Search Results - "Zheng, XuFei"

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    RFID-based centralized cooperative localization in indoor environments by Seco, Fernando, Jimenez, Antonio R., Xufei Zheng

    “…We demonstrate the effectiveness of a cooperative scheme to improve the positioning accuracy of four users moving in a building, by using the received signal…”
    Get full text
    Conference Proceeding
  2. 2

    Extracting features from phase space of EEG signals in brain–computer interfaces by Fang, Yonghui, Chen, Minyou, Zheng, Xufei

    Published in Neurocomputing (Amsterdam) (03-03-2015)
    “…Conventional feature extraction methods based on autoregressive and amplitude–frequency analysis assume stationarity in the Electroencephalogram signal along…”
    Get full text
    Journal Article
  3. 3

    HTBE-Net: A hybrid transformer network based on boundary enhancement for breast ultrasound image segmentation by Feng, Jiali, Dong, Xiaoxuan, Liu, Xiaojuan, Zheng, Xufei

    Published in Displays (01-09-2024)
    “…Automatic segmentation algorithms for breast ultrasound images are crucial for early breast cancer detection and treatment. Existing methods centered on…”
    Get full text
    Journal Article
  4. 4

    GBE-Net: Global Boundary Enhancement Network for breast lesion segmentation in ultrasound images by Feng, Jiali, Dong, Xiaoxuan, Chen, Shanxiong, Zhou, Lingfei, Zheng, Xufei

    Published in Biomedical signal processing and control (01-10-2024)
    “…Automatic segmentation of breast ultrasound images is crucial for improving the diagnostic accuracy of breast cancer. Although Convolutional Neural Networks…”
    Get full text
    Journal Article
  5. 5
  6. 6

    Phase space reconstruction for improving the classification of single trial EEG by Chen, Minyou, Fang, Yonghui, Zheng, Xufei

    Published in Biomedical signal processing and control (01-05-2014)
    “…•Phase space reconstruct method is used to reconstruct the phase space of EEG signals.•The features are extracted by amplitude–frequency analysis method in the…”
    Get full text
    Journal Article
  7. 7

    The Effects of Near-Infrared Phototherapy Preirradiation on Lower-Limb Muscle Strength and Injury After Exercise: A Systematic Review and Meta-analysis by Peng, PeiQiang, Zheng, XuFei, Wang, YueTing, Jiang, ShuNing, Chen, JiaJu, Sui, Xin, Zhao, LiJing, Xu, Haiyan, Lu, Yuming, Zhang, Shuang

    “…OBJECTIVETo assess near-infrared preirradiation effects on postexercise lower-limb muscle damage and function and determine optimal dosage.DATA SOURCESPubMed,…”
    Get full text
    Journal Article
  8. 8

    The Effects of Near-Infrared phototherapy Pre-irradiation on Lower Limb Muscle Strength and Injury Following Exercise: A Systematic Review and Meta-analysis by Peng, PeiQiang, Zheng, XuFei, Wang, YueTing, Jiang, ShuNing, Chen, JiaJu, Sui, Xin, Zhao, LiJing, Xu, Haiyan, Lu, Yuming, Zhang, Shuang

    “…Assess near-infrared pre-irradiation effects on post-exercise lower limb muscle damage and function, determine optimal dosage. PubMed, EMBASE, Cochrane…”
    Get full text
    Journal Article
  9. 9

    Evaluating Membership Inference Through Adversarial Robustness by Zhang, Zhaoxi, Yu Zhang, Leo, Zheng, Xufei, Hussain Abbasi, Bilal, Hu, Shengshan

    Published in Computer journal (11-11-2022)
    “…Abstract The usage of deep learning is being escalated in many applications. Due to its outstanding performance, it is being used in a variety of security and…”
    Get full text
    Journal Article
  10. 10

    An AIS-based cloud security model by Xufei Zheng, Yonghui Fang

    “…As the construction of malicious software has shifted from novices to commercial, malware attacks grew considerably in frequency and traditional antivirus…”
    Get full text
    Conference Proceeding
  11. 11

    Cluster-Based Resource Selection Scheme for 5G V2X by Zhao, Jiaqi, He, Xinxin, Wang, Huan, Zheng, Xufei, Lv, Jie, Luo, Tao, Hou, Xiaolin

    “…The vehicle to everything communication in long term evolution (LTE V2X) supports vehicle-to-vehicle (V2V) communication directly via PC5 interface. In LTE V2X…”
    Get full text
    Conference Proceeding
  12. 12

    Strategy of fast and light-load cloud-based proactive benign worm countermeasure technology to contain worm propagation by Zheng, Xufei, Li, Tao, Fang, Yonghui

    Published in The Journal of supercomputing (01-12-2012)
    “…Benign worms have been attracting wide attention in the field of worm research due to the proactive defense against the worm propagation and patch for the…”
    Get full text
    Journal Article
  13. 13

    A Novel Semi-Distributed Transmission Paradigm for NR V2X by Wang, Yanru, Zheng, Xufei, Hou, Xiaolin

    Published in 2019 IEEE Globecom Workshops (GC Wkshps) (01-12-2019)
    “…With the increased demand for data rate and reliability of advanced V2X services, LTE-V2X can not meet the requirements. NR V2X has been investigated recently…”
    Get full text
    Conference Proceeding
  14. 14

    Self-Supervised Adversarial Example Detection by Disentangled Representation by Zhang, Zhaoxi, Zhang, Leo Yu, Zheng, Xufei, Tian, Jinyu, Zhou, Jiantao

    “…Deep learning models are known to be vulnerable to adversarial examples that are elaborately designed for malicious purposes and are imperceptible to the human…”
    Get full text
    Conference Proceeding
  15. 15

    Masked Language Model Based Textual Adversarial Example Detection by Zhang, Xiaomei, Zhang, Zhaoxi, Zhong, Qi, Zheng, Xufei, Zhang, Yanjun, Hu, Shengshan, Zhang, Leo Yu

    Published 18-04-2023
    “…Adversarial attacks are a serious threat to the reliable deployment of machine learning models in safety-critical applications. They can misguide current…”
    Get full text
    Journal Article
  16. 16

    Multi-Agent Deep Reinforcement Learning for Uplink Power Control in Multi-Cell Systems by Jia, Ruibao, Liu, Liu, Zheng, Xufei, Yang, Yuhan, Wang, Shaoyang, Huang, Pingmu, Lv, Tiejun

    “…The power control is a significant technique for suppressing co-channel interference that severely limits the capacity and connectivity of multi-cell…”
    Get full text
    Conference Proceeding
  17. 17

    Evaluating Membership Inference Through Adversarial Robustness by Zhang, Zhaoxi, Zhang, Leo Yu, Zheng, Xufei, Abbasi, Bilal Hussain, Hu, Shengshan

    Published 14-05-2022
    “…The usage of deep learning is being escalated in many applications. Due to its outstanding performance, it is being used in a variety of security and…”
    Get full text
    Journal Article
  18. 18

    Self-Supervised Adversarial Example Detection by Disentangled Representation by Zhang, Zhaoxi, Zhang, Leo Yu, Zheng, Xufei, Tian, Jinyu, Zhou, Jiantao

    Published 08-05-2021
    “…Deep learning models are known to be vulnerable to adversarial examples that are elaborately designed for malicious purposes and are imperceptible to the human…”
    Get full text
    Journal Article