Skip to main content

previous disabled Page of 4
and
  1. No Access

    Chapter and Conference Paper

    Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem)

    Secret sharing schemes are used as a tool in many cryptographic protocols including revocable electronic cash, electronic voting, cloud computing and key management in sensor networks. But the existing post-qu...

    Songshou Dong, Yanqing Yao, Yihua Zhou, Yuguang Yang in Digital Forensics and Cyber Crime (2024)

  2. No Access

    Chapter and Conference Paper

    Improvement of an Identity-Based Aggregate Signature Protocol from Lattice

    In 2022, Li et al. [1] proposed a quantum secure and non-interactive identity-based aggregate signature protocol from lattices. In the end of their paper, they claimed that their scheme has key escrow problem. Ba...

    Songshou Dong, Yanqing Yao, Yihua Zhou, Yuguang Yang in Digital Forensics and Cyber Crime (2024)

  3. No Access

    Chapter and Conference Paper

    Boosting QA Performance Through SA-Net and AA-Net with the Read+Verify Framework

    This paper proposes an ensemble model for the Stanford Question Answering Dataset (SQuAD) with the aim of improving performance compared to baseline models such as Albert, and Electra. The proposed ensemble mo...

    Liang Tang, Qianqian Qi, Qinghua Shang, Yuguang Cai in Data Science and Machine Learning (2024)

  4. No Access

    Chapter and Conference Paper

    Force-Estimation Based Interaction of Legged Robots through Whole-Body Dynamics

    External force estimation and adaptation is an assistive technology for legged robots. It enables the robot to accommodate to impacts or interferences and maintain its balance. This technology can also be used...

    Yunpeng Yin, Feng Gao, Yuguang **ao, Limin Yang in Intelligent Robotics and Applications (2023)

  5. No Access

    Chapter and Conference Paper

    The Topologies Characteristics and Behaviors Design of the Curling Hexapod Robot

    This paper introduces a new curling robot, the curling hexapod robot

    Yuguang **ao, Feng Gao, Ke Yin, Zhijun Chen in Intelligent Robotics and Applications (2023)

  6. No Access

    Article

    Quantum algorithm for kernelized correlation filter

    Shang Gao, Shijie Pan, Yuguang Yang in Science China Information Sciences (2022)

  7. No Access

    Chapter and Conference Paper

    Siamese Encoder-based Spatial-Temporal Mixer for Growth Trend Prediction of Lung Nodules on CT Scans

    In the management of lung nodules, we are desirable to predict nodule evolution in terms of its diameter variation on Computed Tomography (CT) scans and then provide a follow-up recommendation according to the...

    Jiansheng Fang, **gwen Wang, Anwei Li in Medical Image Computing and Computer Assis… (2022)

  8. No Access

    Chapter and Conference Paper

    CoVisPose: Co-visibility Pose Transformer for Wide-Baseline Relative Pose Estimation in 360 \(^\circ \) Indoor Panoramas

    We present CoVisPose, a new end-to-end supervised learning method for relative camera pose estimation in wide baseline 360 \(^{\circ }\) ...

    Will Hutchcroft, Yuguang Li, Ivaylo Boyadzhiev, Zhiqiang Wan in Computer Vision – ECCV 2022 (2022)

  9. No Access

    Chapter and Conference Paper

    SALVe: Semantic Alignment Verification for Floorplan Reconstruction from Sparse Panoramas

    We propose a new system for automatic 2D floorplan reconstruction that is enabled by SALVe, our novel pairwise learned alignment verifier. The inputs to our system are sparsely located 360

    John Lambert, Yuguang Li, Ivaylo Boyadzhiev, Lambert Wixson in Computer Vision – ECCV 2022 (2022)

  10. No Access

    Chapter and Conference Paper

    Dynamic Bus Holding Control Using Spatial-Temporal Data – A Deep Reinforcement Learning Approach

    This paper proposes a deep reinforcement learning (DRL) approach that dynamically determines the dispatching of bus services at the starting bus stop for a high-frequency bus service line. Most previous studie...

    Yuguang Zhao, Gang Chen, Hui Ma in AI 2022: Advances in Artificial Intelligen… (2022)

  11. No Access

    Article

    Research on local feature indexing of multimedia video based on intelligent soft computing

    Aiming at the problems of poor precision and recall, long retrieval time and high energy consumption in current video image indexing methods, a local feature indexing method for multimedia video based on intel...

    Zhongli Shen, Yuguang Niu, Yi Zuo, Qiyue **e in Multimedia Tools and Applications (2021)

  12. No Access

    Chapter and Conference Paper

    A Privacy-Preserving Peer-to-Peer Accommodation System Based on a Credit Network

    While Peer-to-peer (P2P) accommodations like Airbnb bring huge convenience and unique experiences to our daily life, a guest taking a P2P accommodation may face great risks, because he/she cannot check the qua...

    Songwei Li, Zhen Wang, Chi Zhang, Lingbo Wei in Wireless Algorithms, Systems, and Applicat… (2021)

  13. No Access

    Chapter and Conference Paper

    Random Neural Graph Generation with Structure Evolution

    In deep learning research, typical neural network models are multi-layered architectures, and weights are tuned while optimizing a carefully designed loss function. In recent years, studies of randomized neura...

    Yuguang Zhou, Zheng He, Tao Wan, Zengchang Qin in Neural Information Processing (2021)

  14. No Access

    Chapter and Conference Paper

    A Review of Explainable Artificial Intelligence

    Artificial intelligence developed rapidly, while people are increasingly concerned about internal structure in machine learning models. Starting from the definition of interpretability and historical process o...

    Kuo-Yi Lin, Yuguang Liu, Li Li, Runliang Dou in Advances in Production Management Systems.… (2021)

  15. No Access

    Article

    Semi-supervised learning using adversarial training with good and bad samples

    In this work, we investigate semi-supervised learning (SSL) for image classification using adversarial training. Previous results have illustrated that generative adversarial networks (GANs) can be used for mu...

    Wenyuan Li, Zichen Wang, Yuguang Yue, Jiayun Li in Machine Vision and Applications (2020)

  16. No Access

    Article

    Quantum key distribution based on single-particle and EPR entanglement

    Leilei Li, Jian Li, Yan Chang, Yuguang Yang in Science China Information Sciences (2020)

  17. No Access

    Chapter and Conference Paper

    Balancing of Bike-Sharing System via Constrained Model Predictive Control

    With the development of social urbanization, bike-sharing was born and developed rapidly. Many cities around the world believe that Shared bikes promote environmental protection and development towards sustain...

    Yuguang Chen, Yan Zeng, Junjun Wu, Qian Li in Neural Computing for Advanced Applications (2020)

  18. No Access

    Chapter and Conference Paper

    Incorporating HowNet-Based Semantic Relatedness Into Chinese Word Sense Disambiguation

    This paper presents a semi-supervised learning method that incorporates sense knowledge into a Chinese word sense disambiguation (WSD) model. This research also effectively exploits HowNet-based semantic rela...

    Qiaoli Zhou, Gu Yue, Yuguang Meng in Chinese Lexical Semantics (2020)

  19. No Access

    Chapter and Conference Paper

    Deep Reinforcement Active Learning for Medical Image Classification

    In this paper, we propose a deep reinforcement learning algorithm for active learning on medical image data. Although deep learning has achieved great success on medical image processing, it relies on a large ...

    **gwen Wang, Yuguang Yan, Yubing Zhang in Medical Image Computing and Computer Assis… (2020)

  20. No Access

    Chapter and Conference Paper

    Investigation of Effectively Synthesizing Code-Switched Speech Using Highly Imbalanced Mix-Lingual Data

    End-to-end text-to-speech (TTS) can synthesize monolingual speech with high naturalness and intelligibility. Recently, the end-to-end model has also been used in code-switching (CS) TTS and performs well on na...

    Shaotong Guo, Longbiao Wang, Sheng Li, Ju Zhang in Neural Information Processing (2020)

previous disabled Page of 4