Search Results - "Lang, Bo"
-
1
Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey
Published in Applied sciences (01-10-2019)“…Networks play important roles in modern life, and cyber security has become a vital research area. An intrusion detection system (IDS) which is an important…”
Get full text
Journal Article -
2
Query-Adaptive Reciprocal Hash Tables for Nearest Neighbor Search
Published in IEEE transactions on image processing (01-02-2016)“…Recent years have witnessed the success of binary hashing techniques in approximate nearest neighbor search. In practice, multiple hash tables are usually…”
Get full text
Journal Article -
3
Query-Adaptive Hash Code Ranking for Large-Scale Multi-View Visual Search
Published in IEEE transactions on image processing (01-10-2016)“…Hash-based nearest neighbor search has become attractive in many applications. However, the quantization in hashing usually degenerates the discriminative…”
Get full text
Journal Article -
4
GIGAN: Self‐supervised GAN for generating the invisible using cycle transformation and conditional normalization
Published in IET image processing (01-07-2023)“…Objects in a real scene often occlude each other and inferring a complete appearance from the visible part is an important and challenging task. In this paper,…”
Get full text
Journal Article -
5
The AP2/ERF transcription factor MdDREB2A regulates nitrogen utilisation and sucrose transport under drought stress
Published in Plant, cell and environment (01-05-2024)“…Drought stress is one of the main environmental factors limiting plant growth and development. Plants adapt to changing soil moisture by modifying root…”
Get full text
Journal Article -
6
Trichoderma harzianum Cellulase Gene thph2 Affects Trichoderma Root Colonization and Induces Resistance to Southern Leaf Blight in Maize
Published in Journal of fungi (Basel) (04-12-2023)“…, widely distributed all over the world, is commonly found in soil and root ecosystems. It is a group comprising beneficial fungi that improve plant disease…”
Get full text
Journal Article -
7
Collaborative Hashing
Published in 2014 IEEE Conference on Computer Vision and Pattern Recognition (01-06-2014)“…Hashing technique has become a promising approach for fast similarity search. Most of existing hashing research pursue the binary codes for the same type of…”
Get full text
Conference Proceeding -
8
Designing synthetic consortia of Trichoderma strains that improve antagonistic activities against pathogens and cucumber seedling growth
Published in Microbial cell factories (11-11-2022)“…Abstract Background Trichoderma spp. are important agricultural biocontrol microorganisms that are often used as effective components of microbial fungicides…”
Get full text
Journal Article -
9
Centered Weight Normalization in Accelerating Training of Deep Neural Networks
Published in 2017 IEEE International Conference on Computer Vision (ICCV) (01-10-2017)“…Training deep neural networks is difficult for the pathological curvature problem. Re-parameterization is an effective way to relieve the problem by learning…”
Get full text
Conference Proceeding -
10
Discovering communities based on mention distance
Published in Scientometrics (01-03-2021)“…Scholarly community detection has important applications in various fields. Current studies rely heavily on structured scholar networks, which have high…”
Get full text
Journal Article -
11
Esophageal Candidiasis
Published in Indian journal of surgery (01-08-2023)“…Esophageal candidiasis is a common opportunistic infection in immunocompromised hosts. Here, we report an aged man receiving long-term treatment with…”
Get full text
Journal Article -
12
Rh-Catalyzed Reactions of 3-Diazoindolin-2-imines: Synthesis of Pyridoindoles and Tetrahydrofuropyrroloindoles
Published in Organic letters (18-09-2015)“…The rhodium-catalyzed reactions of 3-diazoindolin-2-imines with furans and dihydrofuran furnished 9H-pyrido[2,3-b]indoles and…”
Get full text
Journal Article -
13
Structure Sensitive Hashing With Adaptive Product Quantization
Published in IEEE transactions on cybernetics (01-10-2016)“…Hashing has been proved as an attractive solution to approximate nearest neighbor search, owing to its theoretical guarantee and computational efficiency…”
Get full text
Journal Article -
14
Fused expression of Sm1-Chit42 proteins for synergistic mycoparasitic response of Trichoderma afroharzianum on Botrytis cinerea
Published in Microbial cell factories (17-08-2023)“…Abstract Sm1 and Chit42 of Trichoderma have been universally confirmed as crucial biocontrol factors against pathogen infection through induced resistance and…”
Get full text
Journal Article -
15
Measuring Similarity of Dual-Modal Academic Data Based on Multi-Fusion Representation Learning
Published in IEEE access (2024)“…Nowadays, academic materials such as articles, patents, lecture notes, and observation records often use both texts and images (i.e., dual-modal data) to…”
Get full text
Journal Article -
16
A Variable-Order Dynamic Constitutive Model for Clay Based on the Fractional Calculus
Published in Applied sciences (01-07-2022)“…To accurately describe the deformation characteristics of clay under long-term cyclic load, based on fractional calculus theory, elastoplastic theory and the…”
Get full text
Journal Article -
17
Comparative Efficacy of Micro-Needle-Knife Therapy and Acupuncture in Acute Ankle Sprains: A Randomized Controlled Trial
Published in Medical science monitor (25-05-2024)“…BACKGROUND Micro-needle knife (MNK) therapy releases the superficial fascia to alleviate pain and improve joint function in patients with acute ankle sprains…”
Get full text
Journal Article -
18
Detection of Algorithmically Generated Malicious Domain Names with Feature Fusion of Meaningful Word Segmentation and N-Gram Sequences
Published in Applied sciences (01-04-2023)“…Domain generation algorithms (DGAs) play an important role in network attacks and can be mainly divided into two types: dictionary-based and character-based…”
Get full text
Journal Article -
19
Large-Scale Unsupervised Hashing with Shared Structure Learning
Published in IEEE transactions on cybernetics (01-09-2015)“…Hashing methods are effective in generating compact binary signatures for images and videos. This paper addresses an important open issue in the literature,…”
Get full text
Journal Article -
20
DAG: Dual Attention Graph Representation Learning for Node Classification
Published in Mathematics (Basel) (01-09-2023)“…Transformer-based graph neural networks have accomplished notable achievements by utilizing the self-attention mechanism for message passing in various…”
Get full text
Journal Article