Zobrazeno 1 - 10
of 177
pro vyhledávání: '"JIA Xiaoqi"'
Autor:
Zhu, Kai, Guo, Chenkai, Yan, Kuihao, Jia, Xiaoqi, Du, Haichao, Huang, Qingjia, Xie, Yamin, Tang, Jing
Analyzing programs with loops is a challenging task, suffering from potential issues such as indeterminate number of iterations and exponential growth of control flow complexity. Loop summarization, as a static analysis method for concrete semantic i
Externí odkaz:
http://arxiv.org/abs/2411.02863
Autor:
Zhou, Qihang, Cao, Wenzhuo, Jia, Xiaoqi, Zhang, Shengzhi, Chen, Jiayun, Jiang, Nan, Zhang, Weijuan, Du, Haichao, Song, Zhenyu, Huang, Qingjia
Publikováno v:
In Computers & Security September 2024 144
Publikováno v:
In Expert Systems With Applications 1 December 2024 255 Part C
Autor:
Jia, Xiaoqi, Zhang, Shuaikang, Tang, Zhenhe, Xue, Kuanrong, Chen, Jingjing, Manickam, Sivakumar, Lin, Zhe, Sun, Xun, Zhu, Zuchao
Publikováno v:
In Ultrasonics Sonochemistry August 2024 108
Autor:
Sun, Xun, Xia, Gaoju, You, Weibin, Jia, Xiaoqi, Manickam, Sivakumar, Tao, Yang, Zhao, Shan, Yoon, Joon Yong, Xuan, Xiaoxu
Publikováno v:
In Ultrasonics Sonochemistry October 2023 99
Speaker verification, as a biometric authentication mechanism, has been widely used due to the pervasiveness of voice control on smart devices. However, the task of "in-the-wild" speaker verification is still challenging, considering the speech sampl
Externí odkaz:
http://arxiv.org/abs/1912.02608
Autor:
Jia, Xiaoqi, Tai, Jianwei, Zhou, Hang, Li, Yakai, Zhang, Weijuan, Du, Haichao, Huang, Qingjia
Despite the remarkable progress made in synthesizing emotional speech from text, it is still challenging to provide emotion information to existing speech segments. Previous methods mainly rely on parallel data, and few works have studied the general
Externí odkaz:
http://arxiv.org/abs/1905.11173
Publikováno v:
In Journal of Information Security and Applications June 2023 75
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
In Journal of Information Security and Applications March 2022 65