Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleSeptember 2024
Reverse Pyramid Attention Guidance Network for Person Re-Identification
International Journal of Cognitive Informatics and Natural Intelligence (IJCINI-IGI), Volume 18, Issue 1Pages 1–22https://doi.org/10.4018/IJCINI.349982Person re-identification aims to retrieve pedestrians with the same identity across different cameras. However, current methods increase attention to interfering regions when dealing with complex backgrounds and occlusion, especially in the presence of ...
- short-paperAugust 2024
POSTER: Opportunistic Credit-Based Transport for Reconfigurable Data Center Networks with Tidal
ACM SIGCOMM Posters and Demos '24: Proceedings of the ACM SIGCOMM 2024 Conference: Posters and DemosPages 4–6https://doi.org/10.1145/3672202.3673714The slowdown of Moore's Law for merchant silicon has motivated the adoption of optical circuit switches (OCSes) in data center networks (DCNs). As illustrated in Fig. 1, reconfigurable data center networks (RDCNs) have thus been developed to dynamically ...
- research-articleAugust 2024
Rethinking Transport Protocols for Reconfigurable Data Centers: An Empirical Study
HotOptics '24: Proceedings of the 1st SIGCOMM Workshop on Hot Topics in Optical Technologies and Applications in NetworkingPages 7–13https://doi.org/10.1145/3672201.3674120Fast-reconfiguring data center network architectures are rising as an answer to the expanding gap between traditional switch capacities and cloud traffic demands. These networks feature frequently changing connections and dynamic routing schemes, ...
- research-articleAugust 2024
Uniform-Cost Multi-Path Routing for Reconfigurable Data Center Networks
ACM SIGCOMM '24: Proceedings of the ACM SIGCOMM 2024 ConferencePages 433–448https://doi.org/10.1145/3651890.3672245Reconfigurable data center networks (RDCNs) are arising as a promising data center network (DCN) design in the post-Moore's law era. However, the constantly reconfigured network topology in RDCNs invalidates the assumption of using hop count as the cost ...
- articleSeptember 2024
A Fine-Grained Sentiment Analysis Method Using Transformer for Weibo Comment Text
International Journal of Information Technologies and Systems Approach (IJITSA-IGI), Volume 17, Issue 1Pages 1–24https://doi.org/10.4018/IJITSA.345397Many existing fine-grained sentiment analysis (FGSA) methods have problems such as easy loss of fine-grained information, difficulty in solving polysemy and imbalanced sample categories. Therefore, a Transformer based FGSA method for Weibo comment text ...
-
- research-articleJuly 2024
Improvement of C-shaped pocket TFET with sandwiched drain for ambipolar performance and analog/RF performance
- Wanyang Xiao,
- Liang Wang,
- Yu Peng,
- Yafei Ding,
- Yingjie Ma,
- Fang Yang,
- Weijing Liu,
- Zimiao Zhao,
- Jie Xu,
- Min Tang,
- Wei Bai,
- Xiaodong Tang
Microelectronics Journal (MICROJ), Volume 148, Issue Chttps://doi.org/10.1016/j.mejo.2024.106211AbstractA novel structure of tunneling field effect transistor device (CSP-SD-TFET) is proposed, which adds a sandwiched drain to the C-shaped pocket TFET (CSP-TFET). This structure can increase the resistance of the drain, share the lateral electric ...
- research-articleJanuary 2024
Distributed Network Telemetry With Resource Efficiency and Full Accuracy
IEEE/ACM Transactions on Networking (TON), Volume 32, Issue 3Pages 1857–1872https://doi.org/10.1109/TNET.2023.3327345Network telemetry is essential for administrators to monitor massive data traffic in a network-wide manner. Existing telemetry solutions often face the dilemma between resource efficiency (i.e., low CPU, memory, and bandwidth overhead) and full accuracy (...
PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior
ACSAC '23: Proceedings of the 39th Annual Computer Security Applications ConferencePages 580–593https://doi.org/10.1145/3627106.3627178With the widespread application of machine learning techniques in malware detection, researchers have proposed various adversarial attack methods to generate adversarial examples (AEs) of malware, thereby evading detection. Previous studies have shown ...
- research-articleJune 2024
Design Application of Emergency Evacuation Indication in Railway Station
AIBDF '23: Proceedings of the 2023 3rd Guangdong-Hong Kong-Macao Greater Bay Area Artificial Intelligence and Big Data ForumPages 209–214https://doi.org/10.1145/3660395.3660432Railway stations serve as vital locations for passenger boarding and alighting. With the continuous advancement of station intelligence, it is necessary to enhance the intelligence of fire emergency evacuation indication under existing railway standards. ...
- research-articleSeptember 2023
Understanding the Micro-Behaviors of Hardware Offloaded Network Stacks with Lumina
ACM SIGCOMM '23: Proceedings of the ACM SIGCOMM 2023 ConferencePages 1074–1087https://doi.org/10.1145/3603269.3604837Hardware offloaded network stacks are widely adopted in modern datacenters to meet the demand for high throughput, ultra-low latency and low CPU overhead. To fully leverage their exceptional performance, users need to have a deep understanding of their ...
- research-articleJune 2023
Towards a Manageable Intra-Host Network
HOTOS '23: Proceedings of the 19th Workshop on Hot Topics in Operating SystemsPages 206–213https://doi.org/10.1145/3593856.3595890Intra-host networks, including heterogeneous devices and interconnect fabrics, have become increasingly complex and crucial. However, intra-host networks today do not provide sufficient manageability. This prevents data center operators from running a ...
- research-articleMay 2023
FlexPass: A Case for Flexible Credit-based Transport for Datacenter Networks
EuroSys '23: Proceedings of the Eighteenth European Conference on Computer SystemsPages 606–622https://doi.org/10.1145/3552326.3587453Proactive transports explicitly allocate bandwidth to each sender with credits which schedule packet transmission. While promising, existing proactive solutions share a stringent deployment requirement; they assume the perfect control of every link ...
- research-articleApril 2023
Consensus and complementary regularized non-negative matrix factorization for multi-view image clustering
Information Sciences: an International Journal (ISCI), Volume 623, Issue CPages 524–538https://doi.org/10.1016/j.ins.2022.12.063AbstractMulti-view clustering (MVC) aims to classify objects using multi-view data. Many existing MVC methods explore the consensus agreement among views or enhance the complementary features from multiple views in order to improve the clustering ...
- research-articleMarch 2023
A fast user actual privilege reasoning framework based on privilege dependency graph reduction
IET Information Security (ISE2), Volume 17, Issue 3Pages 505–517https://doi.org/10.1049/ise2.12112AbstractIt is a key point to find out the actual privileges of network users in network security risk assessment. The Privilege dependency graph (PDG) provides an effective way to reason the actual privileges of network users from their initial ...
The Privilege Dependency Graph provides an effective way to reason the actual privileges of users from their initial privileges. This paper introduces a fast user actual privilege reasoning framework based on privilege dependency graph reduction. The ...
- research-articleFebruary 2023
Hierarchical network security situation awareness data fusion method in cloud computing environment
Journal of Computational Methods in Sciences and Engineering (JOCMSE), Volume 23, Issue 1Pages 237–251https://doi.org/10.3233/JCM-226542In order to improve the accuracy of hierarchical network security situational awareness data fusion and shorten the fusion time, this paper proposes a hierarchical network security situational awareness data fusion method in cloud computing environment. ...
- research-articleJanuary 2023
An ENet Semantic Segmentation Method Combined with Attention Mechanism
Computational Intelligence and Neuroscience (CIAN), Volume 2023https://doi.org/10.1155/2023/6965259Image semantic segmentation is one of the core tasks for computer vision. It is widely used in fields such as unmanned driving, medical image processing, geographic information systems, and intelligent robots. Aiming at the problem that the existing ...
- ArticleDecember 2022
The Research of Metaverse Application in Intelligent Railway Passenger Station
Metaverse – METAVERSE 2022Pages 111–117https://doi.org/10.1007/978-3-031-23518-4_10AbstractAs an emerging concept, the metaverse has received a lot of attention and is now being researched for applications in many fields, including industry, education, healthcare, cultural tourism, and the construction industry. An enhanced intelligent ...
- research-articleNovember 2022
Investigation and optimization of electro-thermal performance of Double Gate-All-Around MOSFET
Microelectronics Journal (MICROJ), Volume 129, Issue Chttps://doi.org/10.1016/j.mejo.2022.105540AbstractThe Double Gate-All-Around (DGAA) MOSFET and GAA NWFET are compared and analyzed from both electrical and thermal perspectives under four different conditions by adjusting the channel radius of the NWFET (RGAA). DGAA MOSFET is found to ...
Highlights- Hetero-Gate-Dielectric structure was adopted in DGAA MOSFET for the first time and its impact on the electro-thermal performance was evaluated.
- research-articleApril 2022
Congestion Control for Cross-Datacenter Networks
IEEE/ACM Transactions on Networking (TON), Volume 30, Issue 5Pages 2074–2089https://doi.org/10.1109/TNET.2022.3161580Geographically distributed applications hosted on cloud are becoming prevalent. They run on <italic>cross-datacenter network</italic> that consists of multiple data center networks (DCNs) connected by a wide area network (WAN). Such a cross-DC network ...
- research-articleJanuary 2022
ML-SDNIDS: an attack detection mechanism for SDN based on machine learning
International Journal of Information and Computer Security (IJICS), Volume 19, Issue 1-2Pages 118–141https://doi.org/10.1504/ijics.2022.126759With the rapid development of network technology, there are more and more application scenarios of software defined networking (SDN), such as big data, cloud computing, internet of things, etc. However, the facilities in the SDN network face security ...