Yanping Xiang
YOU?
Author Swipe
View article: Bidirectional Temporal Information Propagation for Moving Infrared Small Target Detection
Bidirectional Temporal Information Propagation for Moving Infrared Small Target Detection Open
Moving infrared small target detection is broadly adopted in infrared search and track systems, and has attracted considerable research focus in recent years. The existing learning-based multi-frame methods mainly aggregate the information…
Three Artificial Liver Models of Treatment of Acute-on-Chronic Liver Failure Open
PE, PP+PE and DPMAS+PE three artificial liver treatment modes can effectively improve liver, kidney and coagulation function of ACLF patients. DPMAS+PE demonstrated better ability to remove endotoxin and inflammatory mediators, showed adva…
An Improved Co-Resident Attack Defense Strategy Based on Multi-Level Tenant Classification in Public Cloud Platforms Open
Co-resident attacks are serious security threats in multi-tenant public cloud platforms. They are often implemented by building side channels between virtual machines (VMs) hosted on the same cloud server. Traditional defense methods are t…
Deformable Feature Alignment and Refinement for Moving Infrared Dim-small Target Detection Open
The detection of moving infrared dim-small targets has been a challenging and prevalent research topic. The current state-of-the-art methods are mainly based on ConvLSTM to aggregate information from adjacent frames to facilitate the detec…
Separating hard clean samples from noisy samples with samples’ learning risk for DNN when learning with noisy labels Open
L earning with N oisy L abels (LNL) methods aim to improve the accuracy of D eep N eural N etworks (DNNs) when the training set contains samples with noisy or incorrect labels, and have become popular in recent years. Existing popular LNL …
View article: CNN-GRU-FF: a double-layer feature fusion-based network intrusion detection system using convolutional neural network and gated recurrent units
CNN-GRU-FF: a double-layer feature fusion-based network intrusion detection system using convolutional neural network and gated recurrent units Open
Identifying and preventing malicious network behavior is a challenge for establishing a secure network communication environment or system. Malicious activities in a network system can seriously threaten users’ privacy and potentially jeop…
Association between systemic immune-inflammation index and psoriasis: A cross-sectional study Open
Objectives The Systemic Immune-inflammatory Index (SII), an emergent biomarker for inflammation, has recently garnered attention. Psoriasis, characterized by its immune-inflammatory nature, presents an intriguing domain for exploring poten…
View article: χ2-BidLSTM: A Feature Driven Intrusion Detection System Based on χ2 Statistical Model and Bidirectional LSTM
χ2-BidLSTM: A Feature Driven Intrusion Detection System Based on χ2 Statistical Model and Bidirectional LSTM Open
In a network architecture, an intrusion detection system (IDS) is one of the most commonly used approaches to secure the integrity and availability of critical assets in protected systems. Many existing network intrusion detection systems …
Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing Open
In this paper, we propose a compressive sensing(CS)-based scheme that combines encryption and data hiding to provide double protection to the image data in the cloud outsourcing. Different domain techniques are integrated for efficiency an…
Broad‐Spectrum Profiling of Drug Safety via Learning Complex Network Open
Drug safety is a severe clinical pharmacology and toxicology problem that has caused immense medical and social burdens every year. Regretfully, a reproducible method to assess drug safety systematically and quantitatively is still missing…
High Capacity Data Hiding in Encrypted Image Based on Compressive Sensing for Nonequivalent Resources Open
To fulfill the requirements of data security in environments with nonequivalent resources, a high capacity data hiding scheme in encrypted image based on compressive sensing (CS) is proposed by fully utilizing the adaptabilit... | Find, re…
Managing Software Enterprise Transformation: Key Influence Factors and Process Based on Services Computing Open
In the era of new economy, transformation management and dynamic management are the cores of enterprise management.Through identifying the influence factors of software enterprise transformation, including the ability to grasp opportunitie…
Quantum Image Encryption Using Intra and Inter Bit Permutation Based on Logistic Map Open
In this paper, a quantum image encryption scheme is proposed by using the inter–intra bit-level permutation strategy. The image to be encrypted is first represented by a novel enhanced quantum representation model, and then, the intra and …
A Group-based Approach to Improve Multifactorial Evolutionary Algorithm Open
Multifactorial evolutionary algorithm (MFEA) exploits the parallelism of population-based evolutionaryalgorithm and provides an efficient way to evolve individuals for solving multiple tasks concurrently.Its efficiency is derived by implic…
View article: A Qos-Driven Approach to the Cloud Service Addressing Attributes of Security
A Qos-Driven Approach to the Cloud Service Addressing Attributes of Security Open
Recently, cloud computing has been widely used by relying on its powerful resource integration and computing abilities. In the cloud computing system (CCS), the quality of service (QoS) is an important service evaluation criterion from pro…
Structured Memetic Automation for Online Human-Like Social Behavior Learning Open
Meme automaton is an adaptive entity that autonomously acquires increasing level of capability and intelligence through embedded memes evolving independently or via social interactions. This paper embarks a study on memetic multiagent syst…