Search Results - "Zheng, XuFei"
-
1
RFID-based centralized cooperative localization in indoor environments
Published in 2016 International Conference on Indoor Positioning and Indoor Navigation (IPIN) (01-10-2016)“…We demonstrate the effectiveness of a cooperative scheme to improve the positioning accuracy of four users moving in a building, by using the received signal…”
Get full text
Conference Proceeding -
2
Extracting features from phase space of EEG signals in brain–computer interfaces
Published in Neurocomputing (Amsterdam) (03-03-2015)“…Conventional feature extraction methods based on autoregressive and amplitude–frequency analysis assume stationarity in the Electroencephalogram signal along…”
Get full text
Journal Article -
3
HTBE-Net: A hybrid transformer network based on boundary enhancement for breast ultrasound image segmentation
Published in Displays (01-09-2024)“…Automatic segmentation algorithms for breast ultrasound images are crucial for early breast cancer detection and treatment. Existing methods centered on…”
Get full text
Journal Article -
4
GBE-Net: Global Boundary Enhancement Network for breast lesion segmentation in ultrasound images
Published in Biomedical signal processing and control (01-10-2024)“…Automatic segmentation of breast ultrasound images is crucial for improving the diagnostic accuracy of breast cancer. Although Convolutional Neural Networks…”
Get full text
Journal Article -
5
-
6
Phase space reconstruction for improving the classification of single trial EEG
Published in Biomedical signal processing and control (01-05-2014)“…•Phase space reconstruct method is used to reconstruct the phase space of EEG signals.•The features are extracted by amplitude–frequency analysis method in the…”
Get full text
Journal Article -
7
The Effects of Near-Infrared Phototherapy Preirradiation on Lower-Limb Muscle Strength and Injury After Exercise: A Systematic Review and Meta-analysis
Published in Archives of physical medicine and rehabilitation (03-05-2024)“…OBJECTIVETo assess near-infrared preirradiation effects on postexercise lower-limb muscle damage and function and determine optimal dosage.DATA SOURCESPubMed,…”
Get full text
Journal Article -
8
The Effects of Near-Infrared phototherapy Pre-irradiation on Lower Limb Muscle Strength and Injury Following Exercise: A Systematic Review and Meta-analysis
Published in Archives of physical medicine and rehabilitation (03-05-2024)“…Assess near-infrared pre-irradiation effects on post-exercise lower limb muscle damage and function, determine optimal dosage. PubMed, EMBASE, Cochrane…”
Get full text
Journal Article -
9
Evaluating Membership Inference Through Adversarial Robustness
Published in Computer journal (11-11-2022)“…Abstract The usage of deep learning is being escalated in many applications. Due to its outstanding performance, it is being used in a variety of security and…”
Get full text
Journal Article -
10
An AIS-based cloud security model
Published in 2010 International Conference on Intelligent Control and Information Processing (01-08-2010)“…As the construction of malicious software has shifted from novices to commercial, malware attacks grew considerably in frequency and traditional antivirus…”
Get full text
Conference Proceeding -
11
Cluster-Based Resource Selection Scheme for 5G V2X
Published in 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring) (01-04-2019)“…The vehicle to everything communication in long term evolution (LTE V2X) supports vehicle-to-vehicle (V2V) communication directly via PC5 interface. In LTE V2X…”
Get full text
Conference Proceeding -
12
Strategy of fast and light-load cloud-based proactive benign worm countermeasure technology to contain worm propagation
Published in The Journal of supercomputing (01-12-2012)“…Benign worms have been attracting wide attention in the field of worm research due to the proactive defense against the worm propagation and patch for the…”
Get full text
Journal Article -
13
A Novel Semi-Distributed Transmission Paradigm for NR V2X
Published in 2019 IEEE Globecom Workshops (GC Wkshps) (01-12-2019)“…With the increased demand for data rate and reliability of advanced V2X services, LTE-V2X can not meet the requirements. NR V2X has been investigated recently…”
Get full text
Conference Proceeding -
14
Self-Supervised Adversarial Example Detection by Disentangled Representation
Published in 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (01-12-2022)“…Deep learning models are known to be vulnerable to adversarial examples that are elaborately designed for malicious purposes and are imperceptible to the human…”
Get full text
Conference Proceeding -
15
Masked Language Model Based Textual Adversarial Example Detection
Published 18-04-2023“…Adversarial attacks are a serious threat to the reliable deployment of machine learning models in safety-critical applications. They can misguide current…”
Get full text
Journal Article -
16
Multi-Agent Deep Reinforcement Learning for Uplink Power Control in Multi-Cell Systems
Published in 2022 IEEE International Conference on Communications Workshops (ICC Workshops) (16-05-2022)“…The power control is a significant technique for suppressing co-channel interference that severely limits the capacity and connectivity of multi-cell…”
Get full text
Conference Proceeding -
17
Evaluating Membership Inference Through Adversarial Robustness
Published 14-05-2022“…The usage of deep learning is being escalated in many applications. Due to its outstanding performance, it is being used in a variety of security and…”
Get full text
Journal Article -
18
Self-Supervised Adversarial Example Detection by Disentangled Representation
Published 08-05-2021“…Deep learning models are known to be vulnerable to adversarial examples that are elaborately designed for malicious purposes and are imperceptible to the human…”
Get full text
Journal Article