標(biāo)題: Titlebook: Artificial Intelligence and Security; 6th International Co Xingming Sun,Jinwei Wang,Elisa Bertino Conference proceedings 2020 Springer Natu [打印本頁(yè)] 作者: 輕佻 時(shí)間: 2025-3-21 17:24
書目名稱Artificial Intelligence and Security影響因子(影響力)
書目名稱Artificial Intelligence and Security影響因子(影響力)學(xué)科排名
書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開(kāi)度
書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱Artificial Intelligence and Security被引頻次
書目名稱Artificial Intelligence and Security被引頻次學(xué)科排名
書目名稱Artificial Intelligence and Security年度引用
書目名稱Artificial Intelligence and Security年度引用學(xué)科排名
書目名稱Artificial Intelligence and Security讀者反饋
書目名稱Artificial Intelligence and Security讀者反饋學(xué)科排名
作者: Compass 時(shí)間: 2025-3-21 21:37 作者: 上腭 時(shí)間: 2025-3-22 03:50
Stephan Helmreich,Hartmut Kellerus has become an indirect evidence of image forgery. Therefore, CA blind detection has attracted widespread attention in the field of image forensics in recent years. Considering forensic methods based on first-order statistical features are vulnerable to encountering anti-forensic and other operati作者: 被告 時(shí)間: 2025-3-22 06:14
https://doi.org/10.1007/978-3-642-13371-8k compression methods based on the low rank characteristics of the network structure are proposed. However, these methods fail to consider the inner similarity structure of the networks, leading to a performance degradation. In this paper, a novel hybrid low rank model based network compression meth作者: 不愛(ài)防注射 時(shí)間: 2025-3-22 10:09
Stephan Helmreich,Hartmut Kellerve the efficiency of urban rail transit operations and reduce the occurrence of accidents is very necessary to build a model of rail transit safety global factors. For the cases of rail transit accidents, the characteristics are recorded in the form of text. The CNN-LSTM method based on BERT embeddi作者: critic 時(shí)間: 2025-3-22 14:57
Stephan Helmreich,Hartmut Keller is used for ranging and coherent forwarding is used for carrier. In order to eliminate the error caused by the rapid movement of the aircraft, the relative velocity between the objects is measured and the ranging error is corrected. How to estimate the carrier frequency and pseudo code phase in the作者: 過(guò)度 時(shí)間: 2025-3-22 17:16
https://doi.org/10.1007/978-3-642-74375-7tion signal. In this algorithm, PMF?+?FFT is used to acquisition the signal and estimate the coarse value of carrier frequency and pseudo code phase. Then LM algorithm is used to solve the maximum likelihood function of the signal, so as to obtain the accurate estimation of carrier Doppler frequency作者: GRACE 時(shí)間: 2025-3-22 23:14 作者: 單獨(dú) 時(shí)間: 2025-3-23 02:03
Common Faults Found in GRP Mouldings, the message between two remote anticipators. In the free-space quantum communication, atmospheric turbulence causes fluctuations in transmittance, which further affects the quantum bit error rate (QBER) and signal-to-noise ratio (SNR). Under such circumstances, the intensity of some optical signals作者: 沒(méi)有準(zhǔn)備 時(shí)間: 2025-3-23 05:53 作者: aggravate 時(shí)間: 2025-3-23 13:35
On Clustering Using Random Walksclassifier design. To address this issue, we propose an end-to-end trainable convolutional neural networks (CNN) model for multimodal biometric recognition, where high-level feature can be abundantly extracted by convolution operation. In order to improve the recognition performance by feature level作者: avulsion 時(shí)間: 2025-3-23 17:42 作者: 富饒 時(shí)間: 2025-3-23 18:06
Subtyping Constraints in Quasi-latticesg method extracts facial features are less robust and the traditional convolutional neural network can not fully extract the expression features, a residual network model integrating CBAM attention mechanism is proposed. Given an intermediate feature map, a attention map is generated on the channel 作者: 放大 時(shí)間: 2025-3-24 01:32 作者: 使厭惡 時(shí)間: 2025-3-24 06:20 作者: hair-bulb 時(shí)間: 2025-3-24 08:46 作者: 狂亂 時(shí)間: 2025-3-24 13:20 作者: adjacent 時(shí)間: 2025-3-24 15:15 作者: 手榴彈 時(shí)間: 2025-3-24 19:08 作者: 多嘴多舌 時(shí)間: 2025-3-24 23:14
https://doi.org/10.1007/978-981-15-8086-4artificial intelligence; communication systems; computer hardware; computer networks; computer security; 作者: 小母馬 時(shí)間: 2025-3-25 04:51
978-981-15-8085-7Springer Nature Singapore Pte Ltd. 2020作者: Brocas-Area 時(shí)間: 2025-3-25 10:52 作者: AXIS 時(shí)間: 2025-3-25 13:44
GSSM: An Integration Model of?Heterogeneous Factors for?Point-of-Interest Recommendation etc. It has become an important function to recommend points-of-interest (POIs) for users based on their check-in records. However, the user-location matrix generated by check-in records is often very sparse which causes those traditional methods to present a suboptimal recommendation performance. 作者: Insatiable 時(shí)間: 2025-3-25 18:17 作者: Pruritus 時(shí)間: 2025-3-25 20:46 作者: NEXUS 時(shí)間: 2025-3-26 03:33
Research on Rail Traffic Safety Factor Model Based on Deep Learningve the efficiency of urban rail transit operations and reduce the occurrence of accidents is very necessary to build a model of rail transit safety global factors. For the cases of rail transit accidents, the characteristics are recorded in the form of text. The CNN-LSTM method based on BERT embeddi作者: 暫時(shí)別動(dòng) 時(shí)間: 2025-3-26 06:59 作者: CLAM 時(shí)間: 2025-3-26 10:56
A Study on PN Code Phase and Carrier Frequency Fast Estimation Technology for DSSS Signaltion signal. In this algorithm, PMF?+?FFT is used to acquisition the signal and estimate the coarse value of carrier frequency and pseudo code phase. Then LM algorithm is used to solve the maximum likelihood function of the signal, so as to obtain the accurate estimation of carrier Doppler frequency作者: 悅耳 時(shí)間: 2025-3-26 14:02
Research of Software Information Hiding Algorithm Based on Packing Technologyles, PE file packing, PE file code encryption, PE file information implantation, PE file information extraction, etc. The system uses the dynamic link library as a shell program, implants the end of the target PE file, implants the given information into the code segment, and encrypts the code segme作者: 樹(shù)木中 時(shí)間: 2025-3-26 19:21 作者: 健談 時(shí)間: 2025-3-27 00:56
Design of Intelligent Mobile Robot Control System Based on Gesture Recognitionile also avoiding a series of potential hidden dangers. This study aims to design an intelligent mobile robot control system based on gesture recognition which allows people to control the forward, backward and steering of the mobile robot through simple gestures. For gesture recognition, this paper作者: canonical 時(shí)間: 2025-3-27 04:34
Multimodal Biometric Recognition Based on Convolutional Neural Networksclassifier design. To address this issue, we propose an end-to-end trainable convolutional neural networks (CNN) model for multimodal biometric recognition, where high-level feature can be abundantly extracted by convolution operation. In order to improve the recognition performance by feature level作者: ineffectual 時(shí)間: 2025-3-27 09:10 作者: 加花粗鄙人 時(shí)間: 2025-3-27 13:21 作者: Formidable 時(shí)間: 2025-3-27 15:59
Behavior Compatibility Analysis for Service Mashup with Model Checkingend-users in both programming technique and domain knowledge, they cannot always find the mismatch of services’ behavior. We present an automatic approach for analyzing the behavioral compatibility of service mashup with verification techniques of Communication Sequence Processes (CSP). The feature 作者: Constrain 時(shí)間: 2025-3-27 17:52
Study on Practical IoT Applications in Civil Aviation Industryimprove its business value as well as management level. For passengers, they can experience more additional quality services. For airline companies, if a commercial air plane is connected to the Internet of things, then the various sensors of the airplane system can be used to constantly provide the作者: Immunization 時(shí)間: 2025-3-28 01:08 作者: 豐滿有漂亮 時(shí)間: 2025-3-28 03:58 作者: bronchodilator 時(shí)間: 2025-3-28 06:47
Research on Pseudo Code Ranging Technology Using Burst DSSS Signal burst short pulse spread spectrum communication is discussed. Firstly, PMF?+?FFT is used to capture the signal and estimate the initial value of carrier frequency and pseudo code phase, then LM algorithm is used to solve the maximum likelihood function, so as to obtain the accurate value of carrier frequency and pseudo code delay.作者: 土坯 時(shí)間: 2025-3-28 13:59 作者: Melatonin 時(shí)間: 2025-3-28 16:04 作者: Occlusion 時(shí)間: 2025-3-28 21:37
1865-0929 nce and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS...The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully rev作者: 水汽 時(shí)間: 2025-3-29 00:14 作者: Conjuction 時(shí)間: 2025-3-29 03:22 作者: 定點(diǎn) 時(shí)間: 2025-3-29 08:18
https://doi.org/10.1007/978-3-642-13371-8to the application of high resolution Synthetic Aperture Radar (SAR) imaging, and experiments show that the proposed method can achieve an outstanding image recovery result comparing to the state-of-the-art methods, with a significant reduction of the number of parameters.作者: 神圣將軍 時(shí)間: 2025-3-29 14:14
https://doi.org/10.1007/978-3-642-74375-7 segment, mixing the two. Even if adversary obtains this piece of data, it can’t distinguish between the effective information, effectively reduces the density of information, and increases the difficulty of information recognition, so as to achieve the purpose of information hiding.作者: convulsion 時(shí)間: 2025-3-29 19:38 作者: 充滿人 時(shí)間: 2025-3-29 22:08
Hybrid Low Rank Model Based Deep Neural Network Compression with?Application in Data Recoveryto the application of high resolution Synthetic Aperture Radar (SAR) imaging, and experiments show that the proposed method can achieve an outstanding image recovery result comparing to the state-of-the-art methods, with a significant reduction of the number of parameters.作者: 演繹 時(shí)間: 2025-3-30 00:27
Research of Software Information Hiding Algorithm Based on Packing Technology segment, mixing the two. Even if adversary obtains this piece of data, it can’t distinguish between the effective information, effectively reduces the density of information, and increases the difficulty of information recognition, so as to achieve the purpose of information hiding.作者: 男生如果明白 時(shí)間: 2025-3-30 04:18 作者: 兩種語(yǔ)言 時(shí)間: 2025-3-30 08:52
Stephan Helmreich,Hartmut Keller burst short pulse spread spectrum communication is discussed. Firstly, PMF?+?FFT is used to capture the signal and estimate the initial value of carrier frequency and pseudo code phase, then LM algorithm is used to solve the maximum likelihood function, so as to obtain the accurate value of carrier frequency and pseudo code delay.作者: RUPT 時(shí)間: 2025-3-30 15:53
On Clustering Using Random Walks uses the MPU6050 accelerometer to detect and recognize human gestures. The system adopts the control chip STM32 MCU to collect the acceleration data. The results of the experiments have shown that the proposed gesture recognition device can control the mobile robot maneuvering well and complete the function of forward and backward and steering.作者: 乳汁 時(shí)間: 2025-3-30 19:52 作者: TATE 時(shí)間: 2025-3-30 21:18
Stephan Helmreich,Hartmut Keller information while the large scale median filtering value is used at the non boundary region for facilitating noise removal. In this paper, 3 remote sensing datasets are used to verify the proposed approach, and the results show that the proposed approach improves the accuracy of remote sensing image change detection.作者: Fantasy 時(shí)間: 2025-3-31 03:09 作者: Hyperlipidemia 時(shí)間: 2025-3-31 07:35
On Clustering Using Random Walks set. Experimental results demonstrate the proposed CNN model not only can achieve recognition rate of 98.84% in testing, but also is robust to conventional image degradation and applicable to identity recognition task.