Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
Learning robust correlation with foundation model for weakly-supervised few-shot segmentation
AbstractExisting few-shot segmentation (FSS) only considers learning support-query correlation and segmenting unseen categories under the precise pixel masks. However, the cost of a large number of pixel masks during training is expensive. This paper ...
Highlights- We propose a Correlation Enhancement Network with foundation model assistance to accurately segment query samples in weakly-supervised few-shot segmentation (WS-FSS).
- We propose a Correlation-Guided Transformer, a Class-Guided Module ...
- research-articleFebruary 2024
BEANet: An Energy-efficient BLE Solution for High-capacity Equipment Area Network
ACM Transactions on Sensor Networks (TOSN), Volume 20, Issue 3Article No.: 52, Pages 1–23https://doi.org/10.1145/3641280The digital transformation of factories has greatly increased the number of peripherals that need to connect to a network for sensing or control, resulting in a growing demand for a new network category known as the Equipment Area Network (EAN). The EAN ...
- research-articleJanuary 2023
A Survey on Clock Synchronization in the Industrial Internet
Journal of Computer Science and Technology (JCST), Volume 38, Issue 1Pages 146–165https://doi.org/10.1007/s11390-023-2908-4AbstractClock synchronization is one of the most fundamental and crucial network communication strategies. With the expansion of the Industrial Internet in numerous industrial applications, a new requirement for the precision, security, complexity, and ...
- research-articleOctober 2022
StreamingTag: a scalable piracy tracking solution for mobile streaming services
MobiCom '22: Proceedings of the 28th Annual International Conference on Mobile Computing And NetworkingPages 596–608https://doi.org/10.1145/3495243.3560521Streaming services have billions of mobile subscribers, yet video piracy has cost service providers billions. Digital Rights Management (DRM), however, is still far from satisfactory. Unlike DRM, which attempts to prohibit the creation of pirated copies,...
- ArticleNovember 2020
Entropy Repulsion for Semi-supervised Learning Against Class Mismatch
AbstractA series of semi-supervised learning (SSL) algorithms have been proposed to alleviate the need for labeled data by leveraging large amounts of unlabeled data. Those algorithms have achieved good performance on standard benchmark datasets, however, ...
-
- research-articleJuly 2020
Quality-aware Online Task Assignment in Mobile Crowdsourcing
ACM Transactions on Sensor Networks (TOSN), Volume 16, Issue 3Article No.: 30, Pages 1–21https://doi.org/10.1145/3397180In recent years, mobile crowdsourcing has emerged as a powerful computation paradigm to harness human power to perform spatial tasks such as collecting real-time traffic information and checking product prices in a specific supermarket. A fundamental ...
- research-articleJanuary 2020
QA-Share: Toward an Efficient QoS-Aware Dispatching Approach for Urban Taxi-Sharing
ACM Transactions on Sensor Networks (TOSN), Volume 16, Issue 2Article No.: 17, Pages 1–21https://doi.org/10.1145/3375406Taxi-sharing allows occupied taxis to pick up new passengers on the fly, promising to reduce waiting time for taxi riders and increase productivity for drivers. However, it becomes more difficult to strike the balance between a driver’s profit and a ...
- research-articleApril 2018
Channel-Aware Rate Adaptation for Backscatter Networks
- Wei Gong,
- Haoxiang Liu,
- Jiangchuan Liu,
- Xiaoyi Fan,
- Kebin Liu,
- Qiang Ma,
- Xiaoyu Ji,
- Kebin Liu,
- Jiangchuan Liu,
- Xiaoyi Fan,
- Qiang Ma,
- Haoxiang Liu,
- Wei Gong,
- Xiaoyu Ji
IEEE/ACM Transactions on Networking (TON), Volume 26, Issue 2Pages 751–764https://doi.org/10.1109/TNET.2018.2802323Backscatter communication networks receive much attention recently due to the small size and low power of backscatter nodes. As backscatter communication is often influenced by the dynamic wireless channel quality, rate adaptation becomes necessary. ...
- research-articleNovember 2017
PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 28, Issue 11Pages 3258–3271https://doi.org/10.1109/TPDS.2017.2712148Many cloud platforms emerge to meet urgent requirements for large-volume personal image store, sharing and search. Though most would agree that images contain rich sensitive information (e.g., people, location and event) and people’s privacy ...
- research-articleSeptember 2017
iSelf: Towards Cold-Start Emotion Labeling Using Transfer Learning with Smartphones
ACM Transactions on Sensor Networks (TOSN), Volume 13, Issue 4Article No.: 30, Pages 1–22https://doi.org/10.1145/3121049It has been a consensus that a certain relationship exists between personal emotions and usage pattern of the smartphone. Based on users’ emotions and personalities, more and more applications are developed to provide intelligent automation services on ...
- research-articleSeptember 2017
PLP: Protecting Location Privacy Against Correlation Analyze Attack in Crowdsensing
IEEE Transactions on Mobile Computing (ITMV), Volume 16, Issue 9Pages 2588–2598https://doi.org/10.1109/TMC.2016.2624732Crowdsensing applications require individuals to share local and personal sensing data with others to produce valuable knowledge and services. Meanwhile, it has raised concerns especially for location privacy. Users may wish to prevent privacy leak and ...
- research-articleJune 2017
Toward More Rigorous and Practical Cardinality Estimation for Large-Scale RFID Systems
IEEE/ACM Transactions on Networking (TON), Volume 25, Issue 3Pages 1347–1358https://doi.org/10.1109/TNET.2016.2634551Cardinality estimation is one of the fundamental problems in large-scale radio frequency identification systems. While many efforts have been made to achieve faster approximate counting, the accuracy of estimates itself has not received enough attention. ...
- research-articleApril 2017
Montage: Combine Frames with Movement Continuity for Realtime Multi-User Tracking
IEEE Transactions on Mobile Computing (ITMV), Volume 16, Issue 4Pages 1019–1031https://doi.org/10.1109/TMC.2016.2577586In this work, we design and develop Montage for real-time multi-user formation tracking and localization by off-the-shelf smartphones. Montage achieves submeter-level tracking accuracy by integrating temporal and spatial constraints from user ...
- research-articleDecember 2016
Fast and Adaptive Continuous Scanning in Large-Scale RFID Systems
IEEE/ACM Transactions on Networking (TON), Volume 24, Issue 6Pages 3314–3325https://doi.org/10.1109/TNET.2016.2521333Radio Frequency Identification RFID technology plays an important role in supply chain logistics and inventory control. In these applications, a series of scanning operations at different locations are often needed to cover the entire inventory tags. In ...
- research-articleOctober 2016
Lasagna: towards deep hierarchical understanding and searching over mobile sensing data
MobiCom '16: Proceedings of the 22nd Annual International Conference on Mobile Computing and NetworkingPages 334–347https://doi.org/10.1145/2973750.2973752The proliferation of mobile devices has enabled extensive mobile-data supported applications, e.g., exercise and activity recognition and quantification. Typically, these applications need predefined features and are only applicable to predefined ...
- research-articleOctober 2016
Fast Composite Counting in RFID Systems
IEEE/ACM Transactions on Networking (TON), Volume 24, Issue 5Pages 2756–2767https://doi.org/10.1109/TNET.2015.2483681Counting the number of tags is a fundamental issue and has a wide range of applications in RFID systems. Most existing protocols, however, only apply to the scenario where a single reader counts the number of tags covered by its radio, or at most the ...
- research-articleSeptember 2016
Privacy-friendly photo capturing and sharing system
UbiComp '16: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous ComputingPages 524–534https://doi.org/10.1145/2971648.2971662The wide adoption of smart devices with onboard cameras facilitates photo capturing and sharing, but greatly increases people's concern on privacy infringement. Here we seek a solution to respect the privacy of persons being photographed in a smarter ...
- research-articleApril 2016
Exploiting channel diversity for rate adaptation in backscatter communication networks
IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer CommunicationsPages 1–9https://doi.org/10.1109/INFOCOM.2016.7524404Backscatter communication networks receive much attention recently due to the small size and low power of backscatter nodes. As backscatter communication is often influenced by the dynamic wireless channel quality, rate adaptation becomes necessary. Most ...
- research-articleApril 2016
Fast and scalable counterfeits estimation for large-scale RFID systems
IEEE/ACM Transactions on Networking (TON), Volume 24, Issue 2Pages 1052–1064https://doi.org/10.1109/TNET.2015.2406669Many algorithms have been introduced to deterministically authenticate Radio Frequency Identification (RFID) tags, while little work has been done to address scalability issue in batch authentications. Deterministic approaches verify tags one by one, and ...
- research-articleFebruary 2016
Continuous Answering Holistic Queries over Sensor Networks
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 27, Issue 2Pages 394–404https://doi.org/10.1109/TPDS.2015.2407892Sensor networks are widely used in various domains like the intelligent transportation systems. Users issue queries to sensors and collect sensing data. Due to the low quality sensing devices or random link failures, sensor data are often noisy. In order ...