Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2024
Design and Implementation of Webshell Encrypted Communication Management Tool Based on Golang and Qt5
ICCSMT '23: Proceedings of the 2023 4th International Conference on Computer Science and Management TechnologyPages 112–116https://doi.org/10.1145/3644523.3644544In network attack and defense drills, the WebShell encrypted communication management tool can improve the attack efficiency and quality of red teams on the one hand; On the other hand, it also enriches the defense experience of the blue team. WebShell ...
- research-articleMarch 2023
An IoU-aware Siamese network for real-time visual tracking
AbstractMost Siamese trackers decompose the tracking task into two branches: classification and bounding box regression. They choose the bounding box with the highest classification score or the combination of the classification and predicted ...
- research-articleMarch 2023
SiamSTC: Updatable Siamese tracking network via Spatio-Temporal Context
AbstractTo adapt to the target appearance, some trackers focus only on learning the target model online with the spatial context or only on learning an adaptive template with the temporal context. However, these trackers do not fully utilize ...
- research-articleNovember 2022
SiamAGN: Siamese attention-guided network for visual tracking
AbstractMost Siamese-based trackers utilize cross-correlation to calculate the similarity scores between the target template and the search image, which may cause the loss of spatial information and lead to inaccurate target estimation. To ...
- research-articleNovember 2022
Cx22: A new publicly available dataset for deep learning-based segmentation of cervical cytology images
Computers in Biology and Medicine (CBIM), Volume 150, Issue Chttps://doi.org/10.1016/j.compbiomed.2022.106194AbstractThe segmentation of cervical cytology images plays an important role in the automatic analysis of cervical cytology screening. Although deep learning-based segmentation methods are well-developed in other image segmentation areas, their ...
Graphical abstractDisplay Omitted
Highlights- Cx22 is the first publicly available dataset suitable for deep learning-based cervical cell segmentation.
- Cx22 contains 1320 authentic images with 14,946 well-annotated cellular instance labels.
- Cx22 is suitable for the multi-task ...
-
- research-articleJanuary 2022
SiamOAN: Siamese object-aware network for real-time target tracking
Neurocomputing (NEUROC), Volume 471, Issue CPages 161–174https://doi.org/10.1016/j.neucom.2021.10.112AbstractExisting Siamese-based tracking algorithms usually utilize local features to represent the object, which lack sufficient discrimination and may degrade tracking performance in challenging situations. To address this issue, we propose a ...
- research-articleJanuary 2022
Privacy-Enhanced Intrusion Detection and Defense for Cyber-Physical Systems: A Deep Reinforcement Learning Approach
Cyber-physical systems (CPSs) will play an important role in future real-world applications through the deep integration of computing, communication, and control technologies. CPSs are increasingly deployed in critical infrastructure, industry, and homes ...
- ArticleDecember 2021
A Novel GNN Model for Fraud Detection in Online Trading Activities
Algorithms and Architectures for Parallel ProcessingPages 603–614https://doi.org/10.1007/978-3-030-95388-1_40AbstractThe previous graph neural network-based fraud detection techniques were usually realized by clustering the neighbors with different relationships. However, the graph-based datasets face the issues of imbalanced features, classifications, and ...
- research-articleNovember 2021
DGA: Distributed geographic-sensing addressing method for linear-zone internet of things
Microprocessors & Microsystems (MSYS), Volume 87, Issue Chttps://doi.org/10.1016/j.micpro.2020.103375AbstractSeveral applications of Internet of Things (IoT) have hundreds of nodes, and the expansibility and flexibility of the network can be greatly improved if the nodes can address themselves automatically and dynamically.Existing nodes ...
- research-articleSeptember 2021
Automatic lumbar spinal MRI image segmentation with a multi-scale attention network
Neural Computing and Applications (NCAA), Volume 33, Issue 18Pages 11589–11602https://doi.org/10.1007/s00521-021-05856-4AbstractLumbar spinal stenosis (LSS) is a lumbar disease with a high incidence in recent years. Accurate segmentation of the vertebral body, lamina and dural sac is a key step in the diagnosis of LSS. This study presents an lumbar spine magnetic resonance ...
- research-articleJuly 2021
Threat Analysis for Automotive CAN Networks: A GAN Model-Based Intrusion Detection Technique
IEEE Transactions on Intelligent Transportation Systems (ITS-TRANSACTIONS), Volume 22, Issue 7Pages 4467–4477https://doi.org/10.1109/TITS.2021.3055351With the rapid development of Internet of vehicles, connected vehicles, autonomous vehicles, and autonomous driving technologies, automotive Controller Area Networks (CAN) have suffered from numerous security threats. Deep learning models are the current ...
- research-articleApril 2021
Adaptive feature fusion with attention mechanism for multi-scale target detection
Neural Computing and Applications (NCAA), Volume 33, Issue 7Pages 2769–2781https://doi.org/10.1007/s00521-020-05150-9AbstractTo detect the targets of different sizes, multi-scale output is used by target detectors such as YOLO V3 and DSSD. To improve the detection performance, YOLO V3 and DSSD perform feature fusion by combining two adjacent scales. However, the feature ...
- research-articleJune 2021
An Improved SSD for small target detection
ICMIP '21: Proceedings of the 2021 6th International Conference on Multimedia and Image ProcessingPages 7–11https://doi.org/10.1145/3449388.3449391SSD is one of heuristic one-stage target detection approaches. Although it has got impressive results in general target detection, it still struggles in small-size object detection and precise location. In this paper, we proposed an improved SSD which ...
- research-articleMarch 2021
An improved YOLO V3 for small vehicles detection in aerial images
ACAI '20: Proceedings of the 2020 3rd International Conference on Algorithms, Computing and Artificial IntelligenceArticle No.: 56, Pages 1–5https://doi.org/10.1145/3446132.3446188Small vehicle detection in aerial images is a challenge in computer vision because small vehicles occupy less pixels and the environment around the small vehicles is complex. To improve the detection performance for the vehicles in aerial images, we ...
- research-articleFebruary 2020
Image Encryption Application of Chaotic Sequences Incorporating Quantum Keys
International Journal of Automation and Computing (SPIJAC), Volume 17, Issue 1Pages 123–138https://doi.org/10.1007/s11633-019-1173-zAbstractThis paper proposes an image encryption algorithm LQBPNN (logistic quantum and back propagation neural network) based on chaotic sequences incorporating quantum keys. Firstly, the improved one-dimensional logistic chaotic sequence is used as the ...
- research-articleNovember 2019
Efficient data packet transmission algorithm for IPV6 mobile vehicle network based on fast switching model with time difference
Future Generation Computer Systems (FGCS), Volume 100, Issue CPages 132–143https://doi.org/10.1016/j.future.2019.04.040AbstractIn the IPV6 wireless network, the nodes are numerous, mobile. and have high latency. In this work, we propose an efficient data packet transmission algorithm based on fast switching model with time difference called EDPTA. A ...
Highlights- High-speed movement and high overhead of nodes affect data transmission performance.
- research-articleAugust 2019
Container-based fog computing architecture and energy-balancing scheduling algorithm for energy IoT
Future Generation Computer Systems (FGCS), Volume 97, Issue CPages 50–60https://doi.org/10.1016/j.future.2018.12.063AbstractThe traditional architecture of fog computing is for one data center and multiple fog nodes. It is unable to adapt to the current development of private cloud. In addition, virtual machines used for cloud computing, are also used for ...
- articleMarch 2016
Improving reliability of erasure codes-based storage paradigm under correlated failures for wireless sensor networks
International Journal of Communication Systems (IJOCS), Volume 29, Issue 5Pages 992–1011https://doi.org/10.1002/dac.3013In distributed sensor networks, ensuring data availability and reliability in the presence of node failures and malicious attacks is an important requirement. Traditionally, redundant schemes such as erasure codes and network coding are used to improve ...
- ArticleDecember 2015
A Novel Data Sharing Mechanism via Cloud-Based Dynamic Audit for Social Internet of Vehicles
IOV 2015: Proceedings of the Second International Conference on Internet of Vehicles - Safe and Intelligent Mobility - Volume 9502Pages 78–88https://doi.org/10.1007/978-3-319-27293-1_8In this paper, we leverage on the cloud-based data sharing paradigm for vehicles exchange information in Internet of Vehicles IOV. Vehicles can join different interest groups to form a social network where they can facilitate to modify or share data in ...
- ArticleAugust 2002
A Fast Lightpath Restoration Method Using Two Backup Paths in WDM Networks
ICPPW '02: Proceedings of the 2002 International Conference on Parallel Processing WorkshopsPage 183WDM networks providing Terabits per second bandwidth are becoming the core technology for the next generation Internet. Due to the tremendous bandwidth offered by these networks, it's imperative for them to be survivable. Currrent path-based proactive ...