2025
PFLLTNet: enhancing low-light images with PixelShuffle upsampling and feature fusion.
Signal Image Video Process., April, 2025
Coarse-to-fine medical image registration with landmarks and deformable networks.
J. Supercomput., February, 2025
Neural Network Based on Inter-layer Perturbation Strategy for Text Classification.
Mach. Intell. Res., February, 2025
Entity and Relationship Extraction with High-quality Spans and Enhanced Marker Strategies.
Int. J. Autom. Comput., 2025
Entity and relationship extraction based on span contribution evaluation and focusing framework.
Comput. Speech Lang., 2025
Enhancing NLU in Large Language Models Using Adversarial Noisy Instruction Tuning.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
2024
CDGAN-BERT: Adversarial constraint and diversity discriminator for semi-supervised text classification.
Knowl. Based Syst., 2024
Alignment and fusion for adaptive domain nighttime semantic segmentation.
Image Vis. Comput., 2024
Enhancing Biomedical NER with Adversarial Selective Training.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2024
Two-Stage Prompt-Based Entity Representation in Contrastive Learning for Knowledge Graph Completion.
Proceedings of the 7th International Conference on Algorithms, 2024
2023
An Adaptive MAC Protocol Based on Time-Domain Interference Alignment for UWANs.
Comput. J., December, 2023
A Joint Entity and Relation Extraction Model based on Efficient Sampling and Explicit Interaction.
ACM Trans. Intell. Syst. Technol., October, 2023
A generalized decoding method for neural text generation.
Comput. Speech Lang., June, 2023
Multi-MCCR: Multiple models regularization for semi-supervised text classification with few labels.
Knowl. Based Syst., 2023
2022
Seeds: Sampling-Enhanced Embeddings.
IEEE Trans. Neural Networks Learn. Syst., 2022
Rule-based adversarial sample generation for text classification.
Neural Comput. Appl., 2022
Self attention mechanism of bidirectional information enhancement.
Appl. Intell., 2022
GeSe: Generalized static embedding.
Appl. Intell., 2022
2021
Source Routing for Distributed Big Data-Based Cognitive Internet of Things (CIoT).
Wirel. Commun. Mob. Comput., 2021
Tracking Based Mix-Zone Location Privacy Evaluation in VANET.
IEEE Trans. Veh. Technol., 2021
Document Vector Extension for Documents Classification.
IEEE Trans. Knowl. Data Eng., 2021
Anonymous Data Reporting Strategy with Dynamic Incentive Mechanism for Participatory Sensing.
Secur. Commun. Networks, 2021
A message transmission scheduling algorithm based on time-domain interference alignment in UWANs.
Peer-to-Peer Netw. Appl., 2021
Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme.
Inf. Sci., 2021
An SDN-IoT-based secure simulation system for smart cities.
Int. J. Ad Hoc Ubiquitous Comput., 2021
Evolutionary selection for regression test cases based on diversity.
Frontiers Comput. Sci., 2021
GEPC: Global embeddings with PID control.
Comput. Speech Lang., 2021
An Evolutionary Generation Method of Test Data for Multiple Paths Based on Coverage Balance.
IEEE Access, 2021
A Proactive Joint Strategy on Trajectory and Caching for UAV-Assisted Networks: A Data-Driven Distributionally Robust Approach.
Proceedings of the 10th IEEE/CIC International Conference on Communications in China, 2021
A Joint Strategy for CUAV-based Traffic Offloading via Deep Reinforcement Learning.
Proceedings of the IEEE Global Communications Conference, 2021
2020
Generating word and document matrix representations for document classification.
Neural Comput. Appl., 2020
Efficient data transfer in clustered IoT network with cooperative member nodes.
Multim. Tools Appl., 2020
Polyseme-Aware Vector Representation for Text Classification.
IEEE Access, 2020
2019
Efficient key generation leveraging channel reciprocity and balanced gray code.
Wirel. Networks, 2019
A RSU-aided distributed trust framework for pseudonym-enabled privacy preservation in VANETs.
Wirel. Networks, 2019
IoT enabled adaptive clustering based energy efficient routing protocol for wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2019
Big Data Analytics, Text Mining and Modern English Language.
J. Grid Comput., 2019
On the using of Rényi's quadratic entropy for physical layer key generation.
Comput. Commun., 2019
The impact of preprocessing steps on the accuracy of machine learning algorithms in sentiment analysis.
Comput. Math. Organ. Theory, 2019
Research Challenges in the Internet of Things (IoTs).
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019
2018
A Novel Problem Model and Solution Scheme for Roadside Unit Deployment Problem in VANETs.
Wirel. Pers. Commun., 2018
A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs.
Peer-to-Peer Netw. Appl., 2018
Efficient key generation leveraging wireless channel reciprocity for MANETs.
J. Netw. Comput. Appl., 2018
An anonymous data reporting strategy with ensuring incentives for mobile crowd-sensing.
J. Ambient Intell. Humaniz. Comput., 2018
Visual Saliency Detection Based on color Frequency Features under Bayesian framework.
KSII Trans. Internet Inf. Syst., 2018
Memory Confidentiality and Integrity Protection Technology.
Proceedings of the Communications, Signal Processing, and Systems, 2018
2017
Outage Probability of Cognitive Selective DF Relay Networks with Multiple Primary Nodes and Heterogenous Non-Identical Constraints.
Wirel. Pers. Commun., 2017
基于文本分类方法识别《史记》的伪作 (Fake Chapters Recognition in Shiji Based on Text Classiffication Methods).
计算机科学, 2017
一种层次式远程数据持有检测方法 (Hierarchical Remote Data Possession Checking Method).
计算机科学, 2017
A novel key generation method for wireless sensor networks based on system of equations.
J. Netw. Comput. Appl., 2017
Efficient key generation leveraging wireless channel reciprocity and discrete cosine transform.
KSII Trans. Internet Inf. Syst., 2017
LIAP: A local identity-based anonymous message authentication protocol in VANETs.
Comput. Commun., 2017
On the using of discrete wavelet transform for physical layer key generation.
Ad Hoc Networks, 2017
EFAV-MERD: Expected Forwarding Area Volume and Residual Distance Mathematic Expectation Routing Protocol for UASNs.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
2016
A collusion-resistant dynamic key management scheme for WSNs.
Secur. Commun. Networks, 2016
基于Sun SPOT平台的无线传感器网络多跳路由协议设计 (Design of Multi-hop Routing Protocol in WSN Based on Sun SPOT).
计算机科学, 2016
WDFAD-DBR: Weighting depth and forwarding area division DBR routing protocol for UASNs.
Ad Hoc Networks, 2016
2015
Outage Probability Equivalency of Three Typical Relay Selection Schemes for Selective DF Relay Networks with Selection Combining.
Wirel. Pers. Commun., 2015
A reliable data transfer protocol based on twin paths and network coding for underwater acoustic sensor network.
EURASIP J. Wirel. Commun. Netw., 2015
An adaptive routing protocol in underwater sparse acoustic sensor networks.
Ad Hoc Networks, 2015
2014
Outage Analysis of Cognitive AF Relay Networks with Multiple Primary Users and Heterogeneous Non-identical Parameters.
Wirel. Pers. Commun., 2014
Relative Distance Based Forwarding Protocol for Underwater Wireless Networks.
Int. J. Distributed Sens. Networks, 2014
An enhanced XOR-based scheme for wireless packet retransmission problem.
Int. J. Commun. Syst., 2014
Research of localization algorithm based on weighted Voronoi diagrams for wireless sensor network.
EURASIP J. Wirel. Commun. Netw., 2014
2013
A Non-partitioning File Assignment Scheme with Approximating Average Waiting Time in Parallel I/O System.
J. Softw., 2013
Analyzing the performance of Aloha in string multi-hop underwater acoustic sensor networks.
EURASIP J. Wirel. Commun. Netw., 2013
A network coding based protocol for reliable data transfer in underwater acoustic sensor.
Ad Hoc Networks, 2013
2012
Performance Analysis of Aloha for String Multi-hop Underwater Acoustic Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012
The Node Movement Models Based on Lagrange Motion for 3-D Underwater Acoustic Sensor Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012
Study on the Data Flow Balance in NFS Server with iSCSI.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2012
2011
Improving aloha via backoff tuning in underwater sensor networks.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011
2009
A New Method to Protect Software from Cracking.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
NSM: A Security Mechanism for Object-Based Storage System.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
2008
Modified Improved Alternating Combination Trilateration Algorithm with a Variable m.
Proceedings of the International Multisymposiums on Computer and Computational Sciences, 2008
2007
A New Method of Performance Test for Network Storage.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007
Fault-Tolerance CMP Architecture based on SMT Technology.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007
Performance Analysis Group-Based Key Management.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007
Optimization of the Switches in Storage Networks.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Analysis of Local Route Maintenance for Ad Hoc Network.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Group-Based Key Management for Multicast of Ad Hoc Sensor Network.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
2006
Multipath passive data acknowledgement on-demand multicast protocol.
Comput. Commun., 2006
Internet Accessing for IPv6 MANETs.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006
Verification Environment for a SCMP Architecture.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
A New Scheduling Algorithm for Servers.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
MPoolODMRP: An Extended PoolODMRP based on Multi-path Policy.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
2005
Study Queuing Networks Using CART.
Proceedings of The 2005 International Conference on Modeling, 2005
Improving the Data Placement Algorithm of Randomization in SAN.
Proceedings of the Computational Science, 2005
2002
Pipeline: a new architecture of high performance servers.
ACM SIGOPS Oper. Syst. Rev., 2002