Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Research on Risk Early Warning of Industrial Product Quality and Safety Based on Multiple Algorithms
CITCE '24: Proceedings of the 4th International Conference on Computer, Internet of Things and Control EngineeringPages 114–120https://doi.org/10.1145/3705677.3705697In order to realize efficient early warning of industrial product quality and safety risks, a risk assessment model based on the Bert model-improved sparrow search algorithm-least squares support vector machine (BERT-ISSA-LSSVM) algorithm is proposed. ...
- research-articleSeptember 2024
Location-Aware and Privacy-Preserving Data Cleaning for Intelligent Transportation
IEEE Transactions on Intelligent Transportation Systems (ITS-TRANSACTIONS), Volume 25, Issue 12Pages 20405–20418https://doi.org/10.1109/TITS.2024.3453340The widespread use of machine learning in location-related scenarios is propelling the rapid development of intelligent transportation. To assist users in making more informed travel plans, the demand for improving prediction accuracy is growing. Prior to ...
- research-articleOctober 2024
A modeling method for the opto-mechanical coupling problems of photoelectric detection and tracking systems in dynamics process
- Xueguan Song,
- Pengwei Liang,
- Shuai Zhang,
- Yong Pang,
- Zhuangzhuang Gong,
- Kaike Yang,
- Junwei Zhang,
- Zhaoting Yuan
Structural and Multidisciplinary Optimization (SPSMO), Volume 67, Issue 9https://doi.org/10.1007/s00158-024-03889-6AbstractIntegrated opto-mechanical analysis (IOA) for Photoelectric detection and tracking systems (PDTS) is crucial both in the early design phase and during later operation and maintenance. The movements of PDTS typically generate unbalanced momentum, ...
- research-articleJuly 2024
Inside Bug Report Templates: An Empirical Study on Bug Report Templates in Open-Source Software
Internetware '24: Proceedings of the 15th Asia-Pacific Symposium on InternetwarePages 125–134https://doi.org/10.1145/3671016.3671401In open-source software development, bug report templates (BRTs) have emerged as a crucial tool for ensuring the quality of bug reports. Despite their widespread use, developers have little knowledge about designing personalized BRTs. Therefore, it is ...
- ArticleDecember 2024
Emotional Polarity Attention Mechanism for Text Sentiment Analysis
AbstractText Sentiment Analysis (TSA) is a classic research topic in the field of Natural Language Processing (NLP) and has important application value for downstream tasks. Previous TSA methods focus on accurately representing emotional words in the ...
-
- research-articleJuly 2024
Efficient and self-recoverable privacy-preserving k-NN classification system with robustness to network delay
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 150, Issue Chttps://doi.org/10.1016/j.sysarc.2024.103111AbstractOnline classification services based on machine learning have been widely used in fields such as healthcare and finance. To enhance the data privacy and avoid server collusion, companies usually deploy servers on different cloud service providers ...
Graphical abstractDisplay Omitted
Highlights- Constant online communication rounds, efficient and robust classification service even under network delay.
- Secure redundant backup servers to enable fast system self-recovery without data re-upload.
- Client-friendly and lightweight ...
- research-articleApril 2024
Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 151, Pages 1–13https://doi.org/10.1145/3597503.3639142Vulnerability analysis is crucial for software security. Inspired by the success of pre-trained models on software engineering tasks, this work focuses on using pre-training techniques to enhance the understanding of vulnerable code and boost ...
- research-articleJune 2024
Explorer-Actor-Critic: Better actors for deep reinforcement learning
Information Sciences: an International Journal (ISCI), Volume 662, Issue Chttps://doi.org/10.1016/j.ins.2024.120255AbstractActor-critic deep reinforcement learning methods have demonstrated significant performance in many challenging decision-making and control tasks, but also suffer from high sample complexity and overestimation bias. Current researches focus on ...
- research-articleJuly 2024
Channel Estimation Algorithm Based on Spatial Direction Acquisition and Dynamic-Window Expansion in Massive MIMO System
International Journal of Intelligent Systems (IJIS), Volume 2024https://doi.org/10.1155/2024/7727469Millimeter-wave (mmWave) and massive multiple-input multiple-output (MIMO) technologies are critical in current and future communication research. They play an essential role in meeting the demands for high-capacity, high-speed, and low-latency ...
- research-articleMarch 2024
Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 4448–4463https://doi.org/10.1109/TIFS.2024.3379861As the core subject of IoT applications, IoT devices have faced numerous security challenges. Especially for IoT devices deployed in remote or harsh environments, they are often unattended for long periods, making it difficult to share the sensing data ...
- research-articleMay 2024
The Particle swarm optimization algorithm improved based on multiple strategies including adaptive nonlinear weights
ICAICE '23: Proceedings of the 4th International Conference on Artificial Intelligence and Computer EngineeringPages 176–181https://doi.org/10.1145/3652628.3652658The benefits of Particle Swarm Optimization (PSO) include its straightforwardness, simplicity, and powerful parallelism, so it is widely used to solve nonlinear, non-convex, high-dimensional problems. However, the typical particle swarm algorithm is ...
- research-articleOctober 2023
Starrypia: An AR Gamified Music Adjuvant Treatment Application for Children with Autism Based on Combined Therapy
UIST '23: Proceedings of the 36th Annual ACM Symposium on User Interface Software and TechnologyArticle No.: 41, Pages 1–16https://doi.org/10.1145/3586183.3606755In this paper, we present Starrypia, a lightweight gamified music adjuvant treatment application to improve the symptoms of mild autistic children, eliminating the geographical and time constraints faced by traditional treatment. Adopting ABA (Applied ...
- ArticleOctober 2023
Dual-Prompting Interaction with Entity Representation Enhancement for Event Argument Extraction
Natural Language Processing and Chinese ComputingPages 161–172https://doi.org/10.1007/978-3-031-44696-2_13AbstractEvent argument extraction (EAE) aims to recognize arguments that are entities involved in events and their roles. Previous prompt-based methods focus on designing appropriate prompt template for events, while neglecting to explicitly model ...
- research-articleAugust 2023
Vulnerability Detection by Learning From Syntax-Based Execution Paths of Code
IEEE Transactions on Software Engineering (ISOF), Volume 49, Issue 8Pages 4196–4212https://doi.org/10.1109/TSE.2023.3286586Vulnerability detection is essential to protect software systems. Various approaches based on deep learning have been proposed to learn the pattern of vulnerabilities and identify them. Although these approaches have shown vast potential in this task, ...
- research-articleOctober 2023
Transformer-based Multi-level Feature Extraction for Finger Vein Identification
ICDIP '23: Proceedings of the 15th International Conference on Digital Image ProcessingArticle No.: 15, Pages 1–8https://doi.org/10.1145/3604078.3604093Currently, deep learning methods are being used to good effect in implementing finger vein (FV) recognition algorithms. However, increasingly large volumes of data can lead to problems in which FV recognition based on lightweight neural networks are ...
- research-articleApril 2023
Reveal Your Images: Gradient Leakage Attack Against Unbiased Sampling-Based Secure Aggregation
IEEE Transactions on Knowledge and Data Engineering (IEEECS_TKDE), Volume 35, Issue 12Pages 12958–12971https://doi.org/10.1109/TKDE.2023.3271432Recently, some Unbiased Gradient Sampling-based (UGS) methods have been proposed to enhance the security and efficiency of federated learning through crafted unbiased random transformation and sampling, such as MinMax Sampling in SIGMOD ’22. In ...
- ArticleApril 2023
Unleashing Pre-trained Masked Language Model Knowledge for Label Signal Guided Event Detection
AbstractEvent detection (ED) aims to recognize triggers and their types in sentences. Previous work employs distantly supervised methods or pre-trained language models to generate sentences containing events to alleviate data scarcity. Further, ...
- research-articleFebruary 2023
Quantum-inspired representation for long-tail senses of word sense disambiguation
AAAI'23/IAAI'23/EAAI'23: Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence and Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence and Thirteenth Symposium on Educational Advances in Artificial IntelligenceArticle No.: 1564, Pages 13949–13957https://doi.org/10.1609/aaai.v37i11.26633Data imbalance, also known as the long-tail distribution of data, is an important challenge for data-driven models. In the Word Sense Disambiguation (WSD) task, the long-tail phenomenon of word sense distribution is more common, making it difficult to ...
- research-articleFebruary 2023
PointCA: evaluating the robustness of 3D point cloud completion models against adversarial examples
AAAI'23/IAAI'23/EAAI'23: Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence and Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence and Thirteenth Symposium on Educational Advances in Artificial IntelligenceArticle No.: 97, Pages 872–880https://doi.org/10.1609/aaai.v37i1.25166Point cloud completion, as the upstream procedure of 3D recognition and segmentation, has become an essential part of many tasks such as navigation and scene understanding. While various point cloud completion models have demonstrated their powerful ...
- research-articleDecember 2022
Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 218, Issue Chttps://doi.org/10.1016/j.comnet.2022.109421AbstractWith the widespread application of unmanned aerial vehicles (UAVs), the discussion about the various security and privacy issues of UAVs have never stopped. Physical Unclonable Function (PUF) is inherently unclonable and tamper-proof, ...