Shuai Chen

ORCID: 0000-0003-1228-8550
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Chaos-based Image/Signal Encryption
  • Security in Wireless Sensor Networks
  • Video Surveillance and Tracking Methods
  • Advanced Sensor and Control Systems
  • Infrared Target Detection Methodologies
  • Recommender Systems and Techniques
  • AI in cancer detection
  • Image Retrieval and Classification Techniques
  • Advanced Computational Techniques and Applications
  • UAV Applications and Optimization
  • Inertial Sensor and Navigation
  • Cryptographic Implementations and Security
  • Advanced Algorithms and Applications
  • Image and Object Detection Techniques
  • Power Line Inspection Robots
  • Mobile Ad Hoc Networks
  • Advanced Bandit Algorithms Research
  • Advanced Measurement and Detection Methods
  • Advanced Neural Network Applications
  • Music Technology and Sound Studies
  • Wireless Sensor Networks and IoT
  • Image Processing Techniques and Applications
  • Target Tracking and Data Fusion in Sensor Networks
  • Radiomics and Machine Learning in Medical Imaging

North China Electric Power University
2024

China Electric Power Research Institute
2024

Liaoning Shihua University
2023

Zhejiang Gongshang University
2022

Erasmus University Rotterdam
2020

Erasmus MC
2020

Naval University of Engineering
2019-2020

Alibaba Group (China)
2020

Beijing Institute of Technology
2017

Beihang University
2017

Recently, the application of deep reinforcement learning into field session-based interactive recommendation has attracted great attention from researchers. However, despite that some models based on have been proposed, they still suffer to following limitations: (1) these works ignore skip behaviors sequential patterns in users' clicking behavior; (2) fail incorporate positive feedback and negative proposed recommender system when is sparse. Therefore, solve problems mentioned above, a...

10.1109/icdm.2019.00122 article EN 2021 IEEE International Conference on Data Mining (ICDM) 2019-11-01

10.1007/s11432-008-0102-5 article EN Science in China Series F Information Sciences 2008-07-03

With the development of autonomous perception and obstacle avoidance technologies for power lines inspection using unmanned aerial vehicles(UAV), methods extraction distance measurement from binocular images become spotlights gradually. In this paper, Ratio detection operator fast Hough transform are adopted to extract pixels detect straight respectively, a pair selected by demand-based strategy further. Then, aim at lines, method constructing homonymy points based on linear hypothesis line...

10.1109/ihmsc.2017.131 article EN 2017-08-01

Many prediction tasks of real-world applications need to model multi-order feature interactions in user's event sequence for better detection performance. However, existing popular solutions usually suffer two key issues: 1) only focusing on and failing capture the influence; 2) information, but ignoring internal relations each event, thus extract a representation. In this paper, we consider two-level structure capturing hierarchical information over sequence: learning effective based...

10.1145/3397271.3401307 preprint EN 2020-07-25

Nowadays, unmanned aerial vehicles (UAVs) have achieved massive improvement, which brings great convenience and advantage. Meanwhile, threats posed by them may damage public security personal safety. This article proposes an architecture of intelligent anti-UAVs low-altitude defense system. To address the key problem discovering UAVs, research based on multisensor information fusion is carried out. Firstly, to solve probing suspicious targets, a method designed, combines radar photoelectric...

10.1177/1729881420962907 article EN cc-by International Journal of Advanced Robotic Systems 2020-09-01

10.1016/s1006-1266(07)60084-4 article EN Journal of China University of Mining and Technology 2007-06-01

10.1016/s1005-8885(07)60054-5 article EN The Journal of China Universities of Posts and Telecommunications 2007-03-01

In the research of interactive music generation, we propose a generation method, that computer generates music, under recognition human conductor's gestures. this research, generated is tuned by recognized gestures for parameters network chaotic elements in realtime. To make outcomes more closer to different method proposed melody specifiable. Music theories are embedded algorithm, as result, will be richer. Furthermore, reconstructed system and performed experiment generating composed human.

10.1109/fuzz-ieee.2014.6891811 article EN 2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) 2014-07-01

In order to enhance safety and improve the multimedia wireless sensor information's confidentiality information processing speed, research of data encryption chip core is proposed. Under action key, can encrypt plaintext decrypt cipher text from input port properly. The key must be randomly distributed. First, this paper analyzes encrypted architecture. Second, it introduces design principle chip, randomness. Finally, work function designed nuclear verified by experiments. correctly....

10.1109/jsen.2016.2539391 article EN IEEE Sensors Journal 2016-03-08

New fast algorithm has be brought forward for the linear congruence generator such as y(n+1)=(16807 × y(n))mod(2^31-1) and realized. The calls one time 32-bit multiplier; two-times adders, a few bit shifters highest segregator, with excluding subtraction division. experiment shows that is 40 percent more than other algorithm. realized in hard describing language three registers.

10.1109/iccse.2010.5593821 article EN 2010-08-01

With its miniaturization, intelligence, popularization and diversification, drones have become one of the most rapidly developing emerging industries in recent years. However, illegal use leads to more threats key areas, there are problems such as difficult detection lack effective means interception. In view targets, methods defense systematically sorted out. Based on advantages disadvantages each equipment, this paper puts forward an important anti-drone architecture for prevention...

10.1109/ccdc49329.2020.9164114 article EN 2020-08-01

With the energy consumption, new route may be reconstructed with sufficient nodes. In order to evaluate of nodes, an consumption model was raised calculate node in wireless sensor networks. The nodes setup data structure, rule and radio networks radio. simulation algorithm designed realized. result shows that can simulate for which is helpful algorithm.

10.4028/www.scientific.net/amr.588-589.664 article EN Advanced materials research 2012-11-01

Despite demonstrating superior rate-distortion (RD) performance, learning-based image compression (LIC) algorithms have been found to be vulnerable malicious perturbations in recent studies. Adversarial samples these studies are designed attack only one dimension of either bitrate or distortion, targeting a submodel with specific ratio. However, adversaries real-world scenarios neither confined singular dimensional attacks nor always control over ratios. This variability highlights the...

10.48550/arxiv.2405.07717 preprint EN arXiv (Cornell University) 2024-05-13

The research on intent-enhanced sequential recommendation algorithms focuses how to better mine dynamic user intent based behavior data for tasks. Various augmentation methods are widely applied in current algorithms, effectively enhancing the ability capture intent. However, these used often rely a large amount of random sampling, which can introduce excessive noise into training data, blur intent, and thus negatively affect performance. Additionally, have limited approaches utilizing...

10.48550/arxiv.2410.08583 preprint EN arXiv (Cornell University) 2024-10-11

Video traffic surveillance is of high interest in the field intelligent transportation systems and moving vehicle tracking an essential technique. Particle filter approximate optimal Bayesian solution for as a nonlinear or non-Gaussian system. In this paper method based on PF presented, which combines gray contour feature particles using fusion algorithm to balance weights according present scene. It adaptable scene because it utilizes advantage proper The experiments demonstrate that...

10.1109/iciecs.2009.5362802 article EN International Conference on Information Engineering and Computer Science 2009-12-01

With the rapid development of medical imaging technologies, high-resolution CT image data is great value for research as well a clinical diagnosis. The paper takes lung an example. Retrieving images similar to input one helpful assist physicians in Compared with traditional content-based retrieval, similarity retrieval requires higher accuracy, requirements external shape internal vascular and lesion location similarity. In state-of-the-art supervised deep learning networks, network relies...

10.1109/access.2022.3174099 article EN cc-by IEEE Access 2022-01-01
Coming Soon ...