-
1
-
2
Three-Party Password Authentication and Key Exchange Protocol Based on MLWE
Published 2023-09-01Get full text
Article -
3
Feature-Enhanced Document-Level Relation Extraction in Threat Intelligence with Knowledge Distillation
Published 2022-11-01Get full text
Article -
4
Open Set Recognition for Malware Traffic via Predictive Uncertainty
Published 2023-01-01Get full text
Article -
5
-
6
Prior-Information Auxiliary Module: An Injector to a Deep Learning Bridge Detection Model
Published 2021-01-01Get full text
Article -
7
-
8
SIIS-SLAM: A Vision SLAM Based on Sequential Image Instance Segmentation
Published 2023-01-01Get full text
Article -
9
-
10
DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer
Published 2024-01-01Get full text
Article -
11
DroidFDR: Automatic Classification of Android Malware Using Model Checking
Published 2022-06-01Get full text
Article -
12
-
13
Make It Directly: Event Extraction Based on Tree-LSTM and Bi-GRU
Published 2020-01-01Get full text
Article -
14
Multi-Modal Entity Alignment Method Based on Feature Enhancement
Published 2023-06-01Get full text
Article -
15
Tenant-Led Ciphertext Information Flow Control for Cloud Virtual Machines
Published 2021-01-01Get full text
Article -
16
-
17
Bias detection and knowledge graph comparison analysis for medical record datasets
Published 2024-01-01Get full text
Article -
18
Research Progress on Vision–Language Multimodal Pretraining Model Technology
Published 2022-10-01Get full text
Article -
19
D-UAP: Initially Diversified Universal Adversarial Patch Generation Method
Published 2023-07-01Get full text
Article -
20
The Construction Technology of the Boundary Environment Model Based on Hexagon
Published 2013-11-01Get full text
Article