no code implementations • 24 Nov 2023 • Yuheng Zhang, Pin Liu, Guojun Wang, Peiqiang Li, Wanyi Gu, Houji Chen, Xuelei Liu, Jinyao Zhu
Front-running attacks, a unique form of security threat, pose significant challenges to the integrity of blockchain transactions.
1 code implementation • 2 Nov 2020 • Guojun Wang, Bin Tian, Yachen Zhang, Long Chen, Dongpu Cao, Jian Wu
3D object detection based on LiDAR-camera fusion is becoming an emerging research theme for autonomous driving.
2 code implementations • 13 Jul 2020 • Guojun Wang, Jian Wu, Bin Tian, Siyu Teng, Long Chen, Dongpu Cao
However, because inherent sparsity of point clouds, 3D object center points are likely to be in empty space which makes it difficult to estimate accurate boundaries.
no code implementations • 21 Apr 2020 • Amir Javadpour, Samira Rezaei, Kuan-Ching Li, Guojun Wang
In this article, the Whale Optimization algorithm is considered and applied to the search for the optimum subset of features.