期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (4)
Deployment of access point (AP) is a problem that must be considered in network planning. However, this problem is usually a NP-hard problem which is ......
期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (7)
It has been widely acknowledged that occlusion impairments adversely distress many face recognition algorithms' performance. Therefore, it is crucial ......
期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (3)
In recent years, deep reinforcement learning (DRL) models are enjoying great interest as their success in a variety of challenging tasks. Deep Q-Netwo......
期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (5)
Document image binarization is an important pre-processing step in document analysis and archiving. The state-of-the-art models for document image bin......
期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (6)
Channel characteristic-based physical layer authentication is one potential identity authentication scheme in wireless communication, such as used in ......
期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (7)
In this paper, we derive the expression of the cache hitting probability with random caching policy and propose the joint optimization algorithm based......
期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (6)
Named Entity Recognition (NER) is used to identify entity nouns in the corpus such as Location, Person and Organization, etc. NER is also an important......
期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (5)
An image with infrared features and visible details is obtained by processing infrared and visible images. In this paper, a fusion method based on Lap......
期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (7)
Compared with vehicle trajectories, pedestrian trajectories have stronger degrees of freedom and complexity, which poses a higher challenge to traject......
期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (8)
Mobile Crowdsourcing (MCS) has become an emerging paradigm evolved from crowdsourcing by employing advanced features of mobile devices such as smartph......
期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (4)
In online competitive social networks, each user can be influenced by different competing influencers and consequently chooses different products. But......
期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (7)
Segment routing (SR) is a highly implementable approach for traffic engineering (TE) with high flexibility, high scalability, and high stability, whic......
期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (4)
Proof-of-Work (PoW) is the first and still most common consensus protocol in blockchain. But it is costly and energy intensive, aiming at addressing t......
期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (4)
Emotional style of multimedia art works are abstract content information. This study aims to explore emotional style transfer method and find the poss......
期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (5)
Cyber deception defense mitigates Advanced Persistent Threats (APTs) with deploying deceptive entities, such as the Honeyfile. The Honeyfile distracts......
