Bob Zhang
YOU?
Author Swipe
View article: TCSR‐SQL: Towards Table Content‐Aware Text‐to‐SQL With Self‐Retrieval
TCSR‐SQL: Towards Table Content‐Aware Text‐to‐SQL With Self‐Retrieval Open
Large language model‐based (LLM‐based) text‐to‐SQL methods have achieved important progress in generating SQL queries for real‐world applications. When confronted with table content‐aware questions in real‐world scenarios, ambiguous data c…
View article: Dapagliflozin alleviates isoprenaline-induced cardiac hypertrophy by promoting mitophagy via AMPKα2 signaling pathway
Dapagliflozin alleviates isoprenaline-induced cardiac hypertrophy by promoting mitophagy via AMPKα2 signaling pathway Open
DAPA exerts cardioprotective effects by mitigating ISO-induced cardiac hypertrophy and preserving mitochondrial integrity, mediated through AMPKα2-dependent activation of mitophagy.
View article: ENJ: Optimizing Noise with Genetic Algorithms to Jailbreak LSMs
ENJ: Optimizing Noise with Genetic Algorithms to Jailbreak LSMs Open
The widespread application of Large Speech Models (LSMs) has made their security risks increasingly prominent. Traditional speech adversarial attack methods face challenges in balancing effectiveness and stealth. This paper proposes Evolut…
View article: Research on wind power prediction with secondary decomposition and multi-algorithm fusion for complex nonlinear time series
Research on wind power prediction with secondary decomposition and multi-algorithm fusion for complex nonlinear time series Open
View article: Bridge Structural Damage Identification Technique Based on BPNN and Vehicle-bridge Interaction Analysis
Bridge Structural Damage Identification Technique Based on BPNN and Vehicle-bridge Interaction Analysis Open
During the use of bridges, the traditional method of detecting the bridge condition cannot be continuously monitored and maintained. To address this problem, the study proposed a damage identification method based on the interaction of bac…
View article: A Dynamic Transformer Network for Vehicle Detection
A Dynamic Transformer Network for Vehicle Detection Open
Stable consumer electronic systems can assist traffic better. Good traffic consumer electronic systems require collaborative work between traffic algorithms and hardware. However, performance of popular traffic algorithms containing vehicl…
View article: A Tree-guided CNN for image super-resolution
A Tree-guided CNN for image super-resolution Open
Deep convolutional neural networks can extract more accurate structural information via deep architectures to obtain good performance in image super-resolution. However, it is not easy to find effect of important layers in a single network…
View article: Cybersecurity Assessment Based on Entropy Weight Method and Polynomial Regression Modeling
Cybersecurity Assessment Based on Entropy Weight Method and Polynomial Regression Modeling Open
The aim of this paper is to assess cyber security stability and identify effective strategies. The study collects multi-dimensional data such as crime rate and crime success rate and uses entropy weight method to construct a stability asse…
View article: DCHM: Dynamic Collaboration of Heterogeneous Models Through Isomerism Learning in a Blockchain-Powered Federated Learning Framework
DCHM: Dynamic Collaboration of Heterogeneous Models Through Isomerism Learning in a Blockchain-Powered Federated Learning Framework Open
Solutions to time-varying problems are crucial for research areas such as predicting changes in human body shape over time. While recurrent neural networks have made significant advancements in this field, their reliance on centralized pro…
View article: Voice-AttentionNet: Voice-Based Multi-Disease Detection with Lightweight Attention-Based Temporal Convolutional Neural Network
Voice-AttentionNet: Voice-Based Multi-Disease Detection with Lightweight Attention-Based Temporal Convolutional Neural Network Open
Voice data contain a wealth of temporal and spectral information and can be a valuable resource for disease classification. However, traditional methods are often not effective in capturing the key features required for the classification …
View article: Deep Learning in Palmprint Recognition-A Comprehensive Survey
Deep Learning in Palmprint Recognition-A Comprehensive Survey Open
Palmprint recognition has emerged as a prominent biometric technology, widely applied in diverse scenarios. Traditional handcrafted methods for palmprint recognition often fall short in representation capability, as they heavily depend on …
View article: Deep Learning in Palmprint Recognition-A Comprehensive Survey
Deep Learning in Palmprint Recognition-A Comprehensive Survey Open
Palmprint recognition has emerged as a prominent biometric technology, widely applied in diverse scenarios. Traditional handcrafted methods for palmprint recognition often fall short in representation capability, as they heavily depend on …
View article: Novel Furazanoazepines Derivatives as Sdh Inhibitors: Design, Synthesis and Their Fungicidal Activities
Novel Furazanoazepines Derivatives as Sdh Inhibitors: Design, Synthesis and Their Fungicidal Activities Open
View article: Lightweight Instance Segmentation for Integrated Measurement and Diagnosis of Natural Gas Pipeline Leaks
Lightweight Instance Segmentation for Integrated Measurement and Diagnosis of Natural Gas Pipeline Leaks Open
View article: Synergistic Monitoring and Model Optimization of Leaf Water Content and Chlorophyll in Citrus Using Uav-Based Remote Sensing
Synergistic Monitoring and Model Optimization of Leaf Water Content and Chlorophyll in Citrus Using Uav-Based Remote Sensing Open
View article: Blockchain Empowered Knowledge Resource Protection Model and Its Application
Blockchain Empowered Knowledge Resource Protection Model and Its Application Open
An increasing number of knowledge resources are stored and disseminated in digital form, resulting in new challenges for Intellectual Property Rights (IPR) protection, including difficulty in establishing rights, difficulty in defending ri…
View article: An end-to-end occluded person re-identification network with smoothing corrupted feature prediction
An end-to-end occluded person re-identification network with smoothing corrupted feature prediction Open
Occluded person re-identification (ReID) is a challenging task as the images suffer from various obstacles and less discriminative information caused by incomplete body parts. Most current works rely on auxiliary models to infer the visibl…
View article: A Multi-Slice Encoding Direction Extraction Network for Palmprint Recognition
A Multi-Slice Encoding Direction Extraction Network for Palmprint Recognition Open
View article: Pre‐trained SAM as data augmentation for image segmentation
Pre‐trained SAM as data augmentation for image segmentation Open
Data augmentation plays an important role in training deep neural model by expanding the size and diversity of the dataset. Initially, data augmentation mainly involved some simple transformations of images. Later, in order to increase the…
View article: Automated data collection tool for real-world cohort studies of chronic hepatitis B: Leveraging OCR and NLP technologies for improved efficiency
Automated data collection tool for real-world cohort studies of chronic hepatitis B: Leveraging OCR and NLP technologies for improved efficiency Open
View article: CDIMC-net: Cognitive Deep Incomplete Multi-view Clustering Network
CDIMC-net: Cognitive Deep Incomplete Multi-view Clustering Network Open
In recent years, incomplete multi-view clustering, which studies the challenging multi-view clustering problem on missing views, has received growing research interests. Although a series of methods have been proposed to address this issue…
View article: Enhancing generalized spectral clustering with embedding Laplacian graph regularization
Enhancing generalized spectral clustering with embedding Laplacian graph regularization Open
An enhanced generalised spectral clustering framework that addresses the limitations of existing methods by incorporating the Laplacian graph and group effect into a regularisation term is presented. By doing so, the framework significantl…
View article: A Dual-Level Cancelable Framework for Palmprint Verification and Hack-Proof Data Storage
A Dual-Level Cancelable Framework for Palmprint Verification and Hack-Proof Data Storage Open
In recent years, palmprints have been widely used for individual verification. The rich privacy information in palmprint data necessitates its protection to ensure security and privacy without sacrificing system performance. Existing syste…
View article: Open-Vocabulary Calibration for Fine-tuned CLIP
Open-Vocabulary Calibration for Fine-tuned CLIP Open
Vision-language models (VLMs) have emerged as formidable tools, showing their strong capability in handling various open-vocabulary tasks in image recognition, text-driven visual content generation, and visual chatbots, to name a few. In r…
View article: An Enhanced GAN for Image Generation
An Enhanced GAN for Image Generation Open
Generative adversarial networks (GANs) with gaming abilities have been widely applied in image generation. However, gamistic generators and discriminators may reduce the robustness of the obtained GANs in image generation under varying sce…
View article: Optimization-Free Test-Time Adaptation for Cross-Person Activity Recognition
Optimization-Free Test-Time Adaptation for Cross-Person Activity Recognition Open
Human Activity Recognition (HAR) models often suffer from performance degradation in real-world applications due to distribution shifts in activity patterns across individuals. Test-Time Adaptation (TTA) is an emerging learning paradigm th…
View article: 58 Epigenetic editing as a promising strategy to enhance efficacy and genomic integrity of CAR T cell therapy
58 Epigenetic editing as a promising strategy to enhance efficacy and genomic integrity of CAR T cell therapy Open
Background Chimeric Antigen Receptor T-cell (CAR-T) therapy has shown remarkable effectiveness and transformational impact in treating hematological malignancies and solid tumors. Site-specific nucleases such as TALENs and CRISPR/Cas9 have…
View article: Adversarially Learning Occlusions by Backpropagation for Face Recognition
Adversarially Learning Occlusions by Backpropagation for Face Recognition Open
With the accomplishment of deep neural networks, face recognition methods have achieved great success in research and are now being applied at a human level. However, existing face recognition models fail to achieve state-of-the-art perfor…
View article: Broad Learning Model with a Dual Feature Extraction Strategy for Classification
Broad Learning Model with a Dual Feature Extraction Strategy for Classification Open
The broad learning system (BLS) is a brief, flat neural network structure that has shown effectiveness in various classification tasks. However, original input data with high dimensionality often contain superfluous and correlated informat…
View article: Physics-Driven Spectrum-Consistent Federated Learning for Palmprint Verification
Physics-Driven Spectrum-Consistent Federated Learning for Palmprint Verification Open
Palmprint as biometrics has gained increasing attention recently due to its discriminative ability and robustness. However, existing methods mainly improve palmprint verification within one spectrum, which is challenging to verify across d…