Papers published on a yearly basis
Papers
More filters
••
TL;DR: Results demonstrated that for a familiar brand, people’s perceived creativity of an ad is biased by their preexisting brand attitudes, and revealed that the three dimension of ad creativity play different roles in ad effectiveness.
Abstract: This study aims to examine the role of ad creativity in YouTube video ads featuring augmented reality (AR) technology. Through an online experiment, we compared people who hold positive pre...
16 citations
••
TL;DR: A cross-band spectrum prediction model based on transfer learning is proposed and experimental results demonstrate that the performance of the proposed model is better than the state-of-the-art models when the historical spectrum data is limited.
Abstract: Spectrum prediction is a promising technology to infer future spectrum state by exploiting inherent patterns of historical spectrum data. In practice, for a given spectrum band of interest, when facing relatively scarce historical data, spectrum prediction based on traditional learning methods does not work well. Thus, this paper proposes a cross-band spectrum prediction model based on transfer learning. Firstly, by analysing service activities and computing the distances between various frequency points based on Dynamic Time Warping, the similarity between spectrum bands has been verified. Next, the features, which mainly affect the performance of transfer learning in the crossband spectrum prediction, are explored by leveraging transfer component analysis. Then, the effectiveness of transfer learning for the cross-band spectrum prediction has been demonstrated. Further, experimental results with real-world spectrum data demonstrate that the performance of the proposed model is better than the state-of-the-art models when the historical spectrum data is limited.
16 citations
••
TL;DR: This paper proposes a new outranking method called Prioritized PROMETHEE (P-PROMethEE) method, which is used to deal with the ranking problem of Prioritized Multiple Criteria Decision Making (PMCDM).
Abstract: The Multiple Criteria Decision Aiding (MCDA) has been a fast growing area of operations research and management science during the last decades, while the PROMETHEE (Preference Ranking Organization Method for Enrichment Evaluations) is one of the well-known MCDA methods with ranking the alternatives from the best to the worst. In this paper, we propose a new outranking method called Prioritized PROMETHEE (P-PROMETHEE) method, which is used to deal with the ranking problem of Prioritized Multiple Criteria Decision Making (PMCDM). First, we use the idea of entropy to get the information of each criterion in the same prioritized level, which is used to get the weight of each criterion. Then, we use the weighted average operator to aggregate all the criteria in the same prioritized level. Moreover, we apply Yager's prioritized measure-guided aggregation operator to the classical PROMETHEE method to get the P-PROMETHEE method. Finally, we give a practical example to illustrate the effectiveness of the P-PROMETHEE method.
15 citations
••
TL;DR: This paper investigates physical layer security of cognitive mmWave wiretap networks, where the secondary transmitter sends confidential messages to a secondary receiver (SU-Rx) under the interference temperature constraint of a primary receiver (PU-RX).
Abstract: Millimeter wave (mmWave) communications and cognitive radio networks are two key technologies to improve the spectral efficiency. For a cognitive mmWave wiretap network in which randomly located eavesdroppers may reside in the signal beam of the secondary network, confidential messages could still be wiretapped. Moreover, the primary user may be covered by the main lobe generated by directional beamforming of the secondary network, the interference to the primary network is an inevitable problem. Motivated by these challenges, in this paper we investigate physical layer security of cognitive mmWave wiretap networks, where the secondary transmitter (SU-Tx) sends confidential messages to a secondary receiver (SU-Rx) under the interference temperature constraint of a primary receiver (PU-Rx). Thereby, two different secure transmission schemes, namely complete transmission (CT) scheme and threshold-based (TB) scheme are introduced to investigate the reliability and security performance of SU-Rx. Specifically, under stochastic geometry framework, we derive closed-form expressions for the connection outage probability (COP), secrecy outage probability (SOP) and secrecy throughput (ST) to characterize the performance for both schemes. The numerical and analysis results reveal that the reliability and security of SU-Rx in both schemes can be balanced by the interference temperature constraint of PU-Rx. Besides, when the SU-Rx requires both security and reliability, TB scheme shows its superiority, and CT scheme is more suitable for the scenario where SU-Rx only requires higher security.
15 citations
••
TL;DR: The authors explored the effect of incidental news exposure on the democratic process and found that the ease and openness of discussion online can be a significant influence on democratic process. But limited work has explored how the ease of online int...
Abstract: Scholars have for some time shed light on the effects incidental news exposure have for the democratic process. However, limited work has explored how the ease and openness of discussion online int...
15 citations
Authors
Showing all 2106 results
Name | H-index | Papers | Citations |
---|---|---|---|
Xiang-Gen Xia | 72 | 744 | 20563 |
Wei Xiong | 58 | 364 | 10835 |
S. Shyam Sundar | 53 | 210 | 10261 |
Mary Beth Oliver | 40 | 151 | 6854 |
James E. Katz | 39 | 152 | 8957 |
Qihui Wu | 39 | 295 | 7001 |
Timothy L. Sellnow | 37 | 137 | 5557 |
Homero Gil de Zúñiga | 37 | 134 | 8158 |
J. David Johnson | 31 | 100 | 3924 |
Zizi Papacharissi | 30 | 63 | 9078 |
Guoru Ding | 30 | 155 | 4729 |
Jinlong Wang | 29 | 127 | 3201 |
Yueming Cai | 29 | 206 | 3198 |
Yuhua Xu | 29 | 170 | 4196 |
Panlong Yang | 27 | 191 | 2374 |