Search Results - "Li, Wenfa"

Refine Results
  1. 1

    Automatic analysis of DIFC systems using noninterference with declassification by Li, Wenfa, Yang, Zhi, Liu, Jia

    Published in Neural computing & applications (01-06-2022)
    “…Information flow control (IFC) can effectively resist Trojans and viruses that steal information from systems, and is usually adopted to protect the…”
    Get full text
    Journal Article
  2. 2

    High Speed and Accuracy of Animation 3D Pose Recognition Based on an Improved Deep Convolution Neural Network by Ding, Wei, Li, Wenfa

    Published in Applied sciences (01-06-2023)
    “…Pose recognition in character animations is an important avenue of research in computer graphics. However, the current use of traditional artificial…”
    Get full text
    Journal Article
  3. 3

    Supporting Regularized Logistic Regression Privately and Efficiently by Li, Wenfa, Liu, Hongzhe, Yang, Peng, Xie, Wei

    Published in PloS one (06-06-2016)
    “…As one of the most popular statistical and machine learning models, logistic regression with regularization has found wide adoption in biomedicine, social…”
    Get full text
    Journal Article
  4. 4

    Stance Detection of Microblog Text Based on Two-Channel CNN-GRU Fusion Network by Li, Wenfa, Xu, Yilong, Wang, Gongming

    Published in IEEE access (2019)
    “…In recent years, stance detection has become an important topic in the field of natural language processing. In earlier work, researchers have used feature…”
    Get full text
    Journal Article
  5. 5

    Tenant-Led Ciphertext Information Flow Control for Cloud Virtual Machines by Zhang, Zhao, Yang, Zhi, Du, Xuehui, Li, Wenfa, Chen, Xingyuan, Sun, Lei

    Published in IEEE access (2021)
    “…When users upload their private data to the cloud, they lose control of the data stored in the cloud server. If the cloud system cannot provide an effective…”
    Get full text
    Journal Article
  6. 6

    Clustering algorithm for audio signals based on the sequential Psim matrix and Tabu Search by Li, Wenfa, Wang, Gongming, Li, Ke

    “…Audio signals are a type of high-dimensional data, and their clustering is critical. However, distance calculation failures, inefficient index trees, and…”
    Get full text
    Journal Article
  7. 7

    A review of research on co‐training by Ning, Xin, Wang, Xinran, Xu, Shaohui, Cai, Weiwei, Zhang, Liping, Yu, Lina, Li, Wenfa

    Published in Concurrency and computation (15-08-2023)
    “…Summary Co‐training algorithm is one of the main methods of semi‐supervised learning in machine learning, which explores the effective information in unlabeled…”
    Get full text
    Journal Article
  8. 8

    Overexpression of lncRNA SLC26A4‐AS1 inhibits papillary thyroid carcinoma progression through recruiting ETS1 to promote ITPR1‐mediated autophagy by Peng, Dong, Li, Wenfa, Zhang, Bojuan, Liu, Xuefen

    Published in Journal of cellular and molecular medicine (01-09-2021)
    “…Papillary thyroid carcinoma (PTC), accounting for approximately 85% cases of thyroid cancer, is a common endocrine tumour with a relatively low mortality but…”
    Get full text
    Journal Article
  9. 9

    Recent advances in 3D object detection based on RGB-D: A survey by Wang, Yangfan, Wang, Chen, Long, Peng, Gu, Yuzong, Li, Wenfa

    Published in Displays (01-12-2021)
    “…•There exist few surveys on this filed, covering only existing methods in a specific domain, and since 3D object detection is growing rapidly, it lacks the…”
    Get full text
    Journal Article
  10. 10

    A new object detection method for object deviating from center or multi object crowding by Liang, Yubo, Wang, Gongming, Li, Wenfa, He, Yuzhe, Liang, Xiaoming

    Published in Displays (01-09-2021)
    “…•Proposing an object detection method for object deviating from center or multi object crowding.•The functions of PA-FPN, FreeAnchor and Soft-NMS are…”
    Get full text
    Journal Article
  11. 11

    HMMs based masquerade detection for network security on with parallel computing by Liu, Jia, Duan, Miyi, Li, Wenfa, Tian, Xinguang

    Published in Computer communications (15-04-2020)
    “…Masquerade detection is currently an active research topic in the field of network security. This paper presents a novel method for detecting masquerade…”
    Get full text
    Journal Article
  12. 12

    VT‐NeRF: Neural radiance field with a vertex‐texture latent code for high‐fidelity dynamic human‐body rendering by Hao, Fengyu, Shang, Xinna, Li, Wenfa, Zhang, Liping, Lu, Baoli

    Published in IET computer vision (22-03-2023)
    “…Abstract The fusion of a human prior with neural rendering techniques has recently emerged as one of the most promising approaches to processing dynamic…”
    Get full text
    Journal Article
  13. 13
  14. 14

    Multi‐angle head pose classification with masks based on color texture analysis and stack generalization by Li, Shuang, Dong, Xiaoli, Shi, Yuan, Lu, Baoli, Sun, Linjun, Li, Wenfa

    Published in Concurrency and computation (15-08-2023)
    “…Summary Head pose classification is an important part of the preprocessing process of face recognition, which can independently solve application problems…”
    Get full text
    Journal Article
  15. 15

    Towards Automated Measurement of As-Built Components Using Computer Vision by Perez, Husein, Tah, Joseph H. M.

    Published in Sensors (Basel, Switzerland) (01-08-2023)
    “…Regular inspections during construction work ensure that the completed work aligns with the plans and specifications and that it is within the planned time and…”
    Get full text
    Journal Article
  16. 16

    Papaverine Perfusion via the Aortic Root before Heart Re-beating Alleviates Myocardial Injury after Heart Valve Replacement by Li, Wenfa, Jiao, Cailing, Lai, Dengxiang, Wu, Di, You, Zuyuan, Feng, Lin, Wu, Xiaoping, Zhang, Jianrong

    Published in Archives of medical research (01-05-2021)
    “…Myocardial injury is inevitable during cardiac surgical procedures and reducing myocardial injury in patients with CPB surgery is the focus of current…”
    Get full text
    Journal Article
  17. 17

    FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy by Yang, Zhi, Yuan, Zhanhui, Jin, Shuyuan, Chen, Xingyuan, Sun, Lei, Du, Xuehui, Li, Wenfa, Zhang, Hongqi

    “…Despite the demonstrated effectiveness of dynamic taint analysis (DTA) in a variety of security applications, the poor performance achieved by available DTA…”
    Get full text
    Conference Proceeding
  18. 18

    A Noninterference Model for Mobile OS Information Flow Control and Its Policy Verification by Yuan, Zhanhui, Li, Wenfa, Yang, Zhi, Sun, Lei, Du, Xuehui, Zhang, Hongqi

    “…Mobile operating systems such as Android are facing serious security risk. First, they have a large number of users and store a large number of users’ private…”
    Get full text
    Journal Article
  19. 19

    Network anomaly detection based on MRMHC-SVM algorithm by Wenfa Li, Miyi Duan, You Chen

    “…Network anomaly detection is the major direction of research in intrusion detection. Aiming at some problems, which include high false alarm rate, difficulties…”
    Get full text
    Conference Proceeding
  20. 20

    High-Resolution representation object pose estimation from monocular images by Guan, Qi, Li, Wenfa, Xue, Shibei, Li, Dewei

    Published in 2021 China Automation Congress (CAC) (22-10-2021)
    “…This paper addresses the 6D challenge of monocular 6D pose estimation on small targets and weak texture objects. We propose a monocular object pose estimation…”
    Get full text
    Conference Proceeding