2024
A topic detection method based on KM-LSH Fusion algorithm and improved BTM model.
,
,
,
,
,
,
,
,
,
,
,
Soft Comput., October, 2024
Randomize the Running Function When It Is Disclosed.
IEEE Trans. Computers, June, 2024
A popular topic detection method based on microblog images and short text information.
,
,
,
,
,
,
,
,
,
,
J. Web Semant., 2024
Automatic Text Summarization Method Based on Improved TextRank Algorithm and K-Means Clustering.
Knowl. Based Syst., 2024
Evaluation of OpenAI o1: Opportunities and Challenges of AGI.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2024
An Adaptive Gradient Regularization Method.
CoRR, 2024
Decomposed Direct Preference Optimization for Structure-Based Drug Design.
CoRR, 2024
EDT: Improving Large Language Models' Generation by Entropy-based Dynamic Temperature Sampling.
CoRR, 2024
A Novel Approach for Traveling Salesman Problem Via Probe Machine.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
Deep Linear Matrix Approximate Reconstruction Reveals Reproducible Large-Scale Functional Connectivity Networks in the Human Brain.
Proceedings of the 1st International Workshop on Multimedia Computing for Health and Medicine, 2024
DecompOpt: Controllable and Decomposed Diffusion Models for Structure-based Molecular Optimization.
Proceedings of the Twelfth International Conference on Learning Representations, 2024
The Research and Application of UPS Devices in Impulse Generator Sets.
Proceedings of the 2024 3rd International Conference on Frontiers of Artificial Intelligence and Machine Learning, 2024
Isolate and Detect the Untrusted Driver with a Virtual Box.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Binding-Adaptive Diffusion Models for Structure-Based Drug Design.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Design of Robust Sparse Wideband Beamformers with Circular-Model Mismatches Based on Reweighted ℓ2,1 Optimization.
Remote. Sens., October, 2023
What you can read is what you can't execute.
Comput. Secur., September, 2023
Entropy minimization and domain adversarial training guided by label distribution similarity for domain adaptation.
Multim. Syst., August, 2023
A diagnostic classification model of college instructors' value beliefs towards open educational resources.
Educ. Inf. Technol., June, 2023
MCEN: Maximum cooperative equilibrium WSN based on greedy prediction to reduce opposite transmission.
Comput. Networks, February, 2023
MagBox: Keep the risk functions running safely in a magic box.
Future Gener. Comput. Syst., 2023
Diffusion Language Models Can Perform Many Tasks with Scaling and Instruction-Finetuning.
CoRR, 2023
DINOISER: Diffused Conditional Sequence Learning by Manipulating Noises.
CoRR, 2023
Research on Robust Broadband Beamformers Using Low-Order Statistics of Microphone Mismatches.
Proceedings of the IEEE International Conference on Signal Processing, 2023
DecompDiff: Diffusion Models with Decomposed Priors for Structure-Based Drug Design.
Proceedings of the International Conference on Machine Learning, 2023
Selective Knowledge Distillation for Non-Autoregressive Neural Machine Translation.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Scattering Properties of an Acoustic Anti-Parity-Time-Symmetric System and Related Fabry-Perot Resonance Mode.
Symmetry, 2022
SENDER: SEmi-Nonlinear Deep Efficient Reconstructor for Extraction Canonical, Meta, and Sub Functional Connectivity in the Human Brain.
CoRR, 2022
Beating the fault-tolerance bound and security loopholes for Byzantine agreement with a quantum solution.
CoRR, 2022
DELMAR: Deep Linear Matrix Approximately Reconstruction to Extract Hierarchical Functional Connectivity in the Human Brain.
CoRR, 2022
DEMAND: Deep Matrix Approximately Nonlinear Decomposition to Identify Meta, Canonical, and Sub-Spatial Pattern of functional Magnetic Resonance Imaging in the Human Brain.
CoRR, 2022
SADAM: Stochastic Adam, A Stochastic Operator for First-Order Gradient-based Optimizer.
CoRR, 2022
KPointer: Keep the code pointers on the stack point to the right code.
Comput. Secur., 2022
MProbe: Make the code probing meaningless.
Proceedings of the Annual Computer Security Applications Conference, 2022
latent-GLAT: Glancing at Latent Variables for Parallel Text Generation.
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2022
2021
Room evacuation in the presence of obstacles using an agent-based model with turning behavior.
Simul. Model. Pract. Theory, 2021
Recognition of Abnormal Chest Compression Depth Using One-Dimensional Convolutional Neural Networks.
Sensors, 2021
An Improved Method for Multisensor High Conflict Data Fusion.
J. Sensors, 2021
Breaking the Rate-Loss Relationship of Quantum Key Distribution with Asynchronous Two-Photon Interference.
CoRR, 2021
Experimental quantum advantage with quantum coupon collector.
CoRR, 2021
Improving Safety in Cyber Enabled Underground Mines.
Proceedings of the 8th NSysS 2021: 8th International Conference on Networking, Systems and Security, Cox's Bazar, Bangladesh, December 21, 2021
Non-Autoregressive Translation by Learning Target Categorical Codes.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021
Glancing Transformer for Non-Autoregressive Neural Machine Translation.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021
2020
Bayesian Co-Clustering Truth Discovery for Mobile Crowd Sensing Systems.
IEEE Trans. Ind. Informatics, 2020
An Emergency Evacuation Behavior Simulation Method Combines Personality Traits and Emotion Contagion.
IEEE Access, 2020
A Lightweight authentication method between homogeneous nodes in Wireless Sensor Network based on Message Authentication Code.
Proceedings of the 8th IEEE International Conference on Smart City and Informatization, 2020
Explicit Semantic Decomposition for Definition Generation.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020
2019
Non-autoregressive Transformer by Position Learning.
CoRR, 2019
Techno-economic analyses for vertical use cases in the 5G domain.
CoRR, 2019
Toward more accurate prediction of caspase cleavage sites: a comprehensive review of current methods, tools and features.
Briefings Bioinform., 2019
WiSafe: a real-time system for intrusion detection based on wifi signals.
Proceedings of the ACM Turing Celebration Conference - China, 2019
Generating Sentences from Disentangled Syntactic and Semantic Spaces.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019
2018
Identification and Analysis of Critical Sites in RNA/Protein Sequences and Biological Networks.
PhD thesis, 2018
A Chance-Constrained Programming Approach to the Design of Robust Broadband Beamformers With Microphone Mismatches.
IEEE ACM Trans. Audio Speech Lang. Process., 2018
Analysis of Critical and Redundant Vertices in Controlling Directed Complex Networks Using Feedback Vertex Sets.
J. Comput. Biol., 2018
How Do Metro Station Crowd Flows Influence the Taxi Demand Based on Deep Spatial-Temporal Network?
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018
2017
Virtual movement of relay nodes for two-tier wireless sensor networks in tunnels.
Int. J. Distributed Sens. Networks, 2017
Compact CNN Based Video Representation for Efficient Video Copy Detection.
Proceedings of the MultiMedia Modeling - 23rd International Conference, 2017
Object-Based Aggregation of Deep Features for Image Retrieval.
Proceedings of the MultiMedia Modeling - 23rd International Conference, 2017
Profit maximization resource allocation in cloud computing with performance guarantee.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
2016
Modeling and Analysis of Phase Fluctuation in a High-Precision Roll Angle Measurement Based on a Heterodyne Interferometer.
Sensors, 2016
Multi-level feature representations for video semantic concept detection.
Neurocomputing, 2016
LBSizeCleav: improved support vector machine (SVM)-based prediction of Dicer cleavage sites using loop/bulge length.
BMC Bioinform., 2016
Discriminative Feature Learning with an Optimal Pattern Model for Image Classification.
Proceedings of the MultiMedia Modeling - 22nd International Conference, 2016
Region-based CNN for Logo Detection.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2016
2015
Quantitative comparison of lossless video compression for multi-camera stereo and view interpolation applications.
Proceedings of the IEEE 13th International New Circuits and Systems Conference, 2015
Sensor data fusion among neighbors in wireless networks.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015
There is a Will, There is a Way: A New Mechanism for Traffic Control Based on VTL and VANET.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015
Comparison of Predictive-Corrective Video Coding Filters for Real-Time FPGA-based Lossless Compression in Multi-Camera Systems.
Proceedings of the 12th FPGAworld Conference 2015, 2015
Relay Node Deployment for Wireless Sensor Networks Based on PSO.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Decision Fusion Supported by Correlated Auxiliary Data in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
Cuteness Recognition and Localization in the Photos of Animals.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014
2013
Reversible Watermarking Algorithm of Grid Map Based on Prediction-Error Histogram.
J. Softw., 2013
Digital radio over fiber for LTE-advanced: Opportunities and challenges.
Proceedings of the 17th International Conference on Optical Networking Design and Modeling, 2013
Some insights into farfield wideband beamformers in the presence of microphone mismatches.
Proceedings of the IEEE International Conference on Acoustics, 2013
2012
Vulnerability Evaluating Based on Attack Graph.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Robust farfield wideband beamformer design using worst-case performance optimization.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2012
2011
Resisting Collusion by Game in Culture Web.
Proceedings of the 20th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2011
Multistage Filtering for Collusion Detection in P2P Network.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
2010
A committee machine with two-layer expert nets.
Kybernetes, 2010
Interest-driven Reasoning Based on Commitment Alternating Temporal Logic in the P2P Reputation System.
J. Comput., 2010
2009
Cross-language Search: The Case of Google Language Tools.
First Monday, 2009
Information access across languages on the web: From search engines to digital libraries.
Proceedings of the Thriving on Diversity: Information Opportunities in a Pluralistic World, 2009