scispace - formally typeset
H

Huanhuan Li

Researcher at China University of Geosciences (Wuhan)

Publications -  7
Citations -  65

Huanhuan Li is an academic researcher from China University of Geosciences (Wuhan). The author has contributed to research in topics: k-means clustering & Computer science. The author has an hindex of 2, co-authored 4 publications receiving 22 citations.

Papers
More filters
Journal ArticleDOI

Task Allocation for Multi-Agent Systems Based on Distributed Many-Objective Evolutionary Algorithm and Greedy Algorithm

TL;DR: This paper combines a distributed many-objective evolutionary algorithm called D-NSGA3 with a greedy algorithm to search the task allocation solutions, and comprehensively considers the constraints related to space, time, energy consumption and agent function in multi-agent systems.
Journal ArticleDOI

k-means clustering and kNN classification based on negative databases

TL;DR: A new NDB generation algorithm that employs a new set of parameters to control the selection of different bits when generating NDB records, and this enables a fine-grained control of the accuracy of distance estimation, and proposes an approach specialized for estimating Euclidean distance from the NDBs generated by the Q K -hidden algorithm.
Book ChapterDOI

Negative Survey with Manual Selection: A Case Study in Chinese Universities

TL;DR: This paper proposes a method called NStoPS-MLE, which is based on the maximum likelihood estimation, for reconstructing useful information from the collected data and shows that this method can get more accurate aggregated results than previous methods.
Proceedings ArticleDOI

A Fine-grained Privacy-preserving k-means Clustering Algorithm Upon Negative Databases

TL;DR: This paper proposes a new NDB generation algorithm (named QK-hidden algorithm), and based on this algorithm, a privacy-preserving k-means algorithm which can control the accuracy of distance estimation in a fine-grained manner and thus it can Control the clustering results granularly.

Competitor Attack Model for Privacy-Preserving Deep Learning

TL;DR: Zhang et al. as mentioned in this paper investigated the security of existing PPDL methods and established a new attack model, which may be exploited by the competitors of the owners of private data, and the experimental results on three public datasets, i.e., MNIST, CIFAR10 and LFW, demonstrate that the selected methods tend to be vulnerable to CAM.