2025
Integrating Semi-Supervised and Active Learning for Semantic Segmentation.
CoRR, January, 2025
Patch-GAN Transfer Learning with Reconstructive Models for Cloud Removal.
CoRR, January, 2025
Relation Also Knows: Rethinking the Recall and Editing of Factual Associations in Auto-Regressive Transformer Language Models.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
2024
Key Nodes Evaluation Method Based on Combination Weighting VIKOR in Social Networks.
IEEE Trans. Comput. Soc. Syst., August, 2024
A Survey on the Principles of Persuasion as a Social Engineering Strategy in Phishing.
CoRR, 2024
Understanding Auditory Evoked Brain Signal via Physics-informed Embedding Network with Multi-Task Transformer.
CoRR, 2024
EAIS-Former: An efficient and accurate image segmentation method for fruit leaf diseases.
Comput. Electron. Agric., 2024
Joint Beamforming and Location Optimization for UAV-IRS Enhanced Cell-Free Network.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024
Knowledge Distillation for Road Detection Based on Cross-Model Semi-Supervised Learning.
Proceedings of the IGARSS 2024, 2024
Conceptualising People, Process, Technology, Data, Governance and Continuous Improvement (2PTDGC) as a Framework to Explore the Cybersecurity Awareness and Process of Australian Medical Practices.
Proceedings of the Australasian Conference on Information Systems, 2024
2023
Noda iteration for computing generalized tensor eigenpairs.
J. Comput. Appl. Math., November, 2023
Perturbations of Tensor-Schur decomposition and its applications to multilinear control systems and facial recognitions.
Neurocomputing, August, 2023
DiverseNet: Decision Diversified Semi-supervised Semantic Segmentation Networks for Remote Sensing Imagery.
CoRR, 2023
A novel approach for apple leaf disease image segmentation in complex scenes based on two-stage DeepLabv3+ with adaptive loss.
Comput. Electron. Agric., 2023
A Survey on the Principles of Persuasion as a Social Engineering Strategy in Phishing.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Confidence Guided Semi-Supervised Learning in Land Cover Classification.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023
2022
AMM-FuseNet: Attention-Based Multi-Modal Image Fusion Network for Land Cover Mapping.
Remote. Sens., 2022
Corrigendum to "Research on regional differences and influencing factors of green technology innovation efficiency of China's high-tech industry" [J. Comput. Appl. Math. 369 (2020) 112597].
J. Comput. Appl. Math., 2022
High-precision Density Mapping of Marine Debris and Floating Plastics via Satellite Imagery.
CoRR, 2022
Reinforcement Learning Approach to Clear Paths of Robots in Elevator Environment.
CoRR, 2022
IoT Equipment Monitoring System Based on C5.0 Decision Tree and Time-Series Analysis.
IEEE Access, 2022
2021
Biometric recognition system performance measures for lossy compression on EEG signals.
Log. J. IGPL, 2021
Static Analysis for Android Malware detection with Document Vectors.
Proceedings of the 2021 International Conference on Data Mining, 2021
Exploiting the Dual-Tree Complex Wavelet Transform for Ship Wake Detection in SAR Imagery.
Proceedings of the IEEE International Conference on Acoustics, 2021
Key Nodes Evaluation in Opportunistic Networks Based on Influence Between Nodes.
Proceedings of the Wireless Sensor Networks - 15th China Conference, 2021
2020
Research on regional differences and influencing factors of green technology innovation efficiency of China's high-tech industry.
J. Comput. Appl. Math., 2020
Light Weight Automatic Modulation Classification for Edge Devices in Spectrum Sensing Wireless Networks.
Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP), 2020
Wavelet-based denoising for EEG-based pattern recognition systems.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
Application of Deep Learning in Automated Meal Recognition.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
A Sparse Learning Based Detector with Enhanced Mismatched Signals Rejection Capabilities.
Proceedings of the 11th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2020
Attribute Revocable Data Sharing Scheme Based on Blockchain and CP-ABE.
Proceedings of the CSAE 2020: The 4th International Conference on Computer Science and Application Engineering, 2020
2019
A Study on Combining EEG Signals and Crytography for Bitcoin Security.
Aust. J. Intell. Inf. Process. Syst., 2019
EEG-Based Person Authentication with Variational Universal Background Model.
Proceedings of the Network and System Security - 13th International Conference, 2019
EEG-based Person Authentication System in Different Brain States.
Proceedings of the 2019 9th International IEEE/EMBS Conference on Neural Engineering (NER), 2019
Deep Learning Approach to Biogeographical Ancestry Inference.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
Investigating the effects of lossy compression on age, gender and alcoholic information in EEG signals.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
vUBM: A Variational Universal Background Model for EEG-Based Person Authentication.
Proceedings of the Neural Information Processing - 26th International Conference, 2019
2018
A Study of Combined Lossy Compression and Person Identification on EEG Signals.
Proceedings of the International Joint Conference SOCO'18-CISIS'18-ICEUTE'18, 2018
On the Study of Impacts of Brain Conditions on EEG-based Cryptographic Key Generation Systems.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018
Emotional Influences on Cryptographic Key Generation Systems using EEG signals.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018
A Study of Combined Lossy Compression and Seizure Detection on Epileptic EEG Signals.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018
Impact of lossy data compression techniques on EEG-based pattern recognition systems.
Proceedings of the 24th International Conference on Pattern Recognition, 2018
2017
Random Number Generators Basedon EEG Non-linear and ChaoticCharacteristics.
J. Cyber Secur. Mobil., 2017
Decision tree algorithms for image data type identification.
Log. J. IGPL, 2017
Ownership protection of outsourced biomedical time series data based on optimal watermarking scheme in data mining.
Australas. J. Inf. Syst., 2017
EEG-Based Random Number Generators.
Proceedings of the Network and System Security - 11th International Conference, 2017
On The Study of EEG-based Cryptographic Key Generation.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017
Investigating The Impact Of Epilepsy On EEG-based Cryptographic Key Generation Systems.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017
An intelligent learning-based watermarking scheme for outsourced biomedical time series data.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017
Wavelet transform and adaptive arithmetic coding techniques for EEG lossy compression.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017
Investigating the possibility of applying EEG lossy compression to EEG-based user authentication.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017
Experimental Study on the Effects of Watermarking Techniques on EEG-Based Application System Performance.
Proceedings of the Neural Information Processing - 24th International Conference, 2017
2016
Learning Concept Graphs from Online Educational Data.
J. Artif. Intell. Res., 2016
High-Frequency and ETP-Efficient Range-Matching Scheme.
Circuits Syst. Signal Process., 2016
Fuzzy Kernel Stochastic Gradient Descent machines.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016
A proposed pattern recognition framework for EEG-based smart blind watermarking system.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016
2015
Tensor decomposition and application in image classification with histogram of oriented gradients.
Neurocomputing, 2015
Concept Graph Learning from Educational Data.
Proceedings of the Eighth ACM International Conference on Web Search and Data Mining, 2015
A study on the stability of EEG signals for user authentication.
Proceedings of the 7th International IEEE/EMBS Conference on Neural Engineering, 2015
Least square Support Vector Machine for large-scale dataset.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015
Graph-based semi-supervised Support Vector Data Description for novelty detection.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015
Enhancing Performance of EEG-based Emotion Recognition Systems Using Feature Smoothing.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015
A Proposed Blind DWT-SVD Watermarking Scheme for EEG Data.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015
Analysing the Robust EEG Channel Set for Person Authentication.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015
A Locality Preserving Approach for Kernel PCA.
Proceedings of the Image and Graphics - 8th International Conference, 2015
Conditional Entropy Approach to Multichannel EEG-Based Person Identification.
Proceedings of the International Joint Conference, 2015
Investigating the Impacts of Brain Conditions on EEG-Based Person Identification.
Proceedings of the International Joint Conference, 2015
A New Approach to Compressed File Fragment Identification.
Proceedings of the International Joint Conference, 2015
2014
Semantic Similarity Measure Using Relational and Latent Topic Features.
Int. J. Comput. Linguistics Appl., 2014
EEG-Based User Authentication Using Artifacts.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014
A New Approach to Executable File Fragment Detection in Network Forensics.
Proceedings of the Network and System Security - 8th International Conference, 2014
A Proposed Approach to Compound File Fragment Identification.
Proceedings of the Network and System Security - 8th International Conference, 2014
Efficient Structured Matrix Rank Minimization.
Proceedings of the Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, 2014
Investigating the impacts of epilepsy on EEG-based person identification systems.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014
Multi-factor EEG-based user authentication.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014
Using EEG artifacts for BCI applications.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014
Robust Support Vector Machine.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014
A Novel Sphere-Based Maximum Margin Classification Method.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014
The impact of data fragment sizes on file type recognition.
Proceedings of the 10th International Conference on Natural Computation, 2014
An approach to detect network attacks applied for network forensics.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014
Tensor decomposition of dense SIFT descriptors in object recognition.
Proceedings of the 22th European Symposium on Artificial Neural Networks, 2014
Using Shannon Entropy as EEG Signal Feature for Fast Person Identification.
Proceedings of the 22th European Symposium on Artificial Neural Networks, 2014
2013
Proximity multi-sphere support vector clustering.
Neural Comput. Appl., 2013
EEG-Based Person Verification Using Multi-Sphere SVDD and UBM.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013
Fuzzy Multi-Sphere Support Vector Data Description.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013
Motor Imagery EEG-Based Person Verification.
Proceedings of the Advances in Computational Intelligence, 2013
Parallel Support Vector Data Description.
Proceedings of the Advances in Computational Intelligence, 2013
Object recognition in a context-aware application.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013
Fuzzy entropy semi-supervised support vector data description.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013
Maximal margin learning vector quantisation.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013
A general aggregate model for improving multi-class brain-computer interface systems' performance.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013
Improved HOG Descriptors in Image Classification with CP Decomposition.
Proceedings of the Neural Information Processing - 20th International Conference, 2013
A Study on the Feasibility of Using EEG Signals for Authentication Purpose.
Proceedings of the Neural Information Processing - 20th International Conference, 2013
EEG-Based Age and Gender Recognition Using Tensor Decomposition and Speech Features.
Proceedings of the Neural Information Processing - 20th International Conference, 2013
EEG-Based User Authentication in Multilevel Security Systems.
Proceedings of the Advanced Data Mining and Applications - 9th International Conference, 2013
2012
A hierarchical geostatistical model of walking style variety.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012
A unified model for support vector machine and support vector data description.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012
Deterministic Annealing Multi-Sphere Support Vector Data Description.
Proceedings of the Neural Information Processing - 19th International Conference, 2012
A Comprehensive Survey of the Feature Extraction Methods in the EEG Research.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2012
Fuzzy Multi-sphere Support Vector Data Description.
Proceedings of the FUZZ-IEEE 2012, 2012
2011
Impact of restrictive composition policy on user password choices.
Behav. Inf. Technol., 2011
Multiple Distribution Data Description Learning Algorithm for Novelty Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2011
Grammatical Dependency-Based Relations for Term Weighting in Text Classification.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2011
Multiple distribution data description learning method for novelty detection.
Proceedings of the 2011 International Joint Conference on Neural Networks, 2011
Multi-Sphere Support Vector Clustering.
Proceedings of the Neural Information Processing - 18th International Conference, 2011
A Novel Parameter Refinement Approach to One Class Support Vector Machine.
Proceedings of the Neural Information Processing - 18th International Conference, 2011
Generalised Support Vector Machine for Brain-Computer Interface.
Proceedings of the Neural Information Processing - 18th International Conference, 2011
Concentration Distribution of PAHs in the Filter and Foam from the Air.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011
Adaptable Term Weighting Framework for Text Classification.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2011
A New Term Ranking Method based on Relation Extraction and Graph Model for Text Classification.
Proceedings of the Thirty-Fourth Australasian Computer Science Conference, 2011
2010
Modeling Style and Variation in Human Motion.
Proceedings of the 2010 Eurographics/ACM SIGGRAPH Symposium on Computer Animation, 2010
Password Entropy and Password Quality.
Proceedings of the Fourth International Conference on Network and System Security, 2010
An optimal sphere and two large margins approach for novelty detection.
Proceedings of the International Joint Conference on Neural Networks, 2010
A Theoretical Framework for Multi-sphere Support Vector Data Description.
Proceedings of the Neural Information Processing. Models and Applications, 2010
Fuzzy feature weighting techniques for vector quantisation.
Proceedings of the FUZZ-IEEE 2010, 2010
A new support vector machine method for medical image classification.
Proceedings of the 2nd European Workshop on Visual Information Processing, 2010
A practical study on shape space and its occupancy in negative selection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010
2009
Fuzzy Subspace Hidden Markov Models for Pattern Recognition.
Proceedings of the 2009 IEEE International Conference on Computing and Communication Technologies, 2009
A Multi-agent Security Architecture.
Proceedings of the Third International Conference on Network and System Security, 2009
2008
Automated network feature weighting-based intrusion detection systems.
Proceedings of the 3rd IEEE International Conference on System of Systems Engineering, 2008
Automated network feature weighting-based anomaly detection.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
A study on the feature selection of network traffic for intrusion detection purpose.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
Negative Selection with Antigen Feedback in Intrusion Detection.
Proceedings of the Artificial Immune Systems, 7th International Conference, 2008
2007
Handwriting Recognition Applications for Tablet PCs.
J. Adv. Comput. Intell. Intell. Informatics, 2007
Fuzzy Observable Markov Models for Pattern Recognition.
J. Adv. Comput. Intell. Intell. Informatics, 2007
The Good and Not So Good of Enforcing Password Composition Rules.
Inf. Secur. J. A Glob. Perspect., 2007
A Multi-agent Security Framework for e-Health Services.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Using Tuple Space to Coordinate Multiagent Activities.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Fuzzy Normalisation Methods for Typist Verification.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
On Extendable Software Architecture for Spam Email Filtering.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
Possibility Theory-Based Approach to Spam Email Detection.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007
Fuzzy Vector Quantization for Network Intrusion Detection.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007
2006
A Novel Approach to Programming: Agent Based Software Engineering.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Using Windows Printer Drivers for Solaris Applications - An Application of Multiagent System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Detecting Image Based Spam Email.
Proceedings of the Advances in Hybrid Information Technology, 2006
Password Composition Policy: Does Enforcement Lead to Better Password Choices?
Proceedings of the Australasian Conference on Information Systems, 2006
2005
On an IT Security Framework.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
A Multiple Agents Based Intrusion Detection System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
1996
Programming with transactions and chemical abstract machine.
Proceedings of the 1996 International Symposium on Parallel Architectures, 1996
1994
Graphical Assistance in Parallel Program Development.
Proceedings of the Proceedings IEEE Symposium on Visual Languages, 1994
An Overview of Temporal and Modal Logic Programming.
Proceedings of the Temporal Logic, First International Conference, 1994