no code implementations • 15 Sep 2023 • Qin Wang, Guangsheng Yu, Shiping Chen
We conduct a multi-dimensional investigation, which includes a factual summary, analysis of user sentiment, and examination of market performance.
no code implementations • 12 Mar 2023 • Linh T. Nguyen, Lam Duc Nguyen, Thong Hoang, Dilum Bandara, Qin Wang, Qinghua Lu, Xiwei Xu, Liming Zhu, Petar Popovski, Shiping Chen
Second, we focus on the convergence of blockchain and data sharing to give a clear picture of this landscape and propose a reference architecture for blockchain-based data sharing.
no code implementations • 18 Nov 2022 • Guanqin Zhang, Jiankun Sun, Feng Xu, H. M. N. Dilum Bandara, Shiping Chen, Yulei Sui, Tim Menzies
Deep neural networks (DNNs), are widely used in many industries such as image recognition, supply chain, medical diagnosis, and autonomous driving.
no code implementations • 20 Apr 2022 • Ji Liu, Zheng Xu, Yanmei Zhang, Wei Dai, Hao Wu, Shiping Chen
Since the emergence of blockchain technology, its application in the financial market has always been an area of focus and exploration by all parties.
no code implementations • 16 Feb 2021 • Mengzhi Wu, Qian Liu, Ping Li, Shi Chen, Binlong Wang, Wenhan Shen, Shiping Chen, Yangheng Zheng, Yigang Xie, Jin Li
The IBF and the transparent rate of electrons are two essential indicators of TPC, which affect the energy resolution and counting rate respectively.
Instrumentation and Detectors High Energy Physics - Experiment
no code implementations • 6 Sep 2020 • Weishan Zhang, Qinghua Lu, Qiuyu Yu, Zhaotong Li, Yue Liu, Sin Kit Lo, Shiping Chen, Xiwei Xu, Liming Zhu
Therefore, in this paper, we present a platform architecture of blockchain-based federated learning systems for failure detection in IIoT.
4 code implementations • 18 Feb 2019 • Yansong Gao, Chang Xu, Derui Wang, Shiping Chen, Damith C. Ranasinghe, Surya Nepal
Since the trojan trigger is a secret guarded and exploited by the attacker, detecting such trojan inputs is a challenge, especially at run-time when models are in active operation.
Cryptography and Security
no code implementations • 9 Mar 2018 • Mahmood Yousefi-Azar, Len Hamey, Vijay Varadharajan, Shiping Chen
We show feature extraction, which is performed by tf -simhashing, is equivalent to the first layer of a particular neural network.
Cryptography and Security