Institution
Beijing University of Posts and Telecommunications
Education•Beijing, Beijing, China•
About: Beijing University of Posts and Telecommunications is a education organization based out in Beijing, Beijing, China. It is known for research contribution in the topics: MIMO & Quality of service. The organization has 39576 authors who have published 41525 publications receiving 403759 citations. The organization is also known as: BUPT.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: A new color image encryption scheme based on DNA operations and spatiotemporal chaotic system is presented and the key streams are associated with the secret keys and plain image, which can ensure the cryptosystem plain-image-dependent and improve the ability to resist known-plaintext or chosen-plain text attacks.
Abstract: In this paper, a new color image encryption scheme based on DNA operations and spatiotemporal chaotic system is presented. Firstly, to hide the distribution information of the plain image, we convert the plain image into three DNA matrices based on the DNA random encoding rules. Then, the DNA matrices are combined into a new matrix and is permutated by a scramble matrix generated by mixed linear-nonlinear coupled map lattices (MLNCML) system. In which, the key streams are associated with the secret keys and plain image, which can ensure our cryptosystem plain-image-dependent and improve the ability to resist known-plaintext or chosen-plaintext attacks. Thereafter, to resist statistical attacks, the scrambled matrix is decomposed into three matrices and diffused by DNA deletion-insertion operations. Finally, the three matrices are decoded based on DNA random decoding rules and recombined to three channels of the cipher image. Simulation results demonstrate that the proposed image cryptosystem has good security and can resist various potential attacks.
102 citations
••
TL;DR: A new anomaly detection framework is proposed, and this framework is based on the organic integration of multiple deep learning techniques and shows that the HELAD algorithm has better adaptability and accuracy than other state of the art algorithms.
102 citations
••
TL;DR: Wang et al. as mentioned in this paper investigated the reason that people use mobile data services in China and presented an extended technology acceptance model (TAM), which combines with subscribers' experience factors.
Abstract: Mobile data services are entering into all aspects of people's life and are expected to be an important revenue source of telecom carriers. Nevertheless, the acceptance pace of mobile data services is slower than the expected level projected by the telecommunication industry. This research investigated the reason that people use mobile data services in China. Combined with subscribers' experience factors, an extended technology acceptance model (TAM) for mobile data services was presented. The model was tested using data collected from 802 mobile subscribers. The findings of the study indicate that mobile voice service and innovation experience of mobile data services affect subscribers' consumption intention greatly; subscribers' perceived ease-of-use and brand experience influence subscribers' attitude towards mobile data services largely. Promotion of mobile data services is most effective when it is promoted with perfect voice service experience. Additionally, our findings suggest that mobile service carriers need to enhance their investments in mobile data services' R&D. Collaboration among the value chain members of mobile data services will promise cutting-edge new products and services. Using system methodology, a mobile data service infusion system model was constructed to explain the general adoption rules of mobile data services. The adoption of mobile data services in mobile logistics area was also discussed. Copyright © 2009 John Wiley & Sons, Ltd.
102 citations
••
TL;DR: Experimental results show that the robustness, accuracy and efficiency of the proposed UP method compare favorably to the state-of-the-art one sample based methods.
102 citations
••
08 Apr 2019
TL;DR: Zhang et al. as mentioned in this paper proposed to directly keep track of the negative triplets with cache, which can improve the performance of negative sampling in KG embeddings by avoiding the vanishing gradient problem.
Abstract: Knowledge graph (KG) embedding is a fundamental problem in data mining research with many real-world applications. It aims to encode the entities and relations in the graph into low dimensional vector space, which can be used for subsequent algorithms. Negative sampling, which samples negative triplets from non-observed ones in the training data, is an important step in KG embedding. Recently, generative adversarial network (GAN), has been introduced in negative sampling. By sampling negative triplets with large scores, these methods avoid the problem of vanishing gradient and thus obtain better performance. However, using GAN makes the original model more complex and harder to train, where reinforcement learning must be used. In this paper, motivated by the observation that negative triplets with large scores are important but rare, we propose to directly keep track of them with cache. However, how to sample from and update the cache are two important questions. We carefully design the solutions, which are not only efficient but also achieve good balance between exploration and exploitation. In this way, our method acts as a "distilled" version of previous GAN-based methods, which does not waste training time on additional parameters to fit the full distribution of negative triplets. The extensive experiments show that our method can gain significant improvement on various KG embedding models, and outperform the state-of-the-arts negative sampling methods based on GAN.
102 citations
Authors
Showing all 39925 results
Name | H-index | Papers | Citations |
---|---|---|---|
Jie Zhang | 178 | 4857 | 221720 |
Jian Li | 133 | 2863 | 87131 |
Ming Li | 103 | 1669 | 62672 |
Kang G. Shin | 98 | 885 | 38572 |
Lei Liu | 98 | 2041 | 51163 |
Muhammad Shoaib | 97 | 1333 | 47617 |
Stan Z. Li | 97 | 532 | 41793 |
Qi Tian | 96 | 1030 | 41010 |
Xiaodong Xu | 94 | 1122 | 50817 |
Qi-Kun Xue | 84 | 589 | 30908 |
Long Wang | 84 | 835 | 30926 |
Jing Zhou | 84 | 533 | 37101 |
Hao Yu | 81 | 981 | 27765 |
Mohsen Guizani | 79 | 1110 | 31282 |
Muhammad Iqbal | 77 | 961 | 23821 |