Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Online fountain code with an improved caching mechanism
AbstractThe original online fountain codes discard a large number of symbols that do not meet the requirements at the decoder. To improve channel utilization, this article proposes a new online fountain code. In the completion phase, the proposed code ...
By catching some selected encoded symbols discarded in the original online fountain codes and giving an optimal degree selection strategy of encoded symbols, the proposed online fountain code improves the receiving rules of the encoded symbols. The ...
- research-articleOctober 2024
Streaks and Coping: Decoding Player Performance in League of Legends Using Big Data from Top Players' Matches
CHI PLAY Companion '24: Companion Proceedings of the 2024 Annual Symposium on Computer-Human Interaction in PlayPages 50–55https://doi.org/10.1145/3665463.3678787Among athletes and sports fans, it is common to believe that one victory leads to another. Such an effect is known as the hot-hand effect or, simply, a winning streak. This effect was most often associated with traditional sports, however, people ...
- extended-abstractOctober 2024
Self-Auxiliary Distillation for Sample Efficient Learning in Google-Scale Recommenders
- Yin Zhang,
- Ruoxi Wang,
- Xiang Li,
- Tiansheng Yao,
- Andrew Evdokimov,
- Jonathan Valverde,
- Yuan Gao,
- Jerry Zhang,
- Evan Ettinger,
- Ed H. Chi,
- Derek Zhiyuan Cheng
RecSys '24: Proceedings of the 18th ACM Conference on Recommender SystemsPages 829–831https://doi.org/10.1145/3640457.3688041Industrial recommendation systems process billions of daily user feedback which are complex and noisy. Efficiently uncovering user preference from these signals becomes crucial for high-quality recommendation. We argue that those signals are not ...
- research-articleSeptember 2024
Seeking Consensus on Subspaces in Federated Principal Component Analysis
Journal of Optimization Theory and Applications (JOPT), Volume 203, Issue 1Pages 529–561https://doi.org/10.1007/s10957-024-02523-1AbstractIn this paper, we develop an algorithm for federated principal component analysis (PCA) with emphases on both communication efficiency and data privacy. Generally speaking, federated PCA algorithms based on direct adaptations of classic iterative ...
- research-articleNovember 2024
Automatic depression prediction via cross-modal attention-based multi-modal fusion in social networks
Computers and Electrical Engineering (CENG), Volume 118, Issue PAhttps://doi.org/10.1016/j.compeleceng.2024.109413AbstractDepression has become a worldwide public health concern in recent years. The online social network can be served as a tool to predict latent depressed users. However, existing studies primarily use machine learning or deep learning methods on ...
-
- research-articleAugust 2024
A bearing-angle approach for unknown target motion analysis based on visual measurements
International Journal of Robotics Research (RBRS), Volume 43, Issue 8Pages 1228–1249https://doi.org/10.1177/02783649241229172Vision-based estimation of the motion of a moving target is usually formulated as a bearing-only estimation problem where the visual measurement is modeled as a bearing vector. Although the bearing-only approach has been studied for decades, a ...
- research-articleJuly 2024
A lightweight and gradient-stable neural layer
AbstractTo enhance resource efficiency and model deployability of neural networks, we propose a neural-layer architecture based on Householder weighting and absolute-value activating, called Householder-absolute neural layer or simply Han-layer. Compared ...
- research-articleJune 2024
Expanding-Window Zigzag Decodable Fountain Codes for Scalable Multimedia Transmission
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 20, Issue 8Article No.: 248, Pages 1–24https://doi.org/10.1145/3664610In this article, we present a coding method called expanding-window zigzag decodable fountain code with unequal error protection property (EWF-ZD UEP code) to achieve scalable multimedia transmission. The key idea of the EWF-ZD UEP code is to utilize bit-...
- research-articleJune 2024
Modeling and Simulation of Driving Risk Pulse Field and Its Application in Car Following Model
IEEE Transactions on Intelligent Transportation Systems (ITS-TRANSACTIONS), Volume 25, Issue 8Pages 8984–9000https://doi.org/10.1109/TITS.2024.3404933For assisted driving or unmanned driving, various information acquisition and comprehensive and effective information utilization will make the driving assistance system and the driving measures more reliable. With the support of advanced information ...
- research-articleApril 2024
Distributed Rumor Source Detection via Boosted Federated Learning
IEEE Transactions on Knowledge and Data Engineering (IEEECS_TKDE), Volume 36, Issue 11Pages 5986–6001https://doi.org/10.1109/TKDE.2024.3390238How to localize the rumor source is an extremely important matter for all sectors of the society. Many researchers have tried to use deep-learning-based graph models to detect rumor sources, but they have neglected how to train their deep-learning-based ...
- research-articleApril 2024
Global-Local MAV Detection Under Challenging Conditions Based on Appearance and Motion
IEEE Transactions on Intelligent Transportation Systems (ITS-TRANSACTIONS), Volume 25, Issue 9Pages 12005–12017https://doi.org/10.1109/TITS.2024.3381174Visual detection of micro aerial vehicles (MAVs) has received increasing research attention in recent years due to its importance in many applications. However, the existing approaches based on either appearance or motion features of MAVs still face ...
- research-articleMay 2024
Feature aggregation-based multi-relational knowledge reasoning for COPD intelligent diagnosis
Computers and Electrical Engineering (CENG), Volume 114, Issue Chttps://doi.org/10.1016/j.compeleceng.2023.109068AbstractThe increasing prevalence of artificial intelligence-based knowledge reasoning has contributed to more accurate and efficient auxiliary diagnoses. However, a majority of the disease prediction methods concentrate on the symptoms themselves while ...
- research-articleApril 2024
R-CCF: region-aware continual contrastive fusion for weakly supervised object detection
Applied Intelligence (KLU-APIN), Volume 54, Issue 6Pages 4689–4712https://doi.org/10.1007/s10489-024-05403-3AbstractWeakly-supervised learning has emerged as a compelling method for object detection by reducing the fully annotated labels requirement in the training procedure. Recently, some works have treated the detection task as a classification task, ...
- research-articleMarch 2024
Vital information is only worth one thumbnail: Towards efficient human pose estimation
AbstractIn pursuit of impressive performance, existing DCNN-based approaches of human pose estimation usually use massive networks and large-size images to train a deep model. When applying these deep based methods in real-time systems, current works try ...
Highlights- A novel framework is proposed for efficient human pose estimation.
- A style supervised online downscaler is designed to compress input images to thumbnail ones.
- A dual-branch auto-encoding strategy is designed for refining the ...
- research-articleApril 2024
User financial credit analysis for blockchain regulation
Computers and Electrical Engineering (CENG), Volume 113, Issue Chttps://doi.org/10.1016/j.compeleceng.2023.109008AbstractThe rise of illegal activities involving blockchain digital currencies is a growing concern. Criminals exploit the anonymity and decentralization of blockchain to increase the accessibility of money laundering, fraud, and illegal fund flows. This ...
- research-articleMay 2024
Back-modality: leveraging modal transformation for data augmentation
NIPS '23: Proceedings of the 37th International Conference on Neural Information Processing SystemsArticle No.: 3128, Pages 71430–71448We introduce Back-Modality, a novel data augmentation schema predicated on modal transformation. Data from an initial modality undergo a transformation to an intermediate modality, followed by a reverse transformation. This framework serves dual roles. ...
- research-articleDecember 2023
Diversity-Driven Proactive Caching for Mobile Networks
IEEE Transactions on Mobile Computing (ITMV), Volume 23, Issue 7Pages 7878–7894https://doi.org/10.1109/TMC.2023.3340733Content caching in mobile networks is a highly promising technology for reducing traffic load latency and energy consumption levels. Its fundamental goal is to satisfy the supply-and-demand relationships between content providers and content-requesting ...
- research-articleMay 2024
A Blockchain-Based Conditional Anonymous Authentication Scheme
ICBCT '23: Proceedings of the 2023 5th International Conference on Blockchain TechnologyPages 15–20https://doi.org/10.1145/3638025.3638030In recent years, the security of industrial systems has received high attention. Once a problem occurs, it is necessary to trace back the user access records to investigate the issue. Blockchain-based identity verification schemes have been applied to ...
- ArticleNovember 2023
Typical Contract Graph Feature Enhanced Smart Contract Vulnerability Detection
AbstractDue to the significant losses caused by vulnerabilities, the security of smart contracts has attracted widespread attention and research. Existing methods for detecting smart contract vulnerabilities can be classified into traditional detection ...