Eric Ke Wang
YOU?
Author Swipe
View article: Unsupervised Person Re-Identification via Deep Attribute Learning
Unsupervised Person Re-Identification via Deep Attribute Learning Open
Driven by growing public security demands and the advancement of intelligent surveillance systems, person re-identification (ReID) has emerged as a prominent research focus in the field of computer vision. However, this task presents chall…
View article: Internet and Family Entrepreneurship: Is Geographic Distance Still a Problem?
Internet and Family Entrepreneurship: Is Geographic Distance Still a Problem? Open
This paper explores the value creation mechanism of the Internet from the perspective of family entrepreneurship, using data from the China Household Finance Survey (CHFS). The results show that the use of the Internet alleviates the negat…
View article: The mediating effect of depressive syndrome on the relationship between adverse childhood experiences and chronic kidney diseases among middle-aged and older adults
The mediating effect of depressive syndrome on the relationship between adverse childhood experiences and chronic kidney diseases among middle-aged and older adults Open
Background Chronic kidney disease (CKD) is projected to rank among the top five causes of mortality by 2050. In addition to established risk factors, adverse childhood experiences (ACEs) have recently emerged as significant contributors to…
View article: Identification and functional validation of <i>ACSL1</i> as a biomarker regulating ferroptosis in nucleus pulposus cell
Identification and functional validation of <i>ACSL1</i> as a biomarker regulating ferroptosis in nucleus pulposus cell Open
Intervertebral disc degeneration (IVDD) is a prevalent musculoskeletal disorder characterized by the deterioration of nucleus pulposus (NP) cells, leading to significant impairments in patients’ quality of life. Elucidating the molecular m…
View article: Identification and Functional Validation of ACSL1 as a Biomarker Regulating Ferroptosis in Nucleus Pulposus Cell
Identification and Functional Validation of ACSL1 as a Biomarker Regulating Ferroptosis in Nucleus Pulposus Cell Open
Intervertebral disc degeneration (IVDD) is a prevalent musculoskeletal disorder characterized by the deterioration of nucleus pulposus (NP) cells, leading to symptoms that significantly impact patients' quality of life. Understanding the m…
View article: RN-YOLO: A Small Target Detection Model for Aerial Remote-Sensing Images
RN-YOLO: A Small Target Detection Model for Aerial Remote-Sensing Images Open
Accurately detecting targets in remote-sensing images is crucial for the military, urban planning, and resource exploration. There are some challenges in extracting detailed features from remote-sensing images, such as complex backgrounds,…
View article: FastFace: Fast-converging Scheduler for Large-scale Face Recognition Training with One GPU
FastFace: Fast-converging Scheduler for Large-scale Face Recognition Training with One GPU Open
Computing power has evolved into a foundational and indispensable resource in the area of deep learning, particularly in tasks such as Face Recognition (FR) model training on large-scale datasets, where multiple GPUs are often a necessity.…
View article: Improved Trapdoors and Public Key Search Encryption Based on Middle-Product LWE
Improved Trapdoors and Public Key Search Encryption Based on Middle-Product LWE Open
Middle-product learning with errors (MP-LWE) was proposed in 2017 by Rosa et al., it is considered to be a method that combines the high efficiency of the R-LWE with the security guarantee of the ordinary LWE. Following the idea of this pr…
View article: ECL: Class-Enhancement Contrastive Learning for Long-tailed Skin Lesion Classification
ECL: Class-Enhancement Contrastive Learning for Long-tailed Skin Lesion Classification Open
Skin image datasets often suffer from imbalanced data distribution, exacerbating the difficulty of computer-aided skin disease diagnosis. Some recent works exploit supervised contrastive learning (SCL) for this long-tailed challenge. Despi…
View article: A Hybrid Cryptography Method using Extended Letters in Arabic and Persian Language
A Hybrid Cryptography Method using Extended Letters in Arabic and Persian Language Open
Cryptography is widely used in information security systems. In encryption, the goal is to hide information in such a way that only the sender and receiver are aware of the existence of communication and information. Encryption takes place…
View article: ORCHID: A Chinese Debate Corpus for Target-Independent Stance Detection and Argumentative Dialogue Summarization
ORCHID: A Chinese Debate Corpus for Target-Independent Stance Detection and Argumentative Dialogue Summarization Open
Dialogue agents have been receiving increasing attention for years, and this trend has been further boosted by the recent progress of large language models (LLMs). Stance detection and dialogue summarization are two core tasks of dialogue …
View article: Initializing Perturbations in Multiple Directions for Fast Adversarial Training
Initializing Perturbations in Multiple Directions for Fast Adversarial Training Open
Recent developments in the filed of Deep Learning have demonstrated that Deep Neural Networks(DNNs) are vulnerable to adversarial examples. Specifically, in image classification, an adversarial example can fool the well trained deep neural…
View article: Multi-Path Dilated Residual Network for Nuclei Segmentation and Detection
Multi-Path Dilated Residual Network for Nuclei Segmentation and Detection Open
As a typical biomedical detection task, nuclei detection has been widely used in human health management, disease diagnosis and other fields. However, the task of cell detection in microscopic images is still challenging because the nuclei…
View article: Deep Fusion Feature Based Object Detection Method for High Resolution Optical Remote Sensing Images
Deep Fusion Feature Based Object Detection Method for High Resolution Optical Remote Sensing Images Open
With the rapid growth of high-resolution remote sensing image-based applications, one of the fundamental problems in managing the increasing number of remote sensing images is automatic object detection. In this paper, we present a fusion …
View article: A new deep learning model for assisted diagnosis on electrocardiogram
A new deep learning model for assisted diagnosis on electrocardiogram Open
In order to enhance the accuracy of computer aided electrocardiogram analysis, we propose a deep learning model called CBRNN to assist diagnosis on electrocardiogram for clinical medical service. It combines two sub networks which are conv…
View article: A sparse deep learning model for privacy attack on remote sensing images
A sparse deep learning model for privacy attack on remote sensing images Open
Deep learning tools have been a new way for privacy attacks on remote sensing images. However, since labeled data of privacy objects in remote sensing images are less, the samples for training are commonly small. Besides, traditional deep…
View article: Multilayer Dense Attention Model for Image Caption
Multilayer Dense Attention Model for Image Caption Open
The image caption is a technology that enables us to understand the contents and generate descriptive text, of images using machines. With the development of deep learning, means of using it to understand image content and generate descrip…
View article: Automatic Classification of CAD ECG Signals With SDAE and Bidirectional Long Short-Term Network
Automatic Classification of CAD ECG Signals With SDAE and Bidirectional Long Short-Term Network Open
Coronary artery disease (CAD) has been one of main causes of heart diseases globally. The electrocardiogram (ECG) is a widely used diagnostic tool to monitor patients' heart activities, and medical personnel need to judge whether there are…
View article: A new privacy attack network for remote sensing images classification with small training samples
A new privacy attack network for remote sensing images classification with small training samples Open
Solving overfitting problems of privacy attacks on small-sample remote sensing data is still a big challenge in practical application. We propose a new privacy attack network, called joint residual network (JRN), for deep learning based pr…
View article: A Novel Teacher-Student Network for Sentiment Classification
A Novel Teacher-Student Network for Sentiment Classification Open
Compared with traditional text classification, many sentiments online such as product reviews are not standard, which are concise with clear standpoints.Researchers on sentiment classification face tremendous challenges.Although various se…