Search Results - "Gu, Junkai"
-
1
Dynamic Wide and Deep Neural Network for Hyperspectral Image Classification
Published in Remote sensing (Basel, Switzerland) (01-07-2021)“…Recently, deep learning has been successfully and widely used in hyperspectral image (HSI) classification. Considering the difficulty of acquiring HSIs, there…”
Get full text
Journal Article -
2
Space Debris Detection Using Feature Learning of Candidate Regions in Optical Image Sequences
Published in IEEE access (01-01-2020)“…Space debris detection is important in space situation awareness and space asset protection. In this paper, we propose a method to detect space debris using…”
Get full text
Journal Article -
3
Enhanced shuffle attention network based on visual working mechanism for high-resolution remote sensing image classification
Published in Geocarto international (13-12-2022)“…High-resolution remote sensing images provide complete and detailed ground scenes. However, these complex and diverse details make it difficult to interpret…”
Get full text
Journal Article -
4
Multi-resolution classification network for high-resolution UAV remote sensing images
Published in Geocarto international (03-06-2022)“…High-resolution unmanned aerial vehicle (UAV) remote sensing images have super-high ground resolution. Although they provide complete and detailed surface…”
Get full text
Journal Article -
5
A Secure Bootstrap Based on Trusted Computing
Published in 2009 International Conference on New Trends in Information and Service Science (01-06-2009)“…A secure bootstrap is critical to boot operating system kernel into a trusted state. This paper presents an approach for the secure bootstrap based on trusted…”
Get full text
Conference Proceeding -
6
A MetaModel Approach for WorkFlow Modeling Based On Event B
Published in 2009 International Conference on Management and Service Science (01-09-2009)“…We proposed a MetaModel approach in modeling and analysis of workflow based on event B. A workflow model is divided into three aspects: the promotion of…”
Get full text
Conference Proceeding -
7
An Approach for Sensitive Binary File Protection
Published in 2009 International Forum on Information Technology and Applications (01-05-2009)“…When a host computer is attacked, files in the host computer are more or less unauthorizedly modified so as to achieve attacker's goal. Based on trusted…”
Get full text
Conference Proceeding -
8
Algebra Process Approach for Accessing Control Compatibility Analysis of Web Service
Published in 2011 Fourth International Conference on Intelligent Computation Technology and Automation (01-03-2011)“…Web services compatibility states the fitness of SOA application in which service peers that interact with each other. How ever, most approaches deal with the…”
Get full text
Conference Proceeding