Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Fixed-time convergence ZNN model for solving rectangular dynamic full-rank matrices inversion
Expert Systems with Applications: An International Journal (EXWA), Volume 251, Issue COct 2024https://doi.org/10.1016/j.eswa.2024.123992AbstractThe Moore–Penrose inverse of dynamic matrices has found widespread application and has garnered significant attention. The zeroing neural network (ZNN) has proven to be an effective solution for computing the Moore–Penrose inverse in dynamic ...
- research-articleJuly 2024
CasFormer: Cascaded transformers for fusion-aware computational hyperspectral imaging
AbstractComputational hyperspectral imaging (CHI) is a cutting-edge technique, which plays a pivotal role in breaking through the quality bottleneck of hyperspectral images (HSI). Among the techniques employed in this domain, the coded aperture snapshot ...
Highlights- Propose a cascaded transformer for fusion-aware hyperspectral computational imaging.
- Fuse RGB images and compressive CASSI measurements for hyperspectral imaging.
- Design spectral-aware self-attention and spatial-fused cross-...
- research-articleJuly 2024
An intrusion detection algorithm based on joint symmetric uncertainty and hyperparameter optimized fusion neural network
Expert Systems with Applications: An International Journal (EXWA), Volume 244, Issue CJun 2024https://doi.org/10.1016/j.eswa.2023.123014AbstractIntrusion Detection System (IDS) can ensure the network security by identifying network intrusions according to the abnormal traffic data. However, the intrusion detection data has the problem of high dimensionality and changes with network and ...
Highlights- An effective algorithm for intrusion detection is proposed in this paper.
- Feature selection is based on symmetric uncertainty and approximate Markov blanket.
- A fusion neural network is constructed to extract the spatial and ...
- research-articleJuly 2024
Image deblurring method based on self-attention and residual wavelet transform
Expert Systems with Applications: An International Journal (EXWA), Volume 244, Issue CJun 2024https://doi.org/10.1016/j.eswa.2023.123005AbstractThe restoration technology of non-uniform blurred images is a challenging open topic. Most of the existing algorithms fail to effectively fuse multi-scale feature extraction with a self-attention mechanism, and also ignore the potential ...
- research-articleMay 2024
SQLPsdem: A Proxy-Based Mechanism Towards Detecting, Locating and Preventing Second-Order SQL Injections
IEEE Transactions on Software Engineering (ISOF), Volume 50, Issue 7July 2024, Pages 1807–1826https://doi.org/10.1109/TSE.2024.3400404Due to well-hidden and stage-triggered properties of second-order SQL injections in web applications, current approaches are ineffective in addressing them and still report high false negatives and false positives. To reduce false results, we propose a <...
-
- surveyApril 2024
Epidemic Model-based Network Influential Node Ranking Methods: A Ranking Rationality Perspective
ACM Computing Surveys (CSUR), Volume 56, Issue 8Article No.: 203, Pages 1–39https://doi.org/10.1145/3653296Existing surveys and reviews on Influential Node Ranking Methods (INRMs) have primarily focused on technical details, neglecting thorough research on verifying the actual influence of these nodes in a network. This oversight may result in erroneous ...
- research-articleApril 2024
SpectralGPT: Spectral Remote Sensing Foundation Model
- Danfeng Hong,
- Bing Zhang,
- Xuyang Li,
- Yuxuan Li,
- Chenyu Li,
- Jing Yao,
- Naoto Yokoya,
- Hao Li,
- Pedram Ghamisi,
- Xiuping Jia,
- Antonio Plaza,
- Paolo Gamba,
- Jon Atli Benediktsson,
- Jocelyn Chanussot
IEEE Transactions on Pattern Analysis and Machine Intelligence (ITPM), Volume 46, Issue 8Aug. 2024, Pages 5227–5244https://doi.org/10.1109/TPAMI.2024.3362475The foundation model has recently garnered significant attention due to its potential to revolutionize the field of visual representation learning in a self-supervised manner. While most foundation models are tailored to effectively process RGB images for ...
- research-articleJuly 2024
PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication
Computer Communications (COMS), Volume 218, Issue CMar 2024, Pages 31–43https://doi.org/10.1016/j.comcom.2024.02.001AbstractThe evolving UAV swarm flight environment exacerbates the difficulty of secure message delivery within the swarm. Physical Unclonable Functions (PUFs) have the potential to provide lightweight physical identities to UAV nodes. Nevertheless, the ...
- research-articleJuly 2024
Construction of Investor Profiles Based on Risk Tolerance Prediction
DEAI '24: Proceedings of the 2024 Guangdong-Hong Kong-Macao Greater Bay Area International Conference on Digital Economy and Artificial IntelligenceJanuary 2024, Pages 126–130https://doi.org/10.1145/3675417.3675439As the complexity of financial markets continues to increase, offering personalized investment strategies to investors becomes increasingly important. This study employs trustworthy artificial intelligence technologies to predict investors' risk ...
- correctionDecember 2023
- research-articleFebruary 2024
Optimal design of aperiodic tri-slot antennas for the conformal ablation of liver tumors using an experimentally validated MWA computer model
- Chen Wu,
- Hangming Huang,
- Yongfang Liu,
- Lingchao Chen,
- Shuangquan Yu,
- Michael A.J. Moser,
- Wenjun Zhang,
- Zheng Fang,
- Bing Zhang
Computer Methods and Programs in Biomedicine (CBIO), Volume 242, Issue CDec 2023https://doi.org/10.1016/j.cmpb.2023.107799Highlights- A new way to conformally ablate liver tumors using MWA was proposed.
- A computer model of MWA with an aperiodic tri-slot antenna was validated in ex vivo and in vivo.
- A custom-made aperiodic tri-slot antenna was fabricated and ...
This study aims to demonstrate that the conformal microwave ablation (MWA) of liver tumors could be attained by optimizing the structure of an aperiodic tri-slot coaxial antenna, its insertion depth, and input power.
MethodsA ...
- research-articleDecember 2023
Local aggregation and global attention network for hyperspectral image classification with spectral-induced aligned superpixel segmentation
Expert Systems with Applications: An International Journal (EXWA), Volume 232, Issue CDec 2023https://doi.org/10.1016/j.eswa.2023.120828AbstractRecently, graph neural networks (GNNs) have been demonstrated to be a promising framework in investigating non-Euclidean dependency in hyperspectral (HS) images. Since the extraction of inter-pixel relationships using GNNs is computationally ...
Highlights- A pixel-to-region assignment is proposed for hyperspectral image classification.
- The graph transformer is introduced for hyperspectral image classification.
- Inter-node aggregation then global neighborhood information is adaptively ...
- research-articleNovember 2023
OSLPNet: A neural network model for street lamp post extraction from street view imagery
Expert Systems with Applications: An International Journal (EXWA), Volume 231, Issue CNov 2023https://doi.org/10.1016/j.eswa.2023.120764AbstractQuickly and accurately obtaining street lamp post information has great application value in smart city construction and automatic vehicle navigation. However, the existing deep learning methods are affected by factors such as the perspective ...
- research-articleNovember 2023
StubCoder: Automated Generation and Repair of Stub Code for Mock Objects
- Hengcheng Zhu,
- Lili Wei,
- Valerio Terragni,
- Yepang Liu,
- Shing-Chi Cheung,
- Jiarong Wu,
- Qin Sheng,
- Bing Zhang,
- Lihong Song
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 33, Issue 1Article No.: 16, Pages 1–31https://doi.org/10.1145/3617171Mocking is an essential unit testing technique for isolating the class under test from its dependencies. Developers often leverage mocking frameworks to develop stub code that specifies the behaviors of mock objects. However, developing and maintaining ...
- research-articleNovember 2023
DBGANet: Dual-Branch Geometric Attention Network for Accurate 3D Tooth Segmentation
IEEE Transactions on Circuits and Systems for Video Technology (IEEETCSVT), Volume 34, Issue 6June 2024, Pages 4285–4298https://doi.org/10.1109/TCSVT.2023.3331589Accurate segmentation of 3D dental models derived from intra-oral scanners (IOS) is one of the key steps in many digital dental applications such as orthodontics and implants. However, it is difficult to accurately segment individual teeth and gums in 3D ...
- research-articleNovember 2023
A novel non-vacuum packaged triaxial accelerometer with differential dual-axis resonantors and torsional elements
Microsystem Technologies (MITE), Volume 30, Issue 1Jan 2024, Pages 33–43https://doi.org/10.1007/s00542-023-05538-2AbstractTri-axis MEMS accelerometers are used in a wide range of applications such as health monitoring, industrial electronics and navigation guidance due to their low cost, high performance and integration. At this stage, the main structure of ...
- research-articleNovember 2023
Neural energy computations based on Hodgkin-Huxley models bridge abnormal neuronal activities and energy consumption patterns of major depressive disorder
Computers in Biology and Medicine (CBIM), Volume 166, Issue CNov 2023https://doi.org/10.1016/j.compbiomed.2023.107500AbstractLimited by the current experimental techniques and neurodynamical models, the dysregulation mechanisms of decision-making related neural circuits in major depressive disorder (MDD) are still not clear. In this paper, we proposed a neural coding ...
Highlights- Augmented energy computational approach for Hodgkin-Huxley models.
- Investigated energy coding patterns of major depressive disorder.
- Explained biological experiments from energy consumption perspective.
- Insights into study of ...
The mechanisms of MDD remain unknown due to the high complexity of the brain. Although there have been many studies exploring its mechanisms, including electrophysiology, EEG, and BOLD imaging of fMRI, these experiments cannot be performed ...
- short-paperOctober 2023
Dual-branch Pattern and Multi-scale Context Facilitate Cross-view Geo-localization
UAVM '23: Proceedings of the 2023 Workshop on UAVs in Multimedia: Capturing the World from a New PerspectiveNovember 2023, Pages 25–29https://doi.org/10.1145/3607834.3616572Cross-view geo-localization aims to locate the target image of the same geographic location from different viewpoints, which is a challenging task in the field of computer vision. Due to the interference of similar images and the surrounding environment ...
- research-articleJanuary 2024
A Technique for Fault Diagnosis Based on LMD and RQA
PCCNT '23: Proceedings of the 2023 International Conference on Power, Communication, Computing and Networking TechnologiesSeptember 2023, Article No.: 5, Pages 1–5https://doi.org/10.1145/3630138.3630417On the backdrop of energy conservation and emission reduction, in order to enhance the health management of equipment, a fault diagnosis method for rolling bearings based on local mean decomposition and recursive quantitative analysis is proposed. First, ...
- research-articleAugust 2023
A multitype software buffer overflow vulnerability prediction method based on a software graph structure and a self-attentive graph neural network
Information and Software Technology (INST), Volume 160, Issue CAug 2023https://doi.org/10.1016/j.infsof.2023.107246Highlights- A method for predicting buffer overflow vulnerabilities in multiple types of software is proposed.
Buffer overflow vulnerabilities are one of the most common and dangerous software vulnerabilities; however, the complexity of software code makes predicting buffer overflow vulnerabilities in software challenging.
...