents a hybrid optimization algorithm which originates from Particle Swarm Optimization (PSO) and SVM (Support Vector Machine). Firs...

    **njian Wang, Guangchun Luo, Ke Qin in Computational Science and Its Applications… (2016)

  14. No Access

    Article

    Adaptive Spraying for Routing in Delay Tolerant Networks

    Message delivery in Delay Tolerant Networks (DTNs) is challenging due to the fact that the network is intermittently connected. Mobility can be exploited to improve DTN performance. In this paper, we propose a...

    Junbao Zhang, Guangchun Luo in Wireless Personal Communications (2012)