Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Deep Reinforcement Learning-Based LSTM Model for Traffic Flow Forecasting in Internet of Vehicles

    Nowadays many large cities often suffer from road congestion. Then, it is necessary to improve the working efficiency of urban road network with the help of computational intelligence technologies, within the ...

    Zekuan Chen, **ong Luo, Ting Wang in Proceedings of 2021 Chinese Intelligent Au… (2022)

  2. No Access

    Chapter

    Indoor Localization and Human Activity Tracking with Multiple Kinect Sensors

    In , a system that provides continuous localization and behavioral analysis of a person’s motion pattern over an indoor living space using multiple Kinect sensors. The skeleton data from all sensors is tran...

    Shunkun Yang, Akshat Hans, Wenbing Zhao, **ong Luo in Smart Assisted Living (2020)

  3. No Access

    Article

    A robust multilayer extreme learning machine using kernel risk-sensitive loss criterion

    More recently, extreme learning machine (ELM) has emerged as a novel computing paradigm that enables the neural network (NN) based learning to be achieved with fast training speed and good generalization perfo...

    **ong Luo, Ying Li, Wei** Wang in International Journal of Machine Learning … (2020)

  4. No Access

    Chapter and Conference Paper

    Semi-automated Development of a Dataset for Baseball Pitch Type Recognition

    In this paper, we report our work on develo** a new dataset for baseball pitch type recognition based on youtube videos of the US Major League Baseball games. The core innovation is a largely automated proce...

    Dylan Siegler, Reed Chen, Michael Fasko Jr. in Cyberspace Data and Intelligence, and Cybe… (2019)

  5. No Access

    Chapter and Conference Paper

    A Malware Identification and Detection Method Using Mixture Correntropy-Based Deep Neural Network

    With the rapid development of CPS technology, the identification and detection of malware has become a matter of concern in the industrial application of CPS. Currently, advanced machine learning methods such...

    **ong Luo, Jianyuan Li, Wei** Wang in Cyberspace Data and Intelligence, and Cybe… (2019)

  6. No Access

    Chapter and Conference Paper

    Baseball Pitch Type Recognition Based on Broadcast Videos

    In this paper, we report our work on baseball pitch type recognition based on broadcast videos using two-stream inflated 3D convolutional neural network (I3D). To improve the state-of-the-art of research, we d...

    Reed Chen, Dylan Siegler, Michael Fasko Jr. in Cyberspace Data and Intelligence, and Cybe… (2019)

  7. Article

    Correction to: Dependability enhancing mechanisms for integrated clinical environments

    The Acknowledgements published in the original article contain errors. The correct version is given below.

    Wenbing Zhao, Mary Q. Yang in The Journal of Supercomputing (2018)

  8. No Access

    Book and Conference Proceedings

  9. No Access

    Chapter and Conference Paper

    Human Action Recognition with Skeleton Data Using Extreme Learning Machine

    Skeleton-based human action recognition has recently drawn many researchers’ attention with the prevalence of Microsoft Kinect sensors. In this paper, a method of action recognition using the skeletal features...

    Ying Li, **ong Luo, Wei** Wang in Proceedings of 2017 Chinese Intelligent Au… (2018)

  10. Article

    Open Access

    Dependability enhancing mechanisms for integrated clinical environments

    In this article, we present a set of lightweight mechanisms to enhance the dependability of a safety-critical real-time distributed system referred to as an integrated clinical environment (ICE). In an ICE, me...

    Wenbing Zhao, Mary Q. Yang in The Journal of Supercomputing (2017)

  11. No Access

    Article

    High-throughput state-machine replication using software transactional memory

    State-machine replication is a common way of constructing general purpose fault tolerance systems. To ensure replica consistency, requests must be executed sequentially according to some total order at all non...

    Wenbing Zhao, William Yang, Honglei Zhang, Jack Yang in The Journal of Supercomputing (2016)

  12. No Access

    Article

    A concise tutorial on human motion tracking and recognition with Microsoft Kinect

    This paper provides a concise tutorial on the Microsoft Kinect technology and the state of art research on human motion tracking and recognition with Microsoft Kinect. A pre-requisite for human motion recognit...

    Wenbing Zhao in Science China Information Sciences (2016)

  13. No Access

    Article

    A laguerre neural network-based ADP learning scheme with its application to tracking control in the Internet of Things

    Sensory data have becoming widely available in large volume and variety due to the increasing presence and adoption of the Internet of Things. Such data can be tremendously useful if they are processed properl...

    **ong Luo, Yixuan Lv, Mi Zhou, Wei** Wang in Personal and Ubiquitous Computing (2016)

  14. No Access

    Chapter and Conference Paper

    Multi-goal Motion Planning of an Autonomous Robot in Unknown Environments by an Ant Colony Optimization Approach

    An ant colony optimization (ACO) approach is proposed in this paper for real-time concurrent map building and navigation for multiple goals purpose. In real world applications such as rescue robots, and service r...

    Chaomin Luo, Hongwei Mo, Furao Shen, Wenbing Zhao in Advances in Swarm Intelligence (2016)

  15. Article

    Open Access

    A Dynamic Verification Model based on Information Flow Constraint

    After analyzing the common attacks for some software systems, a dynamic software behavior verification model related with the unchecked input data based on software analysis and dynamic slicing technology is p...

    Dan Wang, Yan Lu, Lihua Fu, Wenbing Zhao in International Journal of Computational Int… (2013)

  16. No Access

    Chapter and Conference Paper

    Interaction Patterns for Byzantine Fault Tolerance Computing

    In this paper, we present a catalog of application interaction patterns with the corresponding message ordering and execution rules for Byzantine fault tolerance computing. For each pattern, a set of rules are...

    Hua Chai, Wenbing Zhao in Computer Applications for Web, Human Compu… (2012)

  17. No Access

    Chapter and Conference Paper

    Byzantine Fault Tolerance as a Service

    In this paper, we argue for the need and benefits for providing Byzantine fault tolerance as a service to mission critical Web applications. In this new approach to Byzantine fault tolerance, an application se...

    Hua Chai, Wenbing Zhao in Computer Applications for Web, Human Compu… (2012)

  18. Chapter and Conference Paper

    Behavior Analysis-Based Dynamic Trust Measurement Model

    The trust of an entity is based on its behavior’s trust in trusted computing technology, and software’s trust can be measured dynamically by its behavior when it is executing. However, conducting dynamic measu...

    Dan Wang, **aodong Zhou, Wenbing Zhao in Information and Communications Security (2011)

  19. Chapter and Conference Paper

    Byzantine Fault Tolerant Coordination for Web Services Atomic Transactions

    In this paper, we present the mechanisms needed for Byzantine fault tolerant coordination of Web services atomic transactions. The mechanisms have been incorporated into an open-source framework implementing t...

    Wenbing Zhao in Service-Oriented Computing – ICSOC 2007 (2007)

  20. No Access

    Chapter and Conference Paper

    Normalizing XML Element Trees as Well-Designed Document Structures for Data Integration

    Normalizing the design of XML Schemas is important in the data integration with predefined integrated content. As the essential of XML schemas, XML element tree are introduced to represent all the possible dat...

    Wenbing Zhao, Shaohua Tan, Dongqing Yang in Advances in Web-Age Information Management (2003)