Skip to main content

and
  1. No Access

    Article

    Integrating curriculum learning with meta-learning for general rhetoric identification

    Rhetoric is abundant and universal across different human languages. In this paper, we propose a novel curriculum learning integrated with meta-learning (CLML) model to address the task of general rhetorical i...

    Dian Wang, Yang Li, Suge Wang, **aoli Li in International Journal of Machine Learning … (2024)

  2. No Access

    Article

    GCN recommendation model based on the fusion of dynamic multiple-view latent interest topics

    Graph neural network-based representation models have shown extraordinary potential in numerous recommender system applications. Previous studies mainly considered high-order connectivity information in a sing...

    Feng Liu, Jian Liao, Jianxing Zheng in International Journal of Machine Learning … (2023)

  3. No Access

    Chapter and Conference Paper

    A Novel Background Subtraction Method Based on ViBe

    In recent years, a large number of background subtraction methods have been proposed. Among these methods, the visual background subtraction method (ViBe) receives much attention due to its high efficiency and...

    Jian Liao, Hanzi Wang, Yan Yan, ** Zheng in Advances in Multimedia Information Process… (2018)

  4. No Access

    Chapter and Conference Paper

    Multiscale Cascaded Scene-Specific Convolutional Neural Networks for Background Subtraction

    Recent years have witnessed the widespread success of convolutional neural networks (CNNs) in computer vision and multimedia. The CNNs based background subtraction methods, which are effective for addressing t...

    Jian Liao, Guanjun Guo, Yan Yan, Hanzi Wang in Advances in Multimedia Information Process… (2018)

  5. No Access

    Chapter and Conference Paper

    Pairing-Based Provable Blind Signature Scheme Without Random Oracles

    Blind signature allows the user to obtain a signature of a message in a way that the signer learns neither the message nor the resulting signature. Recently a lot of signature or encryption schemes are provabl...

    Jian Liao, Yinghao Qi, Peiwei Huang in Computational Intelligence and Security (2005)