AUGER: automatically generating review comments with pre-training models. | 0 | 0.34 | 2022 |
Case Base Construction and Blended Teaching Practice of Professional Master's Degree- Intellectual Property and Patent Literature Writing. | 0 | 0.34 | 2021 |
Target detection of remote sensing images based on deep learning method and system. | 0 | 0.34 | 2021 |
Lijie at ImageCLEFmed Tuberculosis 2021 - EfficientNet Simplified Tuberculosis Case Classification. | 0 | 0.34 | 2021 |
Artificial synaptic behavior and its improvement of RRAM device with stacked solution-processed MXene layers. | 0 | 0.34 | 2021 |
Spatial Attention-Based Non-Reference Perceptual Quality Prediction Network for Omnidirectional Images. | 0 | 0.34 | 2021 |
Protecting the Data Plane of SDN From Malicious Flow Entries Based on P4. | 0 | 0.34 | 2020 |
异构无线网络中动态优先级接纳控制算法研究 (Study on Dynamic Priority Admission Control Algorithm in Heterogeneous Wireless Networks). | 0 | 0.34 | 2020 |
一种基于卫星网络的虚拟网络功能快速映射算法 (Virtual Network Function Fast Mapping Algorithm over Satellite Network). | 0 | 0.34 | 2020 |
Fall detection and recognition based on GCN and 2D Pose. | 0 | 0.34 | 2019 |
Engineering the Black-Box Meta Model of Data Exploration. | 0 | 0.34 | 2019 |
Data-Driven Load Forecasting of Air Conditioners for Demand Response Using Levenberg-Marquardt Algorithm-Based ANN. | 0 | 0.34 | 2019 |
Design of Simple Resistance Automatic Tester Based on STC89C52. | 0 | 0.34 | 2019 |
代价敏感深度学习方法研究综述 (Survey on Cost-sensitive Deep Learning Methods). | 0 | 0.34 | 2019 |
一种具有精确位姿的飞机CAD模型投影图像库设计方法 (Projection Image Library Design Method for Aircraft CAD Model with Accurate Pose). | 0 | 0.34 | 2018 |
Computer-Aided Annotation for Video Tampering Dataset of Forensic Research. | 0 | 0.34 | 2018 |
Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism. | 0 | 0.34 | 2017 |
Quantum impossible differential and truncated differential cryptanalysis. | 0 | 0.34 | 2017 |
Quantum Bit Commitment Protocol Based on Counterfactual Quantum Cryptography. | 0 | 0.34 | 2017 |
Practical Signature Scheme from \varGamma Γ -Protocol. | 0 | 0.34 | 2016 |
Bit-oriented quantum public-key encryption. | 0 | 0.34 | 2015 |
Quantum McEliece public-key encryption scheme. | 1 | 0.36 | 2015 |
A quantum algorithm for approximating the influences of Boolean functions. | 0 | 0.34 | 2014 |
Auditory Context Recognition Combining Discriminative and Generative Models. | 0 | 0.34 | 2013 |
Post-quantum security of encrypted key exchange protocol | 0 | 0.34 | 2013 |
A note on quantum McEliece public-key cryptosystem | 1 | 0.38 | 2012 |
Research on Milling Globoidal Indexing Cam Based on Pro / NC | 0 | 0.34 | 2011 |
Attacker behavior analysis in multi-stage attack detection system | 5 | 0.39 | 2011 |
Camera Resectioning from Image Edges with the $L_\infty$-Norm Using Linear Programming. | 0 | 0.34 | 2011 |
Network covert channels on the Android platform | 8 | 0.69 | 2011 |
Application of ETSIAT to the toxicity prediction of aliphatic alcohols | 0 | 0.34 | 2010 |
Two-phase biomedical named entity recognition based on semi-CRFs | 5 | 0.44 | 2010 |
Alerts Analysis and Visualization in Network-based Intrusion Detection Systems | 4 | 0.39 | 2010 |
Generalizable Features Help Semantic Role Labeling. | 0 | 0.34 | 2009 |
Integrating Trust Management into Usage Control in P2P Multimedia Delivery | 2 | 0.38 | 2008 |
Fine-Grained Reputation-based Routing in Wireless Ad Hoc Networks | 8 | 0.65 | 2007 |
New invariant of DNA sequence based on 3DD-curves and its application on phylogeny. | 2 | 0.39 | 2007 |
Formal Representation and Transformation of DTDs to Sem-ODM Semantic Schemas | 0 | 0.34 | 2006 |
Formal Aspect-Oriented Modeling and Analysis by Aspect | 1 | 0.46 | 2005 |
Dynamic Integration Strategy for Mediation Framework | 0 | 0.34 | 2005 |
Design of enhancement current-balanced logic for mixed-signal ICs | 1 | 0.38 | 2003 |
n23Tool: a Tool for Exploring Large Relational Data Sets Through 3D Dynamic Projections. | 0 | 0.34 | 2000 |