Qingyu Xiong

Learn More
In this paper, a functions localized network with branch gates (FLN-bg) is studied, which consists of a basic network and a branch gate network. The branch gate network is used to determine which intermediate nodes of the basic network should be connected to the output node with a gate coefficient ranging from 0 to 1. This determination will adjust the(More)
Saliency region detection plays an important role in image pre-processing, and uniformly emphasizing saliency region is still an intractable problem in computer vision. In this paper, we present a data-driven salient region detection method via multi-feature (included contrast, spatial relationship and background prior, etc.) on absorbing Markov chain,(More)
—Wireless Sensor Networks (WSN) consists of distributed low-cost sensing nodes with autonomous network. Several anomalies can occur in wireless sensor networks that may form various coverage holes. These holes may disturb the existing coverage or connectivity, and impair desired functionalities of networks. Hence, it is essential to detect and recovery(More)
Recently, it is becoming increasingly difficult to implement effective systems for real-time network monitoring for large variety of applications including accounting, traffic identification and abnormal detection. The current solutions have to resort to custom capturing hardware that usually comes with high cost, and software-based capturing solutions,(More)
With the rapid development of e-business, personalized recommendation has become core competence for enterprises to gain profits and improve customer satisfaction. Although collaborative filtering is the most successful approach for building a recommender system, it suffers from "shilling" attacks. In recent years, the research on shilling attacks has been(More)
The accurate user click behavior identification is the precondition of web user behavior characters researching, but the growing complexity of web page makes it difficult to be identified. In this paper, a novel method to identify user click behavior is proposed and implemented. First, the sequence of user HTTP requests is described through hidden(More)