Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Haiqin Weng"'
Towards Understanding the Security of Modern Image Captchas and Underground Captcha-Solving Services
Publikováno v:
Big Data Mining and Analytics, Vol 2, Iss 2, Pp 118-144 (2019)
Image captchas have recently become very popular and are widely deployed across the Internet to defend against abusive programs. However, the ever-advancing capabilities of computer vision have gradually diminished the security of image captchas and
Externí odkaz:
https://doaj.org/article/4c937b07117b47dba1a02674d57ddd13
Publikováno v:
Journal of Human Kinetics. 87:133-141
The aim of this study was to investigate the peak running, mechanical, and physiological demands of players of different positions in professional men's field hockey matches. Eighteen professional male field hockey players participated in the study,
Publikováno v:
Kinesiology. 55:73-84
The aim of this study was to investigate the physical demands, physiological demands, and movement profiles of different positions across four quarters in professional men’s field hockey games. Eighteen professional male field hockey players partic
Autor:
Ting Wang, Shanqing Guo, Haiqin Weng, Zonghui Wang, Shouling Ji, Bo Li, Raheem Beyah, Changjiang Li, Jie Shi
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:3987-4001
Autor:
Haiqin Weng, Jingzheng Wu, Raheem Beyah, Wei-Han Lee, Liming Fang, Shouling Ji, Binbin Zhao, Changting Lin, Pan Zhou
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:1826-1840
The Internet of Things (IoT) has become ubiquitous and greatly affected peoples‘ daily lives. With the increasing development of IoT devices, the corresponding security issues are becoming more and more challenging. Such a severe security situation
Publikováno v:
IJCAI
Deep image inpainting aims to restore damaged or missing regions in an image with realistic contents. While having a wide range of applications such as object removal and image recovery, deep inpainting techniques also have the risk of being manipula
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cb006ea46dfaf927f2fcb0a580bc11ed
http://arxiv.org/abs/2106.01532
http://arxiv.org/abs/2106.01532
Towards understanding the security of modern image captchas and underground captcha-solving services
Publikováno v:
Big Data Mining and Analytics. 2:118-144
Image captchas have recently become very popular and are widely deployed across the Internet to defend against abusive programs. However, the ever-advancing capabilities of computer vision have gradually diminished the security of image captchas and
Publikováno v:
Expert Systems with Applications. 114:503-515
Starting from a few labelled data examples as the seeds, rare category exploration (RCE) aims to find out the target rare category hidden in the given dataset. However, the performance of conventional RCE approaches is very sensitive to noisy labels
Autor:
Ting Wang, Raheem Beyah, Qianjun Liu, Jing Chen, Pan Zhou, Haiqin Weng, Shouling Ji, Qinchen Gu, Zhao Li
Publikováno v:
ICDE
In this paper, we study the privacy of online health data. We present a novel online health data De-Anonymization (DA) framework, named De-Health. Leveraging two real world online health datasets WebMD and HealthBoards, we validate the DA efficacy of
Publikováno v:
IEEE transactions on cybernetics. 51(10)
Rare classes are usually hidden in an imbalanced dataset with the majority of the data examples from major classes. Rare-class mining (RCM) aims at extracting all the data examples belonging to rare classes. Most of the existing approaches for RCM re