iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.dagstuhl.de/pid/80/446.rss
dblp: Ru Zhang https://dblp.org/pid/80/446.html dblp person page RSS feed Fri, 13 Dec 2024 19:10:04 +0100 en-US daily 1 released under the CC0 1.0 license dblp@dagstuhl.de (dblp team) dblp@dagstuhl.de (dblp team) Computers/Computer_Science/Publications/Bibliographies http://www.rssboard.org/rss-specification https://dblp.org/img/logo.144x51.pngdblp: Ru Zhanghttps://dblp.org/pid/80/446.html14451 Hyperscale data analysis oriented optimization mechanisms for higher education management systems platforms with evolutionary intelligence.https://doi.org/10.1016/j.asoc.2024.111460, , , , , , :
Hyperscale data analysis oriented optimization mechanisms for higher education management systems platforms with evolutionary intelligence. Appl. Soft Comput. 155: 111460 ()]]>
https://dblp.org/rec/journals/asc/ZhangMWLWZW24Mon, 01 Jan 2024 00:00:00 +0100
MvMRL: a multi-view molecular representation learning method for molecular property prediction.https://doi.org/10.1093/bib/bbae298, , , , , , :
MvMRL: a multi-view molecular representation learning method for molecular property prediction. Briefings Bioinform. 25(4) ()]]>
https://dblp.org/rec/journals/bib/ZhangLWDZLP24Mon, 01 Jan 2024 00:00:00 +0100
Robust 3D phase retrieval via compressed support detection from snapshot diffraction pattern.https://doi.org/10.1016/j.compbiomed.2024.108644, , , , :
Robust 3D phase retrieval via compressed support detection from snapshot diffraction pattern. Comput. Biol. Medicine 177: 108644 ()]]>
https://dblp.org/rec/journals/cbm/ZhangZZCW24Mon, 01 Jan 2024 00:00:00 +0100
An exact solution method for seru scheduling problems considering past-sequence-dependent setup time and adjustment activities.https://doi.org/10.1504/IJADS.2024.137008, , , :
An exact solution method for seru scheduling problems considering past-sequence-dependent setup time and adjustment activities. Int. J. Appl. Decis. Sci. 17(2): 156-181 ()]]>
https://dblp.org/rec/journals/ijads/ZhangZSY24Mon, 01 Jan 2024 00:00:00 +0100
Research on multi-center assisted diagnosis of ASD based on multimodal feature fusion.https://doi.org/10.1002/ima.23110, , , :
Research on multi-center assisted diagnosis of ASD based on multimodal feature fusion. Int. J. Imaging Syst. Technol. 34(3) ()]]>
https://dblp.org/rec/journals/imst/ZhangSWZ24Mon, 01 Jan 2024 00:00:00 +0100
Spatio-temporal coherent snapshot compressed imaging with time-varying composite phase masks.https://doi.org/10.1016/j.sigpro.2023.109358, , , , , , , :
Spatio-temporal coherent snapshot compressed imaging with time-varying composite phase masks. Signal Process. 218: 109358 ()]]>
https://dblp.org/rec/journals/sigpro/ZhangZZCCSZW24Mon, 01 Jan 2024 00:00:00 +0100
A Semantic Controllable Long Text Steganography Framework Based on LLM Prompt Engineering and Knowledge Graph.https://doi.org/10.1109/LSP.2024.3456636, , , :
A Semantic Controllable Long Text Steganography Framework Based on LLM Prompt Engineering and Knowledge Graph. IEEE Signal Process. Lett. 31: 2610-2614 ()]]>
https://dblp.org/rec/journals/spl/LiZLL24Mon, 01 Jan 2024 00:00:00 +0100
Semantic-Aware UAV Swarm Coordination in the Metaverse: A Reputation-Based Incentive Mechanism.https://doi.org/10.1109/TMC.2024.3438152, , , , , , :
Semantic-Aware UAV Swarm Coordination in the Metaverse: A Reputation-Based Incentive Mechanism. IEEE Trans. Mob. Comput. 23(12): 13821-13833 ()]]>
https://dblp.org/rec/journals/tmc/XuYZMHXN24Sun, 01 Dec 2024 00:00:00 +0100
Generative Image Steganography Based on Guidance Feature Distribution.https://doi.org/10.1145/3625297, , :
Generative Image Steganography Based on Guidance Feature Distribution. ACM Trans. Multim. Comput. Commun. Appl. 20(11): 336:1-336:18 ()]]>
https://dblp.org/rec/journals/tomccap/SunLZ24Fri, 01 Nov 2024 00:00:00 +0100
Federated Learning Powered Semantic Communication for UAV Swarm Cooperation.https://doi.org/10.1109/MWC.005.2300147, , , , , :
Federated Learning Powered Semantic Communication for UAV Swarm Cooperation. IEEE Wirel. Commun. 31(4): 140-146 ()]]>
https://dblp.org/rec/journals/wc/XuYZMHG24Thu, 01 Aug 2024 01:00:00 +0200
Research on Personalized Hybrid Recommendation System for English Word Learning.https://doi.org/10.1007/978-3-031-64312-5_33, , , :
Research on Personalized Hybrid Recommendation System for English Word Learning. AIED Companion (2) : 275-282]]>
https://dblp.org/rec/conf/aied/LiXZZ24Mon, 01 Jan 2024 00:00:00 +0100
An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration.https://doi.org/10.1007/978-3-031-72344-5_17, , :
An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration. ICANN (5) : 251-265]]>
https://dblp.org/rec/conf/icann/LiZL24Mon, 01 Jan 2024 00:00:00 +0100
Controllable Semantic Linguistic Steganography via Summarization Generation.https://doi.org/10.1109/ICASSP48485.2024.10447545, , :
Controllable Semantic Linguistic Steganography via Summarization Generation. ICASSP : 4560-4564]]>
https://dblp.org/rec/conf/icassp/ZhangLZ24bMon, 01 Jan 2024 00:00:00 +0100
Multi-Grained Multimodal Interaction Network for Sentiment Analysis.https://doi.org/10.1109/ICASSP48485.2024.10446351, , :
Multi-Grained Multimodal Interaction Network for Sentiment Analysis. ICASSP : 7730-7734]]>
https://dblp.org/rec/conf/icassp/FangLZ24Mon, 01 Jan 2024 00:00:00 +0100
The Continuum Hypothesis Implies the Existence of Non-principal Arithmetical Ultrafilters - A Coq Formal Verification.https://doi.org/10.1007/978-981-96-0617-7_15, , , :
The Continuum Hypothesis Implies the Existence of Non-principal Arithmetical Ultrafilters - A Coq Formal Verification. ICFEM : 257-277]]>
https://dblp.org/rec/conf/icfem/DouCYZ24Mon, 01 Jan 2024 00:00:00 +0100
An Images Regeneration Method for CG Anti-Forensics Based on Sensor Device Trace.https://doi.org/10.1109/ICME57554.2024.10688125, , :
An Images Regeneration Method for CG Anti-Forensics Based on Sensor Device Trace. ICME : 1-6]]>
https://dblp.org/rec/conf/icmcs/LuLZ24Mon, 01 Jan 2024 00:00:00 +0100
Attack Behavior Extraction Based on Heterogeneous Threat Intelligence Graphs and Data Augmentation.https://doi.org/10.1109/IJCNN60899.2024.10650068, , :
Attack Behavior Extraction Based on Heterogeneous Threat Intelligence Graphs and Data Augmentation. IJCNN : 1-9]]>
https://dblp.org/rec/conf/ijcnn/LiZL24Mon, 01 Jan 2024 00:00:00 +0100
LLsM: Generative Linguistic Steganography with Large Language Model.https://doi.org/10.48550/arXiv.2401.15656, , , , :
LLsM: Generative Linguistic Steganography with Large Language Model. CoRR abs/2401.15656 ()]]>
https://dblp.org/rec/journals/corr/abs-2401-15656Mon, 01 Jan 2024 00:00:00 +0100
An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration.https://doi.org/10.48550/arXiv.2402.04978, , , :
An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration. CoRR abs/2402.04978 ()]]>
https://dblp.org/rec/journals/corr/abs-2402-04978Mon, 01 Jan 2024 00:00:00 +0100
Linguistic Steganalysis via LLMs: Two Modes for Efficient Detection of Strongly Concealed Stego.https://doi.org/10.48550/arXiv.2406.04218, , , :
Linguistic Steganalysis via LLMs: Two Modes for Efficient Detection of Strongly Concealed Stego. CoRR abs/2406.04218 ()]]>
https://dblp.org/rec/journals/corr/abs-2406-04218Mon, 01 Jan 2024 00:00:00 +0100
Pseudo-label Based Domain Adaptation for Zero-Shot Text Steganalysis.https://doi.org/10.48550/arXiv.2406.18565, , , :
Pseudo-label Based Domain Adaptation for Zero-Shot Text Steganalysis. CoRR abs/2406.18565 ()]]>
https://dblp.org/rec/journals/corr/abs-2406-18565Mon, 01 Jan 2024 00:00:00 +0100
LICM: Effective and Efficient Long Interest Chain Modeling for News Recommendation.https://doi.org/10.48550/arXiv.2408.00859, , , , , , , :
LICM: Effective and Efficient Long Interest Chain Modeling for News Recommendation. CoRR abs/2408.00859 ()]]>
https://dblp.org/rec/journals/corr/abs-2408-00859Mon, 01 Jan 2024 00:00:00 +0100
Current Status and Trends in Image Anti-Forensics Research: A Bibliometric Analysis.https://doi.org/10.48550/arXiv.2408.11365, , :
Current Status and Trends in Image Anti-Forensics Research: A Bibliometric Analysis. CoRR abs/2408.11365 ()]]>
https://dblp.org/rec/journals/corr/abs-2408-11365Mon, 01 Jan 2024 00:00:00 +0100
State-of-the-art Advances of Deep-learning Linguistic Steganalysis Research.https://doi.org/10.48550/arXiv.2409.01780, , , :
State-of-the-art Advances of Deep-learning Linguistic Steganalysis Research. CoRR abs/2409.01780 ()]]>
https://dblp.org/rec/journals/corr/abs-2409-01780Mon, 01 Jan 2024 00:00:00 +0100
HybridFlow: A Flexible and Efficient RLHF Framework.https://doi.org/10.48550/arXiv.2409.19256, , , , , , , , :
HybridFlow: A Flexible and Efficient RLHF Framework. CoRR abs/2409.19256 ()]]>
https://dblp.org/rec/journals/corr/abs-2409-19256Mon, 01 Jan 2024 00:00:00 +0100
Large capacity generative image steganography via image style transfer and feature-wise deep fusion.https://doi.org/10.1007/s10489-023-04993-8, , :
Large capacity generative image steganography via image style transfer and feature-wise deep fusion. Appl. Intell. 53(23): 28675-28693 ()]]>
https://dblp.org/rec/journals/apin/SunLZ23Fri, 01 Dec 2023 00:00:00 +0100
Evolutionary machine learning builds smart education big data platform: Data-driven higher education.https://doi.org/10.1016/j.asoc.2023.110114, , , , , :
Evolutionary machine learning builds smart education big data platform: Data-driven higher education. Appl. Soft Comput. 136: 110114 ()]]>
https://dblp.org/rec/journals/asc/ZhengWCSMZ23Wed, 01 Mar 2023 00:00:00 +0100
Intelligent analysis system of college students' employment and entrepreneurship situation: Big data and artificial intelligence-driven approach.https://doi.org/10.1016/j.compeleceng.2023.108823, , :
Intelligent analysis system of college students' employment and entrepreneurship situation: Big data and artificial intelligence-driven approach. Comput. Electr. Eng. 110: 108823 ()]]>
https://dblp.org/rec/journals/cee/YuZK23Fri, 01 Sep 2023 01:00:00 +0200
Reformulation and exact solution method for seru scheduling problem with learning effect and job deterioration.https://doi.org/10.1504/IJADS.2023.133228, , , :
Reformulation and exact solution method for seru scheduling problem with learning effect and job deterioration. Int. J. Appl. Decis. Sci. 16(5): 613-645 ()]]>
https://dblp.org/rec/journals/ijads/ZhangZGY23Sun, 01 Jan 2023 00:00:00 +0100
Consumer behaviour data mining of social e-commerce platform based on improved spectral clustering algorithm.https://doi.org/10.1504/IJWBC.2023.134862:
Consumer behaviour data mining of social e-commerce platform based on improved spectral clustering algorithm. Int. J. Web Based Communities 19(4): 291-304 ()]]>
https://dblp.org/rec/journals/ijwbc/Zhang23aSun, 01 Jan 2023 00:00:00 +0100
Web of science-based virtual brand communities: a bibliometric review between 2000 and 2020.https://doi.org/10.1108/INTR-11-2021-0800, , , :
Web of science-based virtual brand communities: a bibliometric review between 2000 and 2020. Internet Res. 33(2): 606-637 ()]]>
https://dblp.org/rec/journals/intr/ZhengLZZ23Sun, 01 Jan 2023 00:00:00 +0100
V-A3tS: A rapid text steganalysis method based on position information and variable parameter multi-head self-attention controlled by length.https://doi.org/10.1016/j.jisa.2023.103512, , :
V-A3tS: A rapid text steganalysis method based on position information and variable parameter multi-head self-attention controlled by length. J. Inf. Secur. Appl. 75: 103512 ()]]>
https://dblp.org/rec/journals/istr/WangZL23Thu, 01 Jun 2023 01:00:00 +0200
MCW: A Generalizable Deepfake Detection Method for Few-Shot Learning.https://doi.org/10.3390/s23218763, , , , :
MCW: A Generalizable Deepfake Detection Method for Few-Shot Learning. Sensors 23(21): 8763 ()]]>
https://dblp.org/rec/journals/sensors/GuanLZLT23Sun, 01 Oct 2023 01:00:00 +0200
ConLBS: An Attack Investigation Approach Using Contrastive Learning with Behavior Sequence.https://doi.org/10.3390/s23249881, , :
ConLBS: An Attack Investigation Approach Using Contrastive Learning with Behavior Sequence. Sensors 23(24): 9881 ()]]>
https://dblp.org/rec/journals/sensors/LiZL23aFri, 01 Dec 2023 00:00:00 +0100
Linguistic Steganalysis by Enhancing and Integrating Local and Global Features.https://doi.org/10.1109/LSP.2023.3238283, , :
Linguistic Steganalysis by Enhancing and Integrating Local and Global Features. IEEE Signal Process. Lett. 30: 16-20 ()]]>
https://dblp.org/rec/journals/spl/XuZL23Sun, 01 Jan 2023 00:00:00 +0100
RLS-DTS: Reinforcement-Learning Linguistic Steganalysis in Distribution-Transformed Scenario.https://doi.org/10.1109/LSP.2023.3310380, , :
RLS-DTS: Reinforcement-Learning Linguistic Steganalysis in Distribution-Transformed Scenario. IEEE Signal Process. Lett. 30: 1232-1236 ()]]>
https://dblp.org/rec/journals/spl/WangZL23Sun, 01 Jan 2023 00:00:00 +0100
T-GraphDTA: A Drug-Target Binding Affinity Prediction Framework Based on Protein Pre-training Model and Hybrid Graph Neural Network.https://doi.org/10.1007/978-981-97-0903-8_12, , , , :
T-GraphDTA: A Drug-Target Binding Affinity Prediction Framework Based on Protein Pre-training Model and Hybrid Graph Neural Network. ICAI (1) : 113-123]]>
https://dblp.org/rec/conf/icai4/WuLPZC23Sun, 01 Jan 2023 00:00:00 +0100
A Robust Generative Image Steganography Method based on Guidance Features in Image Synthesis.https://doi.org/10.1109/ICME55011.2023.00018, , :
A Robust Generative Image Steganography Method based on Guidance Features in Image Synthesis. ICME : 55-60]]>
https://dblp.org/rec/conf/icmcs/SunLZ23Sun, 01 Jan 2023 00:00:00 +0100
Neural Linguistic Steganography with Controllable Security.https://doi.org/10.1109/IJCNN54540.2023.10191218, , , :
Neural Linguistic Steganography with Controllable Security. IJCNN : 1-8]]>
https://dblp.org/rec/conf/ijcnn/LuLZJ23Sun, 01 Jan 2023 00:00:00 +0100
Robust Secret Data Hiding for Transformer-based Neural Machine Translation.https://doi.org/10.1109/IJCNN54540.2023.10191984, , , , :
Robust Secret Data Hiding for Transformer-based Neural Machine Translation. IJCNN : 1-8]]>
https://dblp.org/rec/conf/ijcnn/LuLZLJ23Sun, 01 Jan 2023 00:00:00 +0100
How Older Adults' Moments Sharing in SNS Contributes to Their Subjective Well-Being?https://doi.org/10.1007/978-3-031-32299-0_13, , , :
How Older Adults' Moments Sharing in SNS Contributes to Their Subjective Well-Being? WHICEB (1) : 143-155]]>
https://dblp.org/rec/conf/whiceb/ZhangLJS23Sun, 01 Jan 2023 00:00:00 +0100
UP4LS: User Profile Constructed by Multiple Attributes for Enhancing Linguistic Steganalysis.https://doi.org/10.48550/arXiv.2311.01775, , , :
UP4LS: User Profile Constructed by Multiple Attributes for Enhancing Linguistic Steganalysis. CoRR abs/2311.01775 ()]]>
https://dblp.org/rec/journals/corr/abs-2311-01775Sun, 01 Jan 2023 00:00:00 +0100
Integration of multi-omics technologies for crop improvement: Status and prospects.https://doi.org/10.3389/fbinf.2022.1027457, , , , :
Integration of multi-omics technologies for crop improvement: Status and prospects. Frontiers Bioinform. 2 ()]]>
https://dblp.org/rec/journals/fbinf/ZhangZYDH22Sat, 01 Jan 2022 00:00:00 +0100
Degree Conditions for Completely Independent Spanning Trees of Bipartite Graphs.https://doi.org/10.1007/s00373-022-02585-w, , :
Degree Conditions for Completely Independent Spanning Trees of Bipartite Graphs. Graphs Comb. 38(6): 179 ()]]>
https://dblp.org/rec/journals/gc/YuanZL22Sat, 01 Jan 2022 00:00:00 +0100
Two statistical traffic features for certain APT group identification.https://doi.org/10.1016/j.jisa.2022.103207, , , , , , , :
Two statistical traffic features for certain APT group identification. J. Inf. Secur. Appl. 67: 103207 ()]]>
https://dblp.org/rec/journals/istr/LiuLLSCZHP22Sat, 01 Jan 2022 00:00:00 +0100
A social commerce purchasing decision model with trust network and item review information.https://doi.org/10.1016/j.knosys.2021.107628, , , , :
A social commerce purchasing decision model with trust network and item review information. Knowl. Based Syst. 235: 107628 ()]]>
https://dblp.org/rec/journals/kbs/WuZLLD22Sat, 01 Jan 2022 00:00:00 +0100
Faithful quantum entanglement purification and concentration using heralded high-fidelity parity-check detectors based on quantum-dot-microcavity systems.https://doi.org/10.1007/s11128-021-03371-y, , , , :
Faithful quantum entanglement purification and concentration using heralded high-fidelity parity-check detectors based on quantum-dot-microcavity systems. Quantum Inf. Process. 21(1): 17 ()]]>
https://dblp.org/rec/journals/qip/YinCHFZ22Sat, 01 Jan 2022 00:00:00 +0100
Linguistic Steganalysis Merging Semantic and Statistical Features.https://doi.org/10.1109/LSP.2022.3212630, , , , :
Linguistic Steganalysis Merging Semantic and Statistical Features. IEEE Signal Process. Lett. 29: 2128-2132 ()]]>
https://dblp.org/rec/journals/spl/GuoLYYZ22Sat, 01 Jan 2022 00:00:00 +0100
A Robust Deepfake Video Detection Method based on Continuous Frame Face-swapping.https://doi.org/10.1109/AIIPCC57291.2022.00048, , , :
A Robust Deepfake Video Detection Method based on Continuous Frame Face-swapping. AIIPCC : 188-191]]>
https://dblp.org/rec/conf/aiipcc/LiuYZL22Sat, 01 Jan 2022 00:00:00 +0100
Distant Supervised Relation Extraction Based on Sentence-Level Attention with Relation Alignment.https://doi.org/10.1007/978-3-031-06794-5_12, , , , , :
Distant Supervised Relation Extraction Based on Sentence-Level Attention with Relation Alignment. ICAIS (1) : 142-152]]>
https://dblp.org/rec/conf/icccsec/LiHGLZZ22Sat, 01 Jan 2022 00:00:00 +0100
A CNN Based Visual Audio Steganography Model.https://doi.org/10.1007/978-3-031-06794-5_35, , , , :
A CNN Based Visual Audio Steganography Model. ICAIS (1) : 431-442]]>
https://dblp.org/rec/conf/icccsec/ZhangDYYL22Sat, 01 Jan 2022 00:00:00 +0100
An encrypted traffic classification method based on contrastive learning.https://doi.org/10.1145/3571662.3571678, , , , , :
An encrypted traffic classification method based on contrastive learning. ICCIP : 101-105]]>
https://dblp.org/rec/conf/iccip/TianGYZZZ22Sat, 01 Jan 2022 00:00:00 +0100
Sense-aware BERT and Multi-task Fine-tuning for Multimodal Sentiment Analysis.https://doi.org/10.1109/IJCNN55064.2022.9892116, , :
Sense-aware BERT and Multi-task Fine-tuning for Multimodal Sentiment Analysis. IJCNN : 1-8]]>
https://dblp.org/rec/conf/ijcnn/FangLZ22Sat, 01 Jan 2022 00:00:00 +0100
T-GRU: conTextual Gated Recurrent Unit model for high quality Linguistic Steganography.https://doi.org/10.1109/WIFS55849.2022.9975301, , , :
T-GRU: conTextual Gated Recurrent Unit model for high quality Linguistic Steganography. WIFS : 1-6]]>
https://dblp.org/rec/conf/wifs/YangXZH22Sat, 01 Jan 2022 00:00:00 +0100
Chinese Short Text Entity Linking Model Based on PET.https://doi.org/10.1145/3568364.3568378, , , , , :
Chinese Short Text Entity Linking Model Based on PET. WSSE : 87-92]]>
https://dblp.org/rec/conf/wsse/YanCZWCC22Sat, 01 Jan 2022 00:00:00 +0100
LogKernel A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering.https://doi.org/10.48550/arXiv.2208.08820, , , :
LogKernel A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering. CoRR abs/2208.08820 ()]]>
https://dblp.org/rec/journals/corr/abs-2208-08820Sat, 01 Jan 2022 00:00:00 +0100
The prognosis prediction significance of Hounsfield unit value for stroke patients treated by intravenous thrombolysis.https://doi.org/10.1186/s12880-021-00592-6, , , , , , :
The prognosis prediction significance of Hounsfield unit value for stroke patients treated by intravenous thrombolysis. BMC Medical Imaging 21(1): 62 ()]]>
https://dblp.org/rec/journals/bmcmi/ZhuZRCZZW21Fri, 01 Jan 2021 00:00:00 +0100
A video steganalysis method based on coding cost variation.https://doi.org/10.1177/1550147721992730, , , , :
A video steganalysis method based on coding cost variation. Int. J. Distributed Sens. Networks 17(2): 155014772199273 ()]]>
https://dblp.org/rec/journals/ijdsn/LiuZZLC21Fri, 01 Jan 2021 00:00:00 +0100
Quantum secure multi-party summation protocol based on blind matrix and quantum Fourier transform.https://doi.org/10.1007/s11128-021-03183-0, , , :
Quantum secure multi-party summation protocol based on blind matrix and quantum Fourier transform. Quantum Inf. Process. 20(7): 1-20 ()]]>
https://dblp.org/rec/journals/qip/YiCFZ21Fri, 01 Jan 2021 00:00:00 +0100
Topic-aware Neural Linguistic Steganography Based on Knowledge Graphs.https://doi.org/10.1145/3418598, , , :
Topic-aware Neural Linguistic Steganography Based on Knowledge Graphs. Trans. Data Sci. 2(2): 10:1-10:13 ()]]>
https://dblp.org/rec/journals/tdasci/LiZYZ21Fri, 01 Jan 2021 00:00:00 +0100
User Experience for Multi-Device Ecosystems: Challenges and Opportunities.https://doi.org/10.1145/3411763.3441325, , , , , , , , :
User Experience for Multi-Device Ecosystems: Challenges and Opportunities. CHI Extended Abstracts : 111:1-111:5]]>
https://dblp.org/rec/conf/chi/ZhangSSAOQMAJ21Fri, 01 Jan 2021 00:00:00 +0100
A Reversible Digital Watermarking Algorithm Based on Medical Images via Threshold Segmentation and Contrast Enhancement.https://doi.org/10.1007/978-3-030-87358-5_55, , , , , :
A Reversible Digital Watermarking Algorithm Based on Medical Images via Threshold Segmentation and Contrast Enhancement. ICIG (2) : 675-690]]>
https://dblp.org/rec/conf/icig/PangHZLWS21Fri, 01 Jan 2021 00:00:00 +0100
Carrier Robust Reversible Watermark Model Based on Image Block Chain Authentication.https://doi.org/10.1007/978-3-030-87355-4_59, , , , , :
Carrier Robust Reversible Watermark Model Based on Image Block Chain Authentication. ICIG (1) : 712-724]]>
https://dblp.org/rec/conf/icig/GaoZLLZC21Fri, 01 Jan 2021 00:00:00 +0100
A Controllable Image Steganography with Chaos and User Key.https://doi.org/10.1007/978-3-030-87355-4_65, , , , :
A Controllable Image Steganography with Chaos and User Key. ICIG (1) : 785-797]]>
https://dblp.org/rec/conf/icig/LiuWYZZ21Fri, 01 Jan 2021 00:00:00 +0100
Research on Energy Saving Mechanism of NB-IoT Based on eDRX.https://doi.org/10.1109/VTC2021-Spring51267.2021.9449020, , :
Research on Energy Saving Mechanism of NB-IoT Based on eDRX. VTC Spring : 1-6]]>
https://dblp.org/rec/conf/vtc/PeiZL21aFri, 01 Jan 2021 00:00:00 +0100
A Two-Stage Generative Adversarial Networks With Semantic Content Constraints for Adversarial Example Generation.https://doi.org/10.1109/ACCESS.2020.3037329, , , , :
A Two-Stage Generative Adversarial Networks With Semantic Content Constraints for Adversarial Example Generation. IEEE Access 8: 205766-205777 ()]]>
https://dblp.org/rec/journals/access/LiuTZSW20Wed, 01 Jan 2020 00:00:00 +0100
A "User-Knowledge-Product" Co-Creation Cyberspace Model for Product Innovation.https://doi.org/10.1155/2020/7190169, , , , :
A "User-Knowledge-Product" Co-Creation Cyberspace Model for Product Innovation. Complex. 2020: 7190169:1-7190169:20 ()]]>
https://dblp.org/rec/journals/complexity/WangWZSL20Wed, 01 Jan 2020 00:00:00 +0100
A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction.https://doi.org/10.1007/s00034-019-01321-9, , :
A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction. Circuits Syst. Signal Process. 39(7): 3532-3552 ()]]>
https://dblp.org/rec/journals/cssp/LiuZZ20Wed, 01 Jan 2020 00:00:00 +0100
Sustainable quality control mechanism of heavy truck production process for Plant-wide production process.https://doi.org/10.1080/00207543.2020.1844918, , , , , , , :
Sustainable quality control mechanism of heavy truck production process for Plant-wide production process. Int. J. Prod. Res. 58(24): 7548-7564 ()]]>
https://dblp.org/rec/journals/ijpr/GuoZZQZCRH20Wed, 01 Jan 2020 00:00:00 +0100
Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis.https://doi.org/10.1109/TIFS.2019.2936913, , , :
Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis. IEEE Trans. Inf. Forensics Secur. 15: 1138-1150 ()]]>
https://dblp.org/rec/journals/tifs/ZhangZLL20Wed, 01 Jan 2020 00:00:00 +0100
An empirical study on program failures of deep learning jobs.https://doi.org/10.1145/3377811.3380362, , , , , :
An empirical study on program failures of deep learning jobs. ICSE : 1159-1170]]>
https://dblp.org/rec/conf/icse/ZhangXZLLY20Wed, 01 Jan 2020 00:00:00 +0100
DUES-Adapt: Exploring Distributed User Experience With Neural UI Adaptation.https://doi.org/10.1145/3379336.3381464, , , , , , , , , , , , :
DUES-Adapt: Exploring Distributed User Experience With Neural UI Adaptation. IUI Companion : 91-92]]>
https://dblp.org/rec/conf/iui/JuZXLYCZLLDLZL20Wed, 01 Jan 2020 00:00:00 +0100
Enhancing the interoperability between deep learning frameworks by model conversion.https://doi.org/10.1145/3368089.3417051, , , , , , :
Enhancing the interoperability between deep learning frameworks by model conversion. ESEC/SIGSOFT FSE : 1320-1330]]>
https://dblp.org/rec/conf/sigsoft/LiuCZQJLY20Wed, 01 Jan 2020 00:00:00 +0100
Constructing feature variation coefficients to evaluate feature learning capabilities of convolutional layers in steganographic detection algorithms of spatial domain.https://arxiv.org/abs/2010.10140, , , , :
Constructing feature variation coefficients to evaluate feature learning capabilities of convolutional layers in steganographic detection algorithms of spatial domain. CoRR abs/2010.10140 ()]]>
https://dblp.org/rec/journals/corr/abs-2010-10140Wed, 01 Jan 2020 00:00:00 +0100
Construction of Two Statistical Anomaly Features for Small-Sample APT Attack Traffic Classification.https://arxiv.org/abs/2010.13978, , , , , :
Construction of Two Statistical Anomaly Features for Small-Sample APT Attack Traffic Classification. CoRR abs/2010.13978 ()]]>
https://dblp.org/rec/journals/corr/abs-2010-13978Wed, 01 Jan 2020 00:00:00 +0100
A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting.https://doi.org/10.1016/j.jisa.2019.05.005, , :
A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting. J. Inf. Secur. Appl. 47: 199-207 ()]]>
https://dblp.org/rec/journals/istr/ZhangLL19Tue, 01 Jan 2019 00:00:00 +0100
A Sequential Design Approach for Calibrating Dynamic Computer Simulators.https://doi.org/10.1137/18M1224544, , :
A Sequential Design Approach for Calibrating Dynamic Computer Simulators. SIAM/ASA J. Uncertain. Quantification 7(4): 1245-1274 ()]]>
https://dblp.org/rec/journals/juq/ZhangLR19Tue, 01 Jan 2019 00:00:00 +0100
Invisible steganography via generative adversarial networks.https://doi.org/10.1007/s11042-018-6951-z, , :
Invisible steganography via generative adversarial networks. Multim. Tools Appl. 78(7): 8559-8575 ()]]>
https://dblp.org/rec/journals/mta/ZhangDL19Tue, 01 Jan 2019 00:00:00 +0100
Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph.https://doi.org/10.1007/978-3-030-24265-7_6, , , :
Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph. ICAIS (2) : 62-74]]>
https://dblp.org/rec/conf/icccsec/LiuLZW19Tue, 01 Jan 2019 00:00:00 +0100
Using Downward-Looking Lidar to Detect and Track Traffic.https://doi.org/10.1109/IECON.2019.8927012, , , , :
Using Downward-Looking Lidar to Detect and Track Traffic. IECON : 6297-6302]]>
https://dblp.org/rec/conf/iecon/QiuZWWZ19Tue, 01 Jan 2019 00:00:00 +0100
Analysis of Message Attacks in Aviation Data-Link Communication.https://doi.org/10.1109/ACCESS.2017.2767059, , , :
Analysis of Message Attacks in Aviation Data-Link Communication. IEEE Access 6: 455-463 ()]]>
https://dblp.org/rec/journals/access/ZhangLLN18Mon, 01 Jan 2018 00:00:00 +0100
Modified PSO algorithms with "Request and Reset" for leak source localization using multiple robots.https://doi.org/10.1016/j.neucom.2018.02.078, , , :
Modified PSO algorithms with "Request and Reset" for leak source localization using multiple robots. Neurocomputing 292: 82-90 ()]]>
https://dblp.org/rec/journals/ijon/YanZWL18Mon, 01 Jan 2018 00:00:00 +0100
Temperature Compensation of Elasto-Magneto-Electric (EME) Sensors in Cable Force Monitoring Using BP Neural Network.https://doi.org/10.3390/s18072176, , , :
Temperature Compensation of Elasto-Magneto-Electric (EME) Sensors in Cable Force Monitoring Using BP Neural Network. Sensors 18(7): 2176 ()]]>
https://dblp.org/rec/journals/sensors/ZhangDZH18Mon, 01 Jan 2018 00:00:00 +0100
Hotspots Trends and Spatio-Temporal Distributions for an Investigative in the Field of Chinese Educational Technology.https://doi.org/10.1109/GEOINFORMATICS.2018.8557196, , :
Hotspots Trends and Spatio-Temporal Distributions for an Investigative in the Field of Chinese Educational Technology. Geoinformatics : 1-5]]>
https://dblp.org/rec/conf/geoinformatics/HanZY18Mon, 01 Jan 2018 00:00:00 +0100
Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model.https://doi.org/10.1007/978-3-030-00012-7_15, , , :
Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model. ICCCS (3) : 161-173]]>
https://dblp.org/rec/conf/icccsec/LiuWZG18Mon, 01 Jan 2018 00:00:00 +0100
An Image Steganography Algorithm Based on Pixel Block Difference and Variable Modulus Function.https://doi.org/10.1007/978-3-030-03748-2_5, , , , :
An Image Steganography Algorithm Based on Pixel Block Difference and Variable Modulus Function. IIH-MSP (2) : 36-43]]>
https://dblp.org/rec/conf/iih-msp/YangZLWH18Mon, 01 Jan 2018 00:00:00 +0100
Attack Pattern Mining Algorithm Based on Fuzzy Clustering and Sequence Pattern from Security Log.https://doi.org/10.1007/978-3-030-03748-2_6, , , , :
Attack Pattern Mining Algorithm Based on Fuzzy Clustering and Sequence Pattern from Security Log. IIH-MSP (2) : 44-52]]>
https://dblp.org/rec/conf/iih-msp/LiuLLZD18Mon, 01 Jan 2018 00:00:00 +0100
Invisible Steganography via Generative Adversarial Network.http://arxiv.org/abs/1807.08571, , :
Invisible Steganography via Generative Adversarial Network. CoRR abs/1807.08571 ()]]>
https://dblp.org/rec/journals/corr/abs-1807-08571Mon, 01 Jan 2018 00:00:00 +0100
Efficient feature learning and multi-size image steganalysis based on CNN.http://arxiv.org/abs/1807.11428, , , :
Efficient feature learning and multi-size image steganalysis based on CNN. CoRR abs/1807.11428 ()]]>
https://dblp.org/rec/journals/corr/abs-1807-11428Mon, 01 Jan 2018 00:00:00 +0100
Dynamic data integrity auditing for secure outsourcing in the cloud.https://doi.org/10.1002/cpe.4096, , , , , :
Dynamic data integrity auditing for secure outsourcing in the cloud. Concurr. Comput. Pract. Exp. 29(12) ()]]>
https://dblp.org/rec/journals/concurrency/WeiZLLNY17Sun, 01 Jan 2017 00:00:00 +0100
Efficient data possession-checking protocol with deduplication in cloud.https://doi.org/10.1177/1550147717727461, , , , :
Efficient data possession-checking protocol with deduplication in cloud. Int. J. Distributed Sens. Networks 13(8) ()]]>
https://dblp.org/rec/journals/ijdsn/WeiNZLY17Sun, 01 Jan 2017 00:00:00 +0100
Robust video watermarking algorithm for H.264/AVC based on JND model.https://doi.org/10.3837/tiis.2017.05.024, , , , :
Robust video watermarking algorithm for H.264/AVC based on JND model. KSII Trans. Internet Inf. Syst. 11(5): 2741-2761 ()]]>
https://dblp.org/rec/journals/itiis/ZhangLZZZ17Sun, 01 Jan 2017 00:00:00 +0100
Efficient entanglement concentration of arbitrary unknown less-entangled three-atom W states via photonic Faraday rotation in cavity QED.https://doi.org/10.1007/s11128-017-1549-3, , , , , , :
Efficient entanglement concentration of arbitrary unknown less-entangled three-atom W states via photonic Faraday rotation in cavity QED. Quantum Inf. Process. 16(4): 98 ()]]>
https://dblp.org/rec/journals/qip/CaoFCDWZW17Sun, 01 Jan 2017 00:00:00 +0100
Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering.https://doi.org/10.1155/2017/7536381, , , :
Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering. Secur. Commun. Networks 2017: 7536381:1-7536381:9 ()]]>
https://dblp.org/rec/journals/scn/ZhangHLW17Sun, 01 Jan 2017 00:00:00 +0100
Optimal full-duplex relay selection for physical layer security in cooperative wireless networks.https://doi.org/10.1109/ICCChina.2017.8330327, , :
Optimal full-duplex relay selection for physical layer security in cooperative wireless networks. ICCC : 1-6]]>
https://dblp.org/rec/conf/iccchina/ZhangLL17Sun, 01 Jan 2017 00:00:00 +0100
A Steganography Algorithm Based on MP3 Linbits Bit of Huffman Codeword.https://doi.org/10.1007/978-3-319-63859-1_22, , :
A Steganography Algorithm Based on MP3 Linbits Bit of Huffman Codeword. IIH-MSP (2) : 169-176]]>
https://dblp.org/rec/conf/iih-msp/ZhangLZ17Sun, 01 Jan 2017 00:00:00 +0100
Attack pattern mining algorithm based on security log.https://doi.org/10.1109/ISI.2017.8004918, , , , :
Attack pattern mining algorithm based on security log. ISI : 205]]>
https://dblp.org/rec/conf/isi/LiLLZD17Sun, 01 Jan 2017 00:00:00 +0100
Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems.https://doi.org/10.1155/2016/1894713, , , :
Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems. Int. J. Distributed Sens. Networks 12(1): 1894713:1-1894713:11 ()]]>
https://dblp.org/rec/journals/ijdsn/WeiLZN16Fri, 01 Jan 2016 00:00:00 +0100
An attack pattern mining algorithm based on fuzzy logic and sequence pattern.https://doi.org/10.1109/CCIS.2016.7790260, , , , , :
An attack pattern mining algorithm based on fuzzy logic and sequence pattern. CCIS : 234-238]]>
https://dblp.org/rec/conf/ccis/LiXYZLZ16Fri, 01 Jan 2016 00:00:00 +0100
An Android malware detection method based on AndroidManifest file.https://doi.org/10.1109/CCIS.2016.7790261, , , , :
An Android malware detection method based on AndroidManifest file. CCIS : 239-243]]>
https://dblp.org/rec/conf/ccis/LiLHZY16Fri, 01 Jan 2016 00:00:00 +0100
Phishing sites detection based on Url Correlation.https://doi.org/10.1109/CCIS.2016.7790262, , , , , :
Phishing sites detection based on Url Correlation. CCIS : 244-248]]>
https://dblp.org/rec/conf/ccis/XueLYZLZ16Fri, 01 Jan 2016 00:00:00 +0100
Efficiently secure multiparty computation based on homomorphic encryption.https://doi.org/10.1109/CCIS.2016.7790281, , , :
Efficiently secure multiparty computation based on homomorphic encryption. CCIS : 343-349]]>
https://dblp.org/rec/conf/ccis/YaoWLZ16Fri, 01 Jan 2016 00:00:00 +0100
Detecting False Information of Social Network in Big Data.https://doi.org/10.1007/978-3-319-59288-6_65, , , , , :
Detecting False Information of Social Network in Big Data. CollaborateCom : 642-651]]>
https://dblp.org/rec/conf/colcom/XuLLZYZ16Fri, 01 Jan 2016 00:00:00 +0100
Privacy preservation based on rotation perturbation in weighted social networks.https://doi.org/10.1109/ISCIT.2016.7751622, , , , :
Privacy preservation based on rotation perturbation in weighted social networks. ISCIT : 206-211]]>
https://dblp.org/rec/conf/iscit/LiZXLL16Fri, 01 Jan 2016 00:00:00 +0100
Testing Contextuality in Cyclic Psychophysical Systems of High Ranks.https://doi.org/10.1007/978-3-319-52289-0_12, :
Testing Contextuality in Cyclic Psychophysical Systems of High Ranks. QI : 151-162]]>
https://dblp.org/rec/conf/qi/ZhangD16Fri, 01 Jan 2016 00:00:00 +0100
Defense Strategy of Network Security based on Dynamic Classification.https://doi.org/10.3837/tiis.2015.12.021, , , , :
Defense Strategy of Network Security based on Dynamic Classification. KSII Trans. Internet Inf. Syst. 9(12): 5116-5134 ()]]>
https://dblp.org/rec/journals/itiis/WeiZLNY15Thu, 01 Jan 2015 00:00:00 +0100
Efficient multipartite entanglement concentration protocol for nitrogen-vacancy center and microresonator coupled systems.https://doi.org/10.1007/s11128-015-0924-1, , , , , , :
Efficient multipartite entanglement concentration protocol for nitrogen-vacancy center and microresonator coupled systems. Quantum Inf. Process. 14(4): 1265-1277 ()]]>
https://dblp.org/rec/journals/qip/CaoDLWMZW15Thu, 01 Jan 2015 00:00:00 +0100
An improved algorithm for community discovery in social networks based on label propagation.https://doi.org/10.1109/FSKD.2015.7382165, :
An improved algorithm for community discovery in social networks based on label propagation. FSKD : 1493-1497]]>
https://dblp.org/rec/conf/fskd/ZhangR15Thu, 01 Jan 2015 00:00:00 +0100
Hamiltonian cycle embedding for fault tolerance in balanced hypercubes.https://doi.org/10.1016/j.amc.2014.07.015, , , :
Hamiltonian cycle embedding for fault tolerance in balanced hypercubes. Appl. Math. Comput. 244: 447-456 ()]]>
https://dblp.org/rec/journals/amc/HaoZFZ14Wed, 01 Jan 2014 00:00:00 +0100
Nonlocal entanglement concentration of separate nitrogen-vacancy centers coupling to microtoroidal resonators.https://doi.org/10.26421/QIC14.1-2-6, , , , , :
Nonlocal entanglement concentration of separate nitrogen-vacancy centers coupling to microtoroidal resonators. Quantum Inf. Comput. 14(1-2): 107-121 ()]]>
https://dblp.org/rec/journals/qic/WangZLJMZ14Wed, 01 Jan 2014 00:00:00 +0100
Smart Elasto-Magneto-Electric (EME) Sensors for Stress Monitoring of Steel Cables: Design Theory and Experimental Validation.https://doi.org/10.3390/s140813644, , , :
Smart Elasto-Magneto-Electric (EME) Sensors for Stress Monitoring of Steel Cables: Design Theory and Experimental Validation. Sensors 14(8): 13644-13660 ()]]>
https://dblp.org/rec/journals/sensors/ZhangDOZ14Wed, 01 Jan 2014 00:00:00 +0100
IBC-Based Entity Authentication Protocols for Federated Cloud Systems.https://doi.org/10.3837/tiis.2013.05.020, , , :
IBC-Based Entity Authentication Protocols for Federated Cloud Systems. KSII Trans. Internet Inf. Syst. 7(5): 1291-1312 ()]]>
https://dblp.org/rec/journals/itiis/CaoZZY13Tue, 01 Jan 2013 00:00:00 +0100
Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation.https://doi.org/10.4304/jmm.8.2.161-167, , , :
Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation. J. Multim. 8(2): 161-167 ()]]>
https://dblp.org/rec/journals/jmm2/DingZYZ13Tue, 01 Jan 2013 00:00:00 +0100
Multipartite electronic entanglement purification using quantum-dot spin and microcavity system.https://doi.org/10.1007/s11128-012-0397-4, , , :
Multipartite electronic entanglement purification using quantum-dot spin and microcavity system. Quantum Inf. Process. 12(1): 525-536 ()]]>
https://dblp.org/rec/journals/qip/WangZZM13Tue, 01 Jan 2013 00:00:00 +0100
Cone-beam computed tomography study of root and canal morphology of mandibular premolars in a western Chinese population.https://doi.org/10.1186/1471-2342-12-18, , , , , , :
Cone-beam computed tomography study of root and canal morphology of mandibular premolars in a western Chinese population. BMC Medical Imaging 12: 18 ()]]>
https://dblp.org/rec/journals/bmcmi/YuGLZTWD12Sun, 01 Jan 2012 00:00:00 +0100
A Video Watermarking Algorithm of H.264/AVC for Content Authentication.https://doi.org/10.4304/jnw.7.8.1150-1154, , , , :
A Video Watermarking Algorithm of H.264/AVC for Content Authentication. J. Networks 7(8): 1150-1154 ()]]>
https://dblp.org/rec/journals/jnw/ZhangZLWN12Sun, 01 Jan 2012 00:00:00 +0100
Controlled remote state preparation of arbitrary two and three qubit states via the Brown state.https://doi.org/10.1007/s11128-011-0326-y, , , , :
Controlled remote state preparation of arbitrary two and three qubit states via the Brown state. Quantum Inf. Process. 11(6): 1653-1667 ()]]>
https://dblp.org/rec/journals/qip/ChenMSZY12Sun, 01 Jan 2012 00:00:00 +0100
The effect of a manual instrumentation technique on five types of premolar root canal geometry assessed by microcomputed tomography and three-dimensional reconstruction.https://doi.org/10.1186/1471-2342-11-14, , , , :
The effect of a manual instrumentation technique on five types of premolar root canal geometry assessed by microcomputed tomography and three-dimensional reconstruction. BMC Medical Imaging 11: 14 ()]]>
https://dblp.org/rec/journals/bmcmi/LiGZHG11Sat, 01 Jan 2011 00:00:00 +0100
Research of Spatial Domain Image Digital Watermarking Payload.https://doi.org/10.1155/2011/502748, , , , :
Research of Spatial Domain Image Digital Watermarking Payload. EURASIP J. Inf. Secur. 2011 ()]]>
https://dblp.org/rec/journals/ejisec/MaoZNYZ11Sat, 01 Jan 2011 00:00:00 +0100
Intelligent green production of raw materials in ceramic technology of choice.https://doi.org/10.1109/EMEIT.2011.6023238, :
Intelligent green production of raw materials in ceramic technology of choice. EMEIT : 897-900]]>
https://dblp.org/rec/conf/emeit/ZhangC11Sat, 01 Jan 2011 00:00:00 +0100
Wavelet neural network based intelligent assessment of ceramic green technology research.https://doi.org/10.1109/EMEIT.2011.6023239, :
Wavelet neural network based intelligent assessment of ceramic green technology research. EMEIT : 901-904]]>
https://dblp.org/rec/conf/emeit/ZhangC11aSat, 01 Jan 2011 00:00:00 +0100
A Modified AES Algorithm for the Platform of Smartphone.https://doi.org/10.1109/CASoN.2010.172, , , :
A Modified AES Algorithm for the Platform of Smartphone. CASoN : 749-752]]>
https://dblp.org/rec/conf/cason/LiangLZW10Fri, 01 Jan 2010 00:00:00 +0100
Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis.https://doi.org/10.1109/CSIE.2009.577, , , , :
Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis. CSIE (6) : 490-494]]>
https://dblp.org/rec/conf/csie/ChenLZNY09Thu, 01 Jan 2009 00:00:00 +0100
Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency.https://doi.org/10.1109/IIH-MSP.2009.290, , , , :
Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency. IIH-MSP : 348-352]]>
https://dblp.org/rec/conf/iih-msp/QuFNYZ09Thu, 01 Jan 2009 00:00:00 +0100
Research of nano-material doped fiber in SBS slow light system.https://doi.org/10.1109/NEMS.2009.5068737, , , :
Research of nano-material doped fiber in SBS slow light system. NEMS : 980-982]]>
https://dblp.org/rec/conf/nems/ZhangZLD09Thu, 01 Jan 2009 00:00:00 +0100
Flat suppercontinuum generation in the inner cladding fiber with InP nano thin film.https://doi.org/10.1109/NEMS.2009.5068741, , , :
Flat suppercontinuum generation in the inner cladding fiber with InP nano thin film. NEMS : 996-999]]>
https://dblp.org/rec/conf/nems/DuanZLZ09Thu, 01 Jan 2009 00:00:00 +0100
Knowledge Acquisition and Representation of the General Auxiliary Diagnosis System for Common Disease of Animal.https://doi.org/10.1007/978-1-4419-0211-5_18, , , , , :
Knowledge Acquisition and Representation of the General Auxiliary Diagnosis System for Common Disease of Animal. CCTA (2) : 947-952]]>
https://dblp.org/rec/conf/ifip12/XiaoWZLLX08Tue, 01 Jan 2008 00:00:00 +0100
The Development of a General Auxiliary Diagnosis System for Common Disease of Animal.https://doi.org/10.1007/978-1-4419-0211-5_19, , , , , :
The Development of a General Auxiliary Diagnosis System for Common Disease of Animal. CCTA (2) : 953-958]]>
https://dblp.org/rec/conf/ifip12/XiaoWZLLX08aTue, 01 Jan 2008 00:00:00 +0100
The Relationship between Monthdisease incidence Rate and climatic factor of Classical Swine Fever.https://doi.org/10.1007/978-1-4419-0211-5_20, , , , :
The Relationship between Monthdisease incidence Rate and climatic factor of Classical Swine Fever. CCTA (2) : 959-966]]>
https://dblp.org/rec/conf/ifip12/WangXXZD08Tue, 01 Jan 2008 00:00:00 +0100
One Prediction Model Based on BP Neural Network for Newcastle Disease.https://doi.org/10.1007/978-1-4419-0211-5_49, , , , :
One Prediction Model Based on BP Neural Network for Newcastle Disease. CCTA (2) : 1209-1216]]>
https://dblp.org/rec/conf/ifip12/WangGXZL08Tue, 01 Jan 2008 00:00:00 +0100
A New Watermarking Protocol of Copyright Protection.https://doi.org/10.1109/IIH-MSP.2006.264960, , , :
A New Watermarking Protocol of Copyright Protection. IIH-MSP : 83-88]]>
https://dblp.org/rec/conf/iih-msp/ZhangYZL06Sun, 01 Jan 2006 00:00:00 +0100
Analysis of Current Steganography Tools: Classifications & Features.https://doi.org/10.1109/IIH-MSP.2006.265023, , , :
Analysis of Current Steganography Tools: Classifications & Features. IIH-MSP : 384-387]]>
https://dblp.org/rec/conf/iih-msp/ChenZNY06Sun, 01 Jan 2006 00:00:00 +0100
Flame Image of Pint-Sized Power Plant's Boiler Denoising Using Wavelet-Domain HMT Models.https://doi.org/10.1007/11538356_94, , , :
Flame Image of Pint-Sized Power Plant's Boiler Denoising Using Wavelet-Domain HMT Models. ICIC (2) : 910-919]]>
https://dblp.org/rec/conf/icic/JiZWL05Sat, 01 Jan 2005 00:00:00 +0100