A survey on resource management in joint communication and computing-embedded SAGIN

Q Chen, Z Guo, W Meng, S Han, C Li… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The advent of the 6G era aims for ubiquitous connectivity, with the integration of non-
terrestrial networks (NTN) offering extensive coverage and enhanced capacity. As …

Bi-real net: Enhancing the performance of 1-bit cnns with improved representational capability and advanced training algorithm

Z Liu, B Wu, W Luo, X Yang, W Liu… - Proceedings of the …, 2018 - openaccess.thecvf.com
In this work, we study the 1-bit convolutional neural networks (CNNs), of which both the
weights and activations are binary. While being efficient, the classification accuracy of the …

Unsupervised deep hashing with similarity-adaptive and discrete optimization

F Shen, Y Xu, L Liu, Y Yang, Z Huang… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Recent vision and learning studies show that learning compact hash codes can facilitate
massive data processing with significantly reduced storage and computation. Particularly …

Peer-to-peer joint electricity and carbon trading based on carbon-aware distribution locational marginal pricing

Z Lu, L Bai, J Wang, J Wei, Y Xiao… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
This paper proposes a novel Peer-to-Peer (P2P) joint electricity and carbon (E&C) trading
model to co-optimize the energy and carbon emissions permit transactions considering the …

Top-k Feature Selection Framework Using Robust 0–1 Integer Programming

X Zhang, M Fan, D Wang, P Zhou… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Feature selection (FS), which identifies the relevant features in a data set to facilitate
subsequent data analysis, is a fundamental problem in machine learning and has been …

Sparse adversarial attack via perturbation factorization

Y Fan, B Wu, T Li, Y Zhang, M Li, Z Li… - Computer Vision–ECCV …, 2020 - Springer
This work studies the sparse adversarial attack, which aims to generate adversarial
perturbations onto partial positions of one benign image, such that the perturbed image is …

A two-timescale duplex neurodynamic approach to mixed-integer optimization

H Che, J Wang - IEEE Transactions on Neural Networks and …, 2020 - ieeexplore.ieee.org
This article presents a two-timescale duplex neurodynamic approach to mixed-integer
optimization, based on a biconvex optimization problem reformulation with additional …

Compressing convolutional neural networks via factorized convolutional filters

T Li, B Wu, Y Yang, Y Fan… - Proceedings of the …, 2019 - openaccess.thecvf.com
This work studies the model compression for deep convolutional neural networks (CNNs)
via filter pruning. The workflow of a traditional pruning consists of three sequential stages …

A survey on high-dimensional subspace clustering

W Qu, X Xiu, H Chen, L Kong - Mathematics, 2023 - mdpi.com
With the rapid development of science and technology, high-dimensional data have been
widely used in various fields. Due to the complex characteristics of high-dimensional data, it …

Deep hashing with minimal-distance-separated hash centers

L Wang, Y Pan, C Liu, H Lai, J Yin… - Proceedings of the …, 2023 - openaccess.thecvf.com
Deep hashing is an appealing approach for large-scale image retrieval. Most existing
supervised deep hashing methods learn hash functions using pairwise or triple image …