Search For:

Displaying 1-50 out of 54 total
Multiple clustered instance learning for histopathology cancer image classification, segmentation and clustering
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Yan Xu, Jun-Yan Zhu,E. Chang, Zhuowen Tu
Issue Date:June 2012
pp. 964-971
Cancer tissues in histopathology images exhibit abnormal patterns; it is of great clinical importance to label a histopathology image as having cancerous regions or not and perform the corresponding image segmentation. However, the detailed annotation of c...
 
Research on propagation of trust and distrust by means of co-citation
Found in: International Conference on Services Systems and Services Management
By Yan Zhu, Yan Li, Yanfei Ren
Issue Date:June 2009
pp. 943-948
The prosperous development of the customer to customer business has made trust and distrust salient. In this background, a key question is how trust and distrust propagate themselves among people who do not have previous interactions with each other, yet l...
 
Comparison study and evaluation of overlay multicast networks
Found in: Multimedia and Expo, IEEE International Conference on
By Yan Zhu, Min-You Wu, Wei Shu
Issue Date:July 2003
pp. 493-496
In contrast to one-to-one unicast transmission, multicast provides a one-to-many transmission paradigm. The overlay multicast has drawn a lot of attention as an alternative to IP multicast. In this paper, we compare four typical implementations of overlay ...
 
Modeling and Simulation of Modular Hybrid Electric Tactical Vehicle
Found in: Intelligent Computation Technology and Automation, International Conference on
By Sun Yan,Zhu Shishun,Luo Sujun,Zhu Daowei,Xiao Hui,Yang Gang
Issue Date:March 2011
pp. 834-837
Owing to large power surplus of the conventional tactical vehicles, the modular hybrid time-driven system was proposed. Modular hybrid drive tactical vehicle simulation model was created on the software ADVISOR2002, which realizes the simulation of the tra...
 
On the Simulation Using the Movement Model of Japanese Radio Calisthenics
Found in: 2013 Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)
By Kazuo Hemmi,Yan Zhu
Issue Date:December 2013
pp. 533-538
This paper describes how to construct the whole body movements model of Japanese Radio Calisthenics, that is able to calculate the joint positions of a body from the less parameters. In order to get the actual data for building the movement model, we did e...
 
A New Model for Reliable and Secure Multicast
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Yongkai Zhou,Yi Yuan,Yan Zhu,Fangbiao Li,Xiao Che,Zhi Xue
Issue Date:June 2013
pp. 1620-1623
In computer network, multicast is an efficient scheme for one-to-many and many-to-many communication. Although research on multicast has begun as early as the rise of Internet, multicast is still not widely deployed in the current backbone Internet. With t...
 
Secure Communication for a Class of Broadcast Channel with Feedback
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Xinxing Yin,Xiao Chen,Zhi Xue,Yan Zhu,Fangbiao Li
Issue Date:June 2013
pp. 1549-1552
This paper investigates the secure data transmission in the broadcast channel with noiseless feedback by using the information-theoretic method. We consider transmitting a private message and a common message to two receivers, of which the common message i...
 
Research on the Security of MISO Wireless Channel with Artificial Noise
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Xiao Chen,Fangbiao Li,Zhi Xue,Yan Zhu,Xinxing Yin,Yongkai Zhou,Liang Pang
Issue Date:June 2013
pp. 1533-1536
Security is an important issue in the field of wireless communication. In this paper, the security problem of Multiple-inputs Single-output (MISO) wireless channel is considered. To ensure the security of communication, the transmitter utilizes some of the...
 
Maximizing the Secrecy Rate of Wiretap Channel via DF-Based Cooperative Scheme
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Fangbiao Li,Yan Zhu,Xiao Chen,Zhi Xue,Xinxing Yin
Issue Date:June 2013
pp. 1475-1478
This paper addresses the physical layer security of a two-hop decode-and-forward (DF) wireless relay network in the presence of several eavesdroppers. The wiretap channel model consists of a source, several eavesdroppers, couples of trusted relays and a de...
 
Research on Secrecy Communication via Bilateral Artificial Noise Transmitting
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Yan Zhu,Xiao Chen,Fangbiao Li,Yongkai Zhou,Xinxing Yin,Liang Pang,Zhi Xue
Issue Date:June 2013
pp. 218-220
The problem that we consider is the secrecy communication in bilateral transmitting scenario. The model is connected via wireless signal between two points: the transmitter and the receiver. We assume that the transmitter has a single transmit antenna whil...
 
Dynamic Audit Services for Outsourced Storages in Clouds
Found in: IEEE Transactions on Services Computing
By Yan Zhu, Gail-Joon Ahn, Hongxin Hu,S. S. Yau,H. G. An, Chang-Jun Hu
Issue Date:April 2013
pp. 227-238
In this paper, we propose a dynamic audit service for verifying the integrity of an untrusted and outsourced storage. Our audit service is constructed based on the techniques, fragment structure, random sampling, and index-hash table, supporting provable u...
 
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing
Found in: IEEE Transactions on Dependable and Secure Computing
By Di Ma,N. Saxena, Tuo Xiang, Yan Zhu
Issue Date:March 2013
pp. 57-69
In this paper, we report on a new approach for enhancing security and privacy in certain RFID applications whereby location or location-related information (such as speed) can serve as a legitimate access context. Examples of these applications include acc...
 
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yan Zhu,Hongxin Hu,Gail-Joon Ahn,Mengyang Yu
Issue Date:December 2012
pp. 2231-2244
Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migr...
 
Research on the Multiple-Input Single-Output Channel under Attack
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Yan Zhu,Xiao Chen,Zhi Xue,Fangbiao Li,Jie Gu
Issue Date:August 2012
pp. 973-976
The problem we consider is the security communication in MISO (Multiple-input Single-output) scenario. The scenario is connected via wireless signal between two points: the transmitter and the receiver. We assume that transmitter has multiple antennas whil...
 
Security in Single-Input Single-Output Multiple-helpers Wireless Channel
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Xiao Chen,Yan Zhu,Zhi Xue,Fangbiao Li,Jie Gu
Issue Date:August 2012
pp. 969-972
Security is an important issue in the field of wireless communication. In this paper, the security problem of Single-input Single-output Multiple-helpers (SISOMH) wireless channel is considered. The SISOMH wireless channel, where artificial noise is utiliz...
 
Secure Data Retrieval of Outsourced Data with Complex Query Support
Found in: 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops)
By Yan Zhu,Di Ma,Shanbiao Wang
Issue Date:June 2012
pp. 481-490
The ability to efficiently retrieve data in their encrypted form is important for the cloud to become a truly secure and practical data sharing platform. Although this field has attracted tremendous research attention in the past a few years, most existing...
 
Unsupervised object class discovery via saliency-guided multiple class learning
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Jun-Yan Zhu, Jiajun Wu, Yichen Wei,Eric Chang, Zhuowen Tu
Issue Date:June 2012
pp. 3218-3225
Discovering object classes from images in a fully unsupervised way is an intrinsically ambiguous task; saliency detection approaches however ease the burden on unsupervised learning. We develop an algorithm for simultaneously localizing objects and discove...
 
Text Clustering via Constrained Nonnegative Matrix Factorization
Found in: Data Mining, IEEE International Conference on
By Yan Zhu,Liping Jing,Jian Yu
Issue Date:December 2011
pp. 1278-1283
Semi-supervised nonnegative matrix factorization (NMF)receives more and more attention in text mining field. The semi-supervised NMF methods can be divided into two types, one is based on the explicit category labels, the other is based on the pair wise co...
 
The Effects of Innovation Alliance on Network Structure and Association Rules
Found in: International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing
By Fei Shengnan,Zhou Wen,Liu Zongtian,Zhao Yan,Zhu Ying,Lu Xiaolong
Issue Date:October 2011
pp. 479-482
Social network structure affects the spread and penetration of information, thus to a large extent is advantageous to the promotion of knowledge innovation. This paper analyzes the network structure of the alliance network among Chinese enterprises, and th...
 
Analysis of Fault Signal in Aircraft Power System Based on Hilbert-Huang Transform
Found in: Information Technology, Computer Engineering and Management Sciences, International Conference of
By Wei Fu,Yan Zhu
Issue Date:September 2011
pp. 115-118
In order to solve the fault transient signal extracting and analysis problem in aircraft power system, Hilbert-Huang Transform (HHT) is used in this paper. The complicated signal can be decomposed into a finite Intrinsic Mode Functions (IMF) by the Empiric...
 
Harmonic and Inter-harmonic Signal Analysis Based on Hilbert-Huang Transform
Found in: Digital Manufacturing and Automation, International Conference on
By Wei Fu,Yan Zhu
Issue Date:August 2011
pp. 572-575
Because of the extensive appLication of the non-Linear electrical equipment, aircraft power system contains a number of harmonic and inter-harmonic components. Aiming at the situation that Fourier transform and wavelet transform method could not effectivel...
 
A fine-grained component-level power measurement method
Found in: International Green Computing Conference and Workshops
By Zehan Cui, Yan Zhu, Yungang Bao, Mingyu Chen
Issue Date:July 2011
pp. 1-6
The ever growing energy consumption of computer systems have become a more and more serious problem in the past few years. Power profiling is a fundamental way for us to better understand where, when and how energy is consumed. This paper presents a direct...
 
An Improved Graph-Based Image Segmentation Algorithm and Its GPU Acceleration
Found in: Digital Media and Digital Content Management, Workshop on
By Wenjuan Feng, Hui Xiang, Yan Zhu
Issue Date:May 2011
pp. 237-241
The paper proposes an improved graph-based image segmentation algorithm. We introduce a new merging mechanism based on minimum region size. The mechanism not only limits the minimum region size but also avoids very large regions which may cause over-mergin...
 
A Web Service QoS Prediction Approach Based on Collaborative Filtering
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Zhang Li, Zhang Bin, Liu Ying, Gao Yan, Zhu Zhi-Liang
Issue Date:December 2010
pp. 725-731
With the increasing numbers of Web services and service users on World Wide Web, predicting QoS( Quality of Service ) for users will greatly aid service selection and discovery. Due to the different backgrounds and experiences of users, they have different...
 
Research of Improving the Accuracy of License Plate Character Segmentation
Found in: Frontier of Computer Science and Technology, Japan-China Joint Workshop on
By Shuang Qiao, Yan Zhu, Xiufen Li, Taihui Liu, Baoxue Zhang
Issue Date:August 2010
pp. 489-493
In order to improve the accuracy of license plate character segmentation, this paper strengthens preprocessings before segmentation. In character binarization, use improved Bernsen method to reduce noise interference; use line-shape filter to remove plate ...
 
Empirically Analyzing the Necessity of EICMM Ranking by Clustering
Found in: Computational Sciences and Optimization, International Joint Conference on
By Hui Ma, Yiping Yang, Yan Zhu, Mingxia Zhao
Issue Date:May 2010
pp. 219-224
In this paper, the necessity of ranking of the enterprise’s informatization capacity maturity is researched on the basis of EICMM (Enterprise Informatization Capacity Maturity Model). Based on the EICMM, we adopt the proper method (Cluster Analytical Metho...
 
Initializing K-means Clustering Using Affinity Propagation
Found in: Hybrid Intelligent Systems, International Conference on
By Yan Zhu, Jian Yu, Caiyan Jia
Issue Date:August 2009
pp. 338-343
K-means clustering is widely used due to its fast convergence, but it is sensitive to the initial condition.Therefore, many methods of initializing K-means clustering have been proposed in the literatures. Compared with Kmeans clustering, a novel clusterin...
 
Intrusion Alerts Correlation Model Based on XSWRL Ontology
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Wan Li, Yan Zhu, Shengfeng Tian
Issue Date:December 2008
pp. 894-898
We propose a hierarchical compound alert correlation knowledge model which combines prerequisites and consequences of attacks and predefined attack scenarios, and introduces hierarchy to view security information from different levels. The model includes b...
 
A Novel Method to Calculate Sample Weights for FCM Regression
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Yan Zhu, Jian Yu
Issue Date:October 2008
pp. 151-156
Regression is an important prediction method to establish models between variables. The primitive regression algorithms ignore the sample weights, and consider all samples play an equal role in regression. But this kind of algorithms often loses efficacy w...
 
Containment and Equivalence of Active XML Documents
Found in: Computing, Communication, Control and Management, ISECS International Colloquium on
By Yan Zhu
Issue Date:August 2008
pp. 590-594
An Active XML (AXML for short) document is an XML document where some of the data is given explicitly and other parts are defined only intensionally by means of embedded calls to Web services. By introducing intensional data, it brings much more flexibilit...
 
A Content-Based Algorithm for Blog Ranking
Found in: International Conference on Internet Computing in Science and Engineering
By Jie Shen, Yan Zhu, Hui Zhang, Chen Chen, Rongshuang Sun, Fayan Xu
Issue Date:January 2008
pp. 19-22
Due to the different structure and content character of blogs, the traditional ranking algorithm of web page turns to be insufficient. To solve this problem, a novel ranking algorithm of blog is presented. The algorithm considers both the link analysis and...
 
Understanding the Impact of Interference on Collaborative Relays
Found in: IEEE Transactions on Mobile Computing
By Yan Zhu, Haitao Zheng
Issue Date:June 2008
pp. 724-736
Collaborative relays achieve the benefits of spatial diversity without requiring any physical antenna arrays at wireless devices. While many studies have demonstrated its effectiveness in a single source-destination system, applying cooperative relays to l...
 
Topic-Oriented Search Model Based on Multi-Agent
Found in: Computational Intelligence and Security, International Conference on
By Jie Shen, Rong-shuang Sun, Liu-hua Wei, Hui Zhang, Yan Zhu, Chen Chen
Issue Date:December 2007
pp. 276-280
The users' retrieval words are distinguished, judged, and classified by utilizing the intelligence character of agent, and the concept of topic derivation is introduced. Some subtopics, which are derived from the known topic, are submitted to the Agent for...
 
Automatic Website Comprehensibility Evaluation
Found in: Web Intelligence, IEEE / WIC / ACM International Conference on
By Ping Yan, Zhu Zhang, Ray Garcia
Issue Date:November 2007
pp. 191-197
The Web provides easy access to a vast amount of informational content to the average person, who may often be interested in selecting websites that best match their learning objectives and comprehensibility level. Web content is generally not tagged for e...
 
Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain
Found in: Information Assurance and Security, International Symposium on
By Yan Zhu, Chang-Tsun Li, Hong-Jia Zhao
Issue Date:August 2007
pp. 478-483
In this paper, a novel semi-fragile authentication scheme based on block-mean quantization in the wavelet domain is proposed for image authentication. The scheme is composed of a structural digital signature process and a semi-fragile watermarking/ fingerp...
 
A Secure Hierarchical Fragile Watermarking Method with Tamper Localization
Found in: Computer and Computational Sciences, International Multi-Symposiums on
By Xianhai Zhang, Yongtian Yang, Yan Zhu
Issue Date:June 2006
pp. 69-74
Several image authentication schemes are either vulnerable to attacks or sacrifice localization accuracy to improve security. In this paper, we proposed a scheme that not only thwarts all kinds of attacks such as vector quantization(VQ) and oracle attack i...
 
Approaches to Establishing Multicast Overlays
Found in: Services Computing, IEEE International Conference on
By Yan Zhu, Wei Shu, Min-You Wu
Issue Date:July 2005
pp. 268-269
<p>In the past a few years, provision of an Internet-scale multicast with the use of application-level routing components has generated a lots of interests both within the research community and in the commercial world [1], [2], [3], [4]. Overlay Mul...
 
Evaluating and Selecting Web Sources as External Information Resources of a Data Warehouse
Found in: Web Information Systems Engineering, International Conference on
By Yan Zhu, Alejandro Buchmann
Issue Date:December 2002
pp. 149
A company?s local data often is not sufficient to analyze market trends and make reasonable business plans. Decision making must also be based on information from suppliers, partners and competitors. Systematically integrating suitable external data from t...
 
Data Transformation for Warehousing Web Data
Found in: Advanced Issues of E-Commerce and Web-Based Information Systems, International Workshop on
By Yan Zhu, Christof Bornhövd, Alejandro P. Buchmann
Issue Date:June 2001
pp. 0074
Abstract: In order to analyze market trends and make reasonable business plans, a company's local data is not sufficient. Decision making must also be based on information from suppliers, partners and competitors. This external data can be obtained from th...
 
From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services
Found in: IEEE Transactions on Services Computing
By Yan Zhu,Dijiang Huang,Changjyun Hu,Xin Wang
Issue Date:February 2015
pp. 1
This paper addresses how to construct an RBAC-compatible attribute-based data access control for cloud storage service to provide a user-friendly and easy-to-manage secure Attribute-Based Access Control (ABAC) mechanism. Similar to role hierarchies in RBAC...
 
Integrated Network Service to Enhance Multicast Communication
Found in: 2013 IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC)
By Yongkai Zhou,Pengze Guo,Yan Zhu,Zhi Xue,Jianhua Li,Yi Yuan
Issue Date:December 2013
pp. 107-110
One of the features of the Software Defined Network (SDN) is to integrate network service into the network layer to better support the application and alleviate the burden of client-server end. Multicast as an efficient communication method, it can be expl...
 
Design and Practice of QD2702 Drive Cover Horizontal Three Surface Combination Drilling
Found in: 2013 Fourth International Conference on Digital Manufacturing & Automation (ICDMA)
By Chen Yan,Zhu Feng
Issue Date:June 2013
pp. 436-440
On the analysis of process diagram, this paper introduces the design of QD2702 starter drive cover horizontal three surface combination drilling machine and points out design method and design process of the general modular machine. In practice, the applic...
 
The Realization of Agriculture Model Component Sharing through Topic Map Merging
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Haiyan Jiang, Mei Zhang, Bing Fu, Yan Zhu, Weixin Cao
Issue Date:February 2011
pp. 650-654
The study on the agriculture model component information resources sharing mode is the basis for the retrieval and management of the agriculture model components in the distributed environment. This study proposed a new approach to use topic map matching a...
 
Research on the Evaluation Method for Enterprise Knowledge Management Performance Based on Triangular Fuzzy Number
Found in: International Conference on E-Business and E-Government
By Xing-Yan Zhu,Ying-Liang Wu
Issue Date:May 2010
pp. 1911-1914
To evaluate exactly the performance of knowledge management (KM) is an important part of the construction of enterprise knowledge management systems. Based on enterprise capital, a performance evaluation index system has designed by using intellectual capi...
 
Collusion secure convolutional fingerprinting information codes
Found in: Proceedings of the 2006 ACM Symposium on Information, computer and communications security (ASIACCS '06)
By Wei Zou, Xinshan Zhu, Yan Zhu
Issue Date:March 2006
pp. 266-274
Digital Fingerprinting is a technique for the merchant who can embed unique buyer identity marks into digital media copy, and also makes it possible to identify "traitors" who redistribute their illegal copies. At present, the fingerprinting scheme general...
     
Image-adaptive watermarking based on perceptually shaping watermark blockwise
Found in: Proceedings of the 2006 ACM Symposium on Information, computer and communications security (ASIACCS '06)
By Xinshan Zhu, Yan Zhu, Yong Gao
Issue Date:March 2006
pp. 175-181
In a general additive watermarking model, a watermark signal is perceptually shaped and scaled with a global gain factor before embedding. This paper presents a new image-adaptive watermarking scheme based on perceptually shaping watermark blockwise. Inste...
     
Development of Growth Model-Based Decision Support System for Crop Management
Found in: Plant Growth Modeling and Applications, International Symposium on
By Weixing Cao, Liang Tang, Yan Zhu, Jie Pan, Weiguo Li, Binling Chen
Issue Date:November 2006
pp. 181-184
Growth model-based decision support system for crop management (GMDSSCM) was developed including process based models of 4 different crops, i.e. wheat, rice, rapeseed and cotton. This system aims in facilitating simulation and application of crop models fo...
 
Enabling secure location-based services in mobile cloud computing
Found in: Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing (MCC '13)
By Changjun Hu, Di Ma, Dijiang Huang, Yan Zhu
Issue Date:August 2013
pp. 27-32
The increasing spread of location-based services (LBSs) has led to a renewed research interest in the security of services. To ensure the credibility and availability of LBSs, there is a pressing requirement for addressing access control, authentication an...
     
Dynamic audit services for integrity verification of outsourced storages in clouds
Found in: Proceedings of the 2011 ACM Symposium on Applied Computing (SAC '11)
By Gail-Joon Ahn, Hongxin Hu, Huaixi Wang, Stephen S. Yau, Yan Zhu, Zexing Hu
Issue Date:March 2011
pp. 1550-1557
In this paper, we propose a dynamic audit service for verifying the integrity of an untrusted and outsourced storage. Our audit service is constructed based on the techniques, fragment structure, random sampling and index-hash table, supporting provable up...
     
Efficient provable data possession for hybrid clouds
Found in: Proceedings of the 17th ACM conference on Computer and communications security (CCS '10)
By Gail-Joon Ahn, Hongxin Hu, Huaixi Wang, Stephen S. Yau, Yan Zhu, Zexing Hu
Issue Date:October 2010
pp. 756-758
Provable data possession is a technique for ensuring the integrity of data in outsourcing storage service. In this paper, we propose a cooperative provable data possession scheme in hybrid clouds to support scalability of service and data migration, in whi...
     
 1  2 Next >>