Zhaobin Liu
YOU?
Author Swipe
View article: The Effects and Fate of Perfluorooctane Sulfonate (Pfos) in Sludge Anaerobic Digestion: Carbon Metabolisms, Microbial Functionality, and Molecular Blocking Dynamics
The Effects and Fate of Perfluorooctane Sulfonate (Pfos) in Sludge Anaerobic Digestion: Carbon Metabolisms, Microbial Functionality, and Molecular Blocking Dynamics Open
View article: The Effects and Fate of Perfluorooctane Sulfonate (Pfos) in Sludge Anaerobic Digestion: Carbon Metabolisms, Microbial Functionality, and Molecular Blocking Dynamics
The Effects and Fate of Perfluorooctane Sulfonate (Pfos) in Sludge Anaerobic Digestion: Carbon Metabolisms, Microbial Functionality, and Molecular Blocking Dynamics Open
View article: Bioelectrocatalysis Effects on Methanogenesis Enhancement and Regulation Mechanisms of Microbial Ecology in Upflow Anaerobic Sludge Blanket Treatment of Sulfate-Stressed Methanolic Wastewater
Bioelectrocatalysis Effects on Methanogenesis Enhancement and Regulation Mechanisms of Microbial Ecology in Upflow Anaerobic Sludge Blanket Treatment of Sulfate-Stressed Methanolic Wastewater Open
View article: An in-depth survey on Deep Learning-based Motor Imagery Electroencephalogram (EEG) classification
An in-depth survey on Deep Learning-based Motor Imagery Electroencephalogram (EEG) classification Open
Electroencephalogram (EEG)-based Brain-Computer Interfaces (BCIs) build a communication path between human brain and external devices. Among EEG-based BCI paradigms, the most commonly used one is motor imagery (MI). As a hot research topic…
View article: Smooth Group L1/2 Regularization for Pruning Convolutional Neural Networks
Smooth Group L1/2 Regularization for Pruning Convolutional Neural Networks Open
In this paper, a novel smooth group L1/2 (SGL1/2) regularization method is proposed for pruning hidden nodes of the fully connected layer in convolution neural networks. Usually, the selection of nodes and weights is based on experience, a…
View article: Improvement of Normal Estimation for PointClouds via Simplifying Surface Fitting
Improvement of Normal Estimation for PointClouds via Simplifying Surface Fitting Open
With the burst development of neural networks in recent years, the task of normal estimation has once again become a concern. By introducing the neural networks to classic methods based on problem-specific knowledge, the adaptability of th…
View article: Fast and Accurate Normal Estimation for Point Cloud via Patch Stitching
Fast and Accurate Normal Estimation for Point Cloud via Patch Stitching Open
This paper presents an effective normal estimation method adopting multi-patch stitching for an unstructured point cloud. The majority of learning-based approaches encode a local patch around each point of a whole model and estimate the no…
View article: Temporal Index Scheme of Hyperledger Fabric System in IoT
Temporal Index Scheme of Hyperledger Fabric System in IoT Open
As a large number of mobile terminals are connected to the IoT, the security problem of IoT is a challenge to the IoT technology. Blockchain technology has the characteristics of decentralization, data encryption, smart contract, and so on…
View article: Influence of hydrogen-like nucleus mass on electronic state
Influence of hydrogen-like nucleus mass on electronic state Open
In an isolated two-body composite system, the discussion of how the change of one body affects the state of the other will help to know the relation of a single particle's mixed and pure states. Given 5 one-dimensional hydrogen-like atoms …
View article: Abnormal Behavior Recognition Based on Spatio-temporal Context
Abnormal Behavior Recognition Based on Spatio-temporal Context Open
This paper presents a new approach for detecting abnormal behaviors in complex surveillance scenes where anomalies are subtle and difficult to distinguish due to the intricate correlations among multiple objects’ behaviors. Specifically, a…
View article: Research on improved privacy publishing algorithm based on set cover
Research on improved privacy publishing algorithm based on set cover Open
With the invention of big data era, data releasing is becoming a hot topic in database community. Meanwhile, data privacy also raises the attention of users. As far as the privacy protection models that have been proposed, the differential…
View article: DynaPro: Dynamic Wireless Sensor Network Data Protection Algorithm in IoT via Differential Privacy
DynaPro: Dynamic Wireless Sensor Network Data Protection Algorithm in IoT via Differential Privacy Open
With the advent of the era of intelligent Internet of Things (IoT), more and more personal information are collected in the process of deploying IoT in various domains. This brings the problem of data protection in IoT. To address this pro…
View article: Noise-added selection method for location-based service using differential privacy in Internet of Things
Noise-added selection method for location-based service using differential privacy in Internet of Things Open
With the development of Internet of Things, many applications need to use people’s location information, resulting in a large amount of data need to be processed, called big data. In recent years, people propose many methods to protect pri…
View article: An Effective Data Privacy Protection Algorithm Based on Differential Privacy in Edge Computing
An Effective Data Privacy Protection Algorithm Based on Differential Privacy in Edge Computing Open
With the rapid development of information science and the Internet of Things (IoT), people have an unprecedented ability to collect and share data, especially the various sensors as the entrance to data collection. At the same time, edge c…
View article: A novel self-adaptive grid-partitioning noise optimization algorithm based on differential privacy
A novel self-adaptive grid-partitioning noise optimization algorithm based on differential privacy Open
As the development of the big data and Internet, the data sharing of users that contains lots of useful information are needed more frequently. In particular, with the widespread of smart devices, a great deal of location-based data inform…
View article: Effective Piecewise Linear Skeletonization of Sparse Shapes
Effective Piecewise Linear Skeletonization of Sparse Shapes Open
Conventional image skeletonization techniques implicitly assume the pixel level connectivity. However, noise inside the object regions destroys the connectivity and exhibits sparseness in the image. We present a skeletonization algorithm d…
View article: Differential Privacy via Weighted Sampling Set Cover
Differential Privacy via Weighted Sampling Set Cover Open
Differential privacy is a security guarantee model which widely used in privacy preserving data publishing, but the query result can't be used in data research directly, especially in high-dimensional datasets.To address this problem, we p…