Search Results - "XIA Yamei"

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    An Adaptive Model Filtering Algorithm Based on Grubbs Test in Federated Learning by Yao, Wenbin, Pan, Bangli, Hou, Yingying, Li, Xiaoyong, Xia, Yamei

    Published in Entropy (Basel, Switzerland) (26-04-2023)
    “…Federated learning has been popular for its ability to train centralized models while protecting clients' data privacy. However, federated learning is highly…”
    Get full text
    Journal Article
  2. 2

    A Vehicle Routing Problem Based on Intelligent Batteries Transfer Management for the EV Network by Xia, Yamei, Cheng, Bo

    Published in China communications (01-05-2014)
    “…Batteries transfer management is one important aspect in electric vehicle(EV)network's intelligent operation management system.Batteries transfer is a special…”
    Get full text
    Journal Article
  3. 3

    An energy-efficient load balance strategy based on virtual machine consolidation in cloud environment by Yao, Wenbin, Wang, Zhuqing, Hou, Yingying, Zhu, Xikang, Li, Xiaoyong, Xia, Yamei

    Published in Future generation computer systems (01-09-2023)
    “…In the cloud computing environment, unbalanced utilization of multi-dimensional resources in physical servers generates resource fragmentation, leading to…”
    Get full text
    Journal Article
  4. 4

    Lattice-Based Semantic-Aware Searchable Encryption for Internet of Things by Hou, Yingying, Yao, Wenbin, Li, Xiaoyong, Xia, Yamei, Wang, Mingqing

    Published in IEEE internet of things journal (01-09-2024)
    “…The vigorous development of the Internet of Things (IoT) has generated a massive amount of personal data. How to better protect and use the privacy data of IoT…”
    Get full text
    Journal Article
  5. 5

    Malicious Relay Detection for Tor Network Using Hybrid Multi-Scale CNN-LSTM with Attention by Feng, Qiaozhi, Xia, Yamei, Yao, Wenbin, Lu, Tianbo, Zhang, Xiaoyan

    “…With the widespread use of the Tor network, attackers who control malicious relays pose a serious threat to user privacy. Therefore, identifying malicious…”
    Get full text
    Conference Proceeding
  6. 6

    Logistics allocation service generation method based on real-time information on the vehicle network by Xia, Yamei, Min, Lei

    “…In order to increase the effectiveness of the scheme for the logistics allocation service generation and adapt to the dynamics in the process of logistics…”
    Get full text
    Conference Proceeding
  7. 7

    A low-latency scheduling approach for high-definition video streaming in a heterogeneous wireless network with multihomed clients by Wu, Jiyan, Qiao, Xiuquan, Xia, Yamei, Yuen, Chau, Chen, Junliang

    Published in Multimedia systems (01-07-2015)
    “…We consider the problem of high-definition (HD) video transmission in a heterogeneous wireless network from a video server to a multihomed client. On the one…”
    Get full text
    Journal Article
  8. 8

    CARE: Co-Attention Network for Joint Entity and Relation Extraction by Kong, Wenjun, Xia, Yamei

    Published 23-08-2023
    “…Joint entity and relation extraction is the fundamental task of information extraction, consisting of two subtasks: named entity recognition and relation…”
    Get full text
    Journal Article
  9. 9

    Research on self-training neural machine translation based on monolingual priority sampling by ZHANG Xiaoyan, PANG Lei, DU Xiaofeng, LU Tianbo, XIA Yamei

    Published in Tongxin Xuebao (01-04-2024)
    “…To enhance the performance of neural machine translation (NMT) and ameliorate the detrimental impact of high uncertainty in monolingual data during the…”
    Get full text
    Journal Article
  10. 10

    The ant colony optimization algorithm for web services composition on preference ontology by Xia, Yamei, Liu, Chen, Yang, Zhenggiu, Jiapeng Xiu

    “…The Optimization Algorithm for Web Services Composition on Preference Ontology (OAWSCP) is put forward. OAWSCP, which makes some improvements on primary ACO…”
    Get full text
    Conference Proceeding
  11. 11

    Model design of mass satellite remote sensing data parameters products manufacture system by Jiapeng Xiu, Yang, Zhenggiu, Liu, Chen, Xia, Yamei

    “…To produce more meaningful parameters product based on remote sensing data is becoming the research focus in remote sensing data processing area. Because…”
    Get full text
    Conference Proceeding
  12. 12

    Focus on Local Regions for Query-based Object Detection by Xu, Hongbin, Xia, Yamei, Zhao, Shuai, Cheng, Bo

    Published 10-10-2023
    “…Query-based methods have garnered significant attention in object detection since the advent of DETR, the pioneering query-based detector. However, these…”
    Get full text
    Journal Article
  13. 13

    An Efficient Method based on Multi-view Semantic Alignment for Cross-view Geo-localization by Wang, Yifeng, Xia, Yamei, Lu, Tianbo, Zhang, Xiaoyan, Yao, Wenbin

    “…Cross-view geo-localization is to retrieve the most relevant images from different views. The biggest challenge is the visual differences between different…”
    Get full text
    Conference Proceeding
  14. 14

    A Dynamic Selection Algorithm of Tor Relay Based on Client Bias by Zhang, Yun, Xia, YaMei

    “…Tor network is one of the most widely used low latency anonymous communication systems. To balance the network load, the Tor network uses an adjusted bandwidth…”
    Get full text
    Conference Proceeding
  15. 15

    A Node-labeling-based Method for Evaluating the Anonymity of Tor Network by Jiang, Feng, Xia, Yamei, Yao, Wenbin, Lu, Tianbo, Zhang, Xiaoyan

    “…In order to better evaluate the anonymity of the Tor network, this paper evaluates the degree of the Tor network anonymity by calculating the probability of…”
    Get full text
    Conference Proceeding
  16. 16

    Duplicate short text detection based on Word2vec by Gao, Jin, He, Yahao, Zhang, Xiaoyan, Xia, Yamei

    “…In modern life, people own new social relationship, watch news, create e-commerce transactions and have entertainment online. Light blogs and short comments…”
    Get full text
    Conference Proceeding
  17. 17

    An Analysis of Attacks against Anonymous Communication Networks by Lu, Tianbo, Yao, Puxin, Zhao, Lingling, Li, Yang, Xie, Feng, Xia, Yamei

    “…Anonymous communication system has been hot topic in the field of information security, and attack techniques against anonymous systems are endless. This paper…”
    Get full text
    Conference Proceeding
  18. 18

    Structure of the brachial plexus root and adjacent regions displayed by ultrasound imaging by Li, Zhengyi, Xia, Xun, Rong, Xiaoming, Tang, Yamei, Xu, Dachuan

    Published in Neural regeneration research (15-09-2012)
    “…Brachial plexuses of 110 healthy volunteers were examined using high resolution color Doppler ultrasound. Ultrasonic characteristics and anatomic variation in…”
    Get full text
    Journal Article