default search action
Connection Science, Volume 35
Volume 35, Number 1, December 2023
- Junhui Yu, Yanping Chen, Qinghua Zheng, Yuefei Wu, Ping Chen:
Full-span named entity recognition with boundary regression. - Dongmei Zhao, Guoqing Ji, Shuiguang Zeng:
Network security situation assessment based on dual attention mechanism and HHO-ResNeXt. - Zhihan Xue, Tad Gonsalves:
Monocular vision guided deep reinforcement learning UAV systems with representation learning perception. - Jingzhao Li, Huashun Li, Xiaobo Zhang, Qing Shi:
Monocular vision based on the YOLOv7 and coordinate transformation for vehicles precise positioning. - Jun Wu, Jiahui Zhu, Xin Tong, Tianliang Zhu, Tianyi Li, Chunzhi Wang:
Dynamic activation and enhanced image contour features for object detection. - Shujiang Xu, Jinrong Zhong, Lianhai Wang, Debiao He, Shuhui Zhang, Wei Shao:
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth. - Ryotaro Kamimura:
Impartial competitive learning in multi-layered neural networks. - Yuxiang Zhou, Haowen Tan, Karunarathina Chandrathilaka Appuhamilage Asiria Iroshan:
A secure authentication and key agreement scheme with dynamic management for vehicular networks. - Tao Zhang, Chen Wang, Mulmediyage Imantha Udana Chandrasena:
Blockchain-assisted data sharing supports deduplication for cloud storage. - Ning Li, Ruijie Zhang, Chengyu Zhu, Wei Ou, Wenbao Han, Qionglu Zhang:
A data sharing method for remote medical system based on federated distillation learning and consortium blockchain. - Yang Sun, Jiankun Song, Yong Li, Yi Li, Song Li, Zehao Duan:
IVP-YOLOv5: an intelligent vehicle-pedestrian detection method based on YOLOv5s. - Yong Ren, Yan Ren, Hongwei Tian, Wei Song, Yanhong Yang:
Improving transaction safety via anti-fraud protection based on blockchain. - Feiyi Fang, Junzhu Mao, Wei Yu, Jianfeng Lu:
FPGA-oriented lightweight multi-modal free-space detection network. - Hong Zhao, Chenpeng Zhang, Aolong Wang:
An enhanced text classification model by the inverted attention orthogonal projection module. - S. Ramraj, G. Usha:
Hybrid feature learning framework for the classification of encrypted network traffic. - Abhilash C. Basavaraju, Kavi Mahesh, Nihar Sanda:
Ontology-based semantic data interestingness using BERT models. - Xiao Liang, Boran Zhou, Linping Jiang, Guanglei Meng, Yiwei Xiu:
Collaborative pursuit-evasion game of multi-UAVs based on Apollonius circle in the environment with obstacle. - Dazhi Jiang, Runguo Wei, Zhihui He, Senlin Lin, Cheng Liu, Yingqing Lin:
GASN: gamma distribution test for driver genes identification based on similarity networks. - Erdal Güvenoglu, Volkan Tunali:
ZigZag transform with Durstenfeld shuffle for fast and secure image encryption. - Kai Wang, Yanping Chen, Kunjian Wen, Chao Wei, Bo Dong, Qinghua Zheng, Yongbin Qin:
Cue prompt adapting model for relation extraction. - Xixi Yan, Pei Yin, Yongli Tang, Suwei Feng:
A remote sensing encrypted data search method based on a novel double-chain. - Wenjun Zheng, Shunxiang Zhang, Cheng Yang, Peng Hu:
Lightweight multilayer interactive attention network for aspect-based sentiment analysis. - Mengfan Xu, Xinghua Li:
FedG2L: a privacy-preserving federated learning scheme base on "G2L" against poisoning attack. - Wei Gao, Weifan Wang, Yaojun Chen:
Isolated toughness and fractional (a,b,n)-critical graphs. - Jia Zhao, Wenhao Wang, Liyuan Zhang, Yan Ding:
Integrate computation intelligence with Bayes theorem into complex construction installation: a heuristic two-stage resource scheduling optimisation approach. - Jing Long, Fei Fang, Cuiting Luo, Yehua Wei, Tien-Hsiung Weng:
MS_HGNN: a hybrid online fraud detection model to alleviate graph-based data imbalance. - Huan Fang, Wangcheng Liu, Wusong Wang, Shunxiang Zhang:
Discovery of process variants based on trace context tree. - Yucong Chen, Xianzhi Tang, Shuaixin Xu, Fangfang Zhu, Qingguo Zhou, Tien-Hsiung Weng:
Analyzing execution path non-determinism of the Linux kernel in different scenarios. - Feixiang Tan, Guansheng Zheng:
Active learning for deep object detection by fully exploiting unlabeled data. - Bharti Ahuja, Rajesh Doriya, Sharad Salunke, Mohammad Farukh Hashmi, Aditya Gupta, Neeraj Dhanraj Bokde:
HDIEA: high dimensional color image encryption architecture using five-dimensional Gauss-logistic and Lorenz system. - Junyan Qiu, Haidong Zhang, Yiping Yang:
Reward estimation with scheduled knowledge distillation for dialogue policy learning. - Yingwen Fu, Nankai Lin, Zhihe Yang, Shengyi Jiang:
Towards Malay named entity recognition: an open-source dataset and a multi-task framework. - Kegeng Zhang, Jinyuan Liu, Junshuai Zhong, Yizhou Jing:
Diagnosis of contamination discharge state of porcelain insulators based on GA-CNN. - Mirjana Ivanovic, Serge Autexier, Miltiadis Kokkonidis, Johannes Rust:
Quality medical data management within an open AI architecture - cancer patients case. - Sheng Han, Youfang Lin, Zhihui Guo, Kai Lv:
A lightweight and style-robust neural network for autonomous driving in end side devices. - Hang Su, Huangcan Li, Dun Li:
Knowledge reasoning with multiple relational paths. - Fang He, Xiaoxia Wu, Wenyu Zhang, Xiaoling Huang:
A novel bias-alleviated hybrid ensemble model based on over-sampling and post-processing for fair classification. - Jingjing Hu, Xiaojun Xu, Jin Hao, Xiuqi Yang, Kefan Qiu, Yuanzhang Li:
Microservice combination optimisation based on improved gray wolf algorithm. - Peiqian Liu, Duoduo Wu, Zihao Shen, Hui Wang:
Trajectory privacy data publishing scheme based on local optimisation and R-tree. - Pengzhen Zhou, Huifu Zhang, Wei Liang:
Research on hybrid intrusion detection based on improved Harris Hawk optimization algorithm. - Wenkang Liu, Yuxuan He, Xiaoliang Wang, Ziming Duan, Wei Liang, Yuzhen Liu:
BFG: privacy protection framework for internet of medical things based on blockchain and federated learning. - Keji Mao, Yuxiang Wang, Ligang Ren, Jinhong Zhang, Jiefan Qiu, Guanglin Dai:
Multi-branch feature learning based speech emotion recognition using SCAR-NET. - Jishi Zheng, Junhui Li, Zhigang Ding, Linghua Kong, Qingqiang Chen:
Recognition of expiry data on food packages based on improved DBNet. 1-16 - Kai Jin, Kun Xie, Jiazheng Tian, Wei Liang, Jigang Wen:
Low cost network traffic measurement and fast recovery via redundant row subspace-based matrix completion. - Jie Xiao, Hui Huang, Chenhuang Wu, Qunshan Chen, Zhenjie Huang:
A collaborative auditing scheme with dynamic data updates based on blockchain. - Yuyan Gao, He Di, Mu Yan, Hongmin Zhao:
Realised volatility prediction of high-frequency data with jumps based on machine learning. - Gunjan Singh, Arpita Nagpal, Vijendra Singh:
Optimal feature selection and invasive weed tunicate swarm algorithm-based hierarchical attention network for text classification. - Huaicheng Zhou, Kanghua Mo, Teng Huang, Yongjin Li:
Empirical study of privacy inference attack against deep reinforcement learning models. - Juan Chen, Wei Liang, Lijun Xiao, Ce Yang, Ronglin Zhang, Zhenwen Gui, Aneta Poniszewska-Maranda:
PrivBCS: a privacy-preserving and efficient crowdsourcing system with fine-grained worker selection based on blockchain. - Suzhi Zhang, Xiang Lin, Zijian Bai, Pu Li, Haidi Fan:
CGRS: Collaborative Knowledge Propagation Graph Attention Network for Recipes Recommendation. - Chih-Yuan Chen, Yung-An Fang, Guan-Ren Wang, Peng-Sheng Chen:
A GCC-based checker for compliance with MISRA-C's single-translation-unit rules. - Kotchaporn Karoon, Yupaporn Areepong, Saowanit Sukparungsee:
Modification of ARL for detecting changes on the double EWMA chart in time series data with the autoregressive model. - Ao Zou, Wenning Hao, Dawei Jin, Gang Chen, Feiyan Sun:
MoCoUTRL: a momentum contrastive framework for unsupervised text representation learning. - Meijiao Zhang, Xianhao Pan, Jiajin Mai, Mingdong Tang, Tien-Hsiung Weng:
Recommending third-party APIs via using lightweight graph convolutional neural networks. - Wenjuan Feng, Jin Gou, Zongwen Fan, Xiang Chen:
An ensemble machine learning approach for classification tasks using feature generation. - Su-Kyung Sung, Sang-Won Han, Byeong-Seok Shin:
Particle-based simulation technique for medical applications. - Wenyu Zhao, Dong Zhou, Buqing Cao, Wei Liang, Nitin Sukhija:
Exploring latent weight factors and global information for food-oriented cross-modal retrieval. - Zhixing Chen, Jian Shu, Linlan Liu:
The node importance evaluation method based on graph convolution in multilayer heterogeneous networks. - Jueun Jeon, Seungyeon Baek, Byeonghui Jeong, Young-Sik Jeong:
Early prediction of ransomware API calls behaviour based on GRU-TCN in healthcare IoT. - Chengjun Yang, Ruijie Zhu, Xinde Yu, Ce Yang, Lijun Xiao, Scott Fowler:
Real-time reading system for pointer meter based on YolactEdge. - Shuxin Shi, Dezhi Han, Mingming Cui:
A multimodal hybrid parallel network intrusion detection model. - Gebrekiros Gebreyesus Gebremariam, J. Panda, S. Indu:
Design of advanced intrusion detection systems based on hybrid machine learning techniques in hierarchically wireless sensor networks. - Yixuan Yang, Sony Peng, Sophort Siet, Sadriddinov Ilkhomjon, Vilakone Phonexay, Seok-Hoon Kim, Doo-Soon Park:
Detecting susceptible communities and individuals in hospital contact networks: a model based on social network analysis. - Kelei Sun, Yingying Wang, Mengqi He, Huaping Zhou, Shunxiang Zhang:
Neighbor interaction-based personalised transfer for cross-domain recommendation. - Venkateswara Rao Kagita, Sanjaya Kumar Panda, Ram Krishan, P. Deepak Reddy, Jabba Aswanth:
High-performance computing for static security assessment of large power systems. - Yunus Abdi, Ömer Küllü, Mehmet Kivilcim Keles, Berk Gökberk:
CPW-DICE: a novel center and pixel-based weighting for damage segmentation. - Lijun Xiao, Wei Liang, Jiahong Cai, Ming Wang, Jiahong Xiao, Yinyan Gong, Weigang Zhang:
An efficiency control strategy of dual-motor multi-gear drive algorithm. - Gang Liu, Qijun Zhou, Xiaoxiao Xie, Qingchen Yu:
Dual conditional GAN based on external attention for semantic image synthesis. - Xingguang Wang, Shunxiang Zhang, Zichen Ma, Yunduo Liu, Youqiang Zhang:
CFSE: a Chinese short text classification method based on character frequency sub-word enhancement. - Song Gao, Hongwei Wang, Yuanjun Zhu, Jiaqi Liu, Ou Tang:
Comparative relation mining of customer reviews based on a hybrid CSR method. - Hao Wang, Dezhi Han, Mingming Cui, Chongqing Chen:
NAS-YOLOX: a SAR ship detection using neural architecture search and multi-scale attention. 1-32 - Zihua Chen, Runmei Zhang, Zhong Chen, Yu Zheng, Shunxiang Zhang:
ScTCN-LightGBM: a hybrid learning method via transposed dimensionality-reduction convolution for loading measurement of industrial material. - Yu-Kai Lee, Bo-Yi Lin, Tien-Hsiung Weng, Chien-Kang Huang, Chen Liu, Chih-Chin Liu, Shih-Shun Lin, Han-Ching Wang:
Counting and measuring the size and stomach fullness levels for an intelligent shrimp farming system. - YungYu Zhuang, Ting-Wei Lin, Yin-Jung Huang:
The algorithm and implementation of an extension to LLVM for solving the blocking between instruction sink and division-modulo combine. - Arundhati Sahoo, Asis Kumar Tripathy:
On routing algorithms in the internet of vehicles: a survey. - Minghao Chen, Shuai Wang, Jiazhong Zhang:
A multi-factorial evolutionary algorithm concerning diversity information for solving the multitasking Robust Influence Maximization Problem on networks. - Chao-Lin Lee, Chun-Ping Chung, Sheng-Yuan Cheng, Jenq-Kuen Lee, Robert Lai:
Accelerating AI performance with the incorporation of TVM and MediaTek NeuroPilot. - Antonio Esposito, Beniamino Di Martino, Rosario Ammendolia, Pietro Lupi, Massimo Orlando, Wei Liang:
Time anomaly detection in the duration of civil trials in Italian justice. - Feng Zhou, Xin Du, Wenli Li, Zhihui Lu, Shih-Chia Huang:
Fidan: a predictive service demand model for assisting nursing home health-care robots. - Keqin Li:
UAV mission scheduling with completion time, flight distance, and resource consumption constraints. - Beniamino Di Martino, Antonio Esposito, Gennaro Junior Pezzullo, Tien-Hsiung Weng:
Evaluating machine and deep learning techniques in predicting blood sugar levels within the E-health domain. - AI-based data analysis for healthcare.
- Mingdong Tang, Xingyu Feng, Weili Chen:
Exploring the NFT market on ethereum: a comprehensive analysis and daily volume forecasting. - Hong-an Li, Diao Wang, Jing Zhang, Zhanli Li, Tian Ma:
Image super-resolution reconstruction based on multi-scale dual-attention. - Zhu Ye, Yuan Jing, Qinghua Wang, Pengrui Li, Zhihong Liu, Mingjing Yan, Yongqing Zhang, Dongrui Gao:
Emotion recognition based on convolutional gated recurrent units with attention. - Kyung-yeul Kim, Young-bo Yang, Mi-ra Kim, Ji Su Park, Jihie Kim:
Predicting adolescent violence in Wartegg-ZeichenTest drawing images based on deep learning. - Le Chen, Lina Ge, Wei Zhou:
IIM: an information interaction mechanism for aspect-based sentiment analysis. - Daniele Granata, Massimiliano Rak, Giovanni Salzillo, Giacomo Di Guida, Salvatore Petrillo:
Automated threat modelling and risk analysis in e-Government using BPMN. - Ji Ma, Jinjin Chen:
Reconstructing higher-resolution four-dimensional time-varying volumetric data. - Yanli Liu, Siyi Chen, Heng Zhang, Neal N. Xiong, Wei Liang:
DOE: a dynamic object elimination scheme based on geometric and semantic constraints. - Henrique Varella Ehrenfried, Vinicius Tikara Venturi Date, Eduardo Todt:
Exploring graph representation strategies for text classification. - Chao Wang, Jiahan Dong, Guangxin Guo, Tianyu Ren, Xiaohu Wang, Ming-yu Pan:
Security situational awareness of power information networks based on machine learning algorithms.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.