Search Results - "Gu, Junkai"

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Dynamic Wide and Deep Neural Network for Hyperspectral Image Classification by Xi, Jiangbo, Cong, Ming, Ersoy, Okan K., Zou, Weibao, Zhao, Chaoying, Li, Zhenhong, Gu, Junkai, Wu, Tianjun

    Published in Remote sensing (Basel, Switzerland) (01-07-2021)
    “…Recently, deep learning has been successfully and widely used in hyperspectral image (HSI) classification. Considering the difficulty of acquiring HSIs, there…”
    Get full text
    Journal Article
  2. 2

    Space Debris Detection Using Feature Learning of Candidate Regions in Optical Image Sequences by Xi, Jiangbo, Xiang, Yaobing, Ersoy, Okan K., Cong, Ming, Wei, Xin, Gu, Junkai

    Published in IEEE access (01-01-2020)
    “…Space debris detection is important in space situation awareness and space asset protection. In this paper, we propose a method to detect space debris using…”
    Get full text
    Journal Article
  3. 3

    Enhanced shuffle attention network based on visual working mechanism for high-resolution remote sensing image classification by Cong, Ming, Cui, Jianjun, Chen, Siliang, Wang, Yihui, Han, Ling, Xi, Jiangbo, Gu, Junkai, Zhang, Qingfang, Tao, Yiting, Wang, Zhiye, Xu, Miaozhong, Deng, Hong

    Published in Geocarto international (13-12-2022)
    “…High-resolution remote sensing images provide complete and detailed ground scenes. However, these complex and diverse details make it difficult to interpret…”
    Get full text
    Journal Article
  4. 4

    Multi-resolution classification network for high-resolution UAV remote sensing images by Cong, Ming, Xi, Jiangbo, Han, Ling, Gu, Junkai, Yang, Ligong, Tao, Yiting, Xu, Miaozhong

    Published in Geocarto international (03-06-2022)
    “…High-resolution unmanned aerial vehicle (UAV) remote sensing images have super-high ground resolution. Although they provide complete and detailed surface…”
    Get full text
    Journal Article
  5. 5

    A Secure Bootstrap Based on Trusted Computing by Junkai Gu, Weiyong Ji

    “…A secure bootstrap is critical to boot operating system kernel into a trusted state. This paper presents an approach for the secure bootstrap based on trusted…”
    Get full text
    Conference Proceeding
  6. 6

    A MetaModel Approach for WorkFlow Modeling Based On Event B by JianXiong Wang, Junkai Gu

    “…We proposed a MetaModel approach in modeling and analysis of workflow based on event B. A workflow model is divided into three aspects: the promotion of…”
    Get full text
    Conference Proceeding
  7. 7

    An Approach for Sensitive Binary File Protection by Gu Junkai, Ji Weiyong

    “…When a host computer is attacked, files in the host computer are more or less unauthorizedly modified so as to achieve attacker's goal. Based on trusted…”
    Get full text
    Conference Proceeding
  8. 8

    Algebra Process Approach for Accessing Control Compatibility Analysis of Web Service by Gu JunKai, Han Ling, Wang Bo

    “…Web services compatibility states the fitness of SOA application in which service peers that interact with each other. How ever, most approaches deal with the…”
    Get full text
    Conference Proceeding