Research on Perpendicularity of Axial End Face Parts Based on New Generation GPS - This document explains and embodies the process of the solution to perpendicularity error which is used in the axial end face parts. | 0 | 0.34 | 2021 |
Short-Long Correlation Based Graph Neural Networks for Residential Load Forecasting. | 0 | 0.34 | 2021 |
Large-scale Transfer Learning for Low-resource Spoken Language Understanding | 0 | 0.34 | 2020 |
A Novel Social Situation Analytics-Based Recommendation Algorithm For Multimedia Social Networks | 0 | 0.34 | 2019 |
Detecting Malicious Social Bots Based on Clickstream Sequences. | 1 | 0.35 | 2019 |
ProCTA: program characteristic-based thread partition approach. | 0 | 0.34 | 2019 |
Multimedia Social Network Authorization Scheme of Comparison-based Encryption. | 0 | 0.34 | 2019 |
An improvement for combination rule in evidence theory. | 4 | 0.38 | 2019 |
A Novel Authorization Scheme for Multimedia Social Networks Under Cloud Storage Method by Using MA-CP-ABE | 1 | 0.35 | 2018 |
基于SWIFT的海量数据存储平台设计 (Design of Storage Platform for Large Scale Data Based on SWIFT System). | 0 | 0.34 | 2018 |
面向多媒体数字版权保护的委托授权远程证明协议 (Delegation Authorization Protocol Based on Remote Attestation Applied in Multimedia DRM). | 0 | 0.34 | 2018 |
Crowd computing for social media ecosystems | 0 | 0.34 | 2018 |
The convergence of new computing paradigms and big data analytics methodologies for online social networks. | 1 | 0.34 | 2018 |
Efficient Compressed Ciphertext Length Scheme Using Multi-Authority CP-ABE for Hierarchical Attributes. | 3 | 0.38 | 2018 |
A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory. | 3 | 0.40 | 2018 |
Recent research in computational intelligence paradigms into security and privacy for online social networks (OSNs). | 0 | 0.34 | 2018 |
Social media security and trustworthiness: Overview and new direction. | 23 | 0.80 | 2018 |
More permutation polynomials with differential uniformity six. | 0 | 0.34 | 2018 |
Guest Editorial: Recent Advances on Security and Privacy of Multimedia Big Data in the Critical Infrastructure. | 0 | 0.34 | 2018 |
A New Conflict Management Method In Dempster-Shafer Theory | 3 | 0.37 | 2017 |
CyVOD: a novel trinity multimedia social network scheme. | 14 | 0.57 | 2017 |
Guest Editorial: Multimedia Social Network Security and Applications. | 0 | 0.34 | 2017 |
A novel authorization delegation scheme for multimedia social networks by using proxy re-encryption | 8 | 0.50 | 2016 |
人脸识别中基于系数相似性的字典学习算法 (Coefficient-similarity-based Dictionary Learning Algorithm for Face Recognition). | 0 | 0.34 | 2016 |
Security, Trust and Risk in Multimedia Social Networks. | 0 | 0.34 | 2015 |
A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks. | 6 | 0.47 | 2015 |
A novel approach to rights sharing-enabling digital rights management for mobile multimedia | 13 | 0.59 | 2015 |
A trust model for multimedia social networks. | 38 | 1.12 | 2013 |
A Social Network Information Propagation Model Considering Different Types of Social Relationships. | 0 | 0.34 | 2013 |
An Approach to Mobile Multimedia Digital Rights Management Based on Android. | 2 | 0.38 | 2013 |
Application Of Improved Hu Moments In Object Recognition | 1 | 0.35 | 2012 |
Advance on Trust Model and Evaluation Method in Social Networks | 0 | 0.34 | 2012 |
SAR and panchromatic image fusion based on region features in nonsubsampled contourlet transform domain | 0 | 0.34 | 2012 |
True Random Bit Generator Based On Cell Phone Recording And Chaotic Encryption | 0 | 0.34 | 2012 |
Usage Control Model for Digital Rights Management in Digital Home Networks. | 3 | 0.45 | 2011 |
Analytic study on micro electromechanical systems sensor | 0 | 0.34 | 2011 |
Game-theoretic analyses and simulations of adoptions of security policies for DRM in contents sharing scenario | 1 | 0.35 | 2011 |
Utility-Analytic Approach and Swarm Simulations of Security Policies in Digital Rights Management. | 0 | 0.34 | 2010 |
Automatic Segmentation for Breast Skin-line | 7 | 0.56 | 2010 |
Security, trust and risk in Digital Rights Management ecosystem | 7 | 0.54 | 2010 |
Cooperative and non-cooperative game-theoretic analyses of adoptions of security policies for DRM | 4 | 0.45 | 2010 |
Security and Trust in Digital Rights Management: A Survey | 14 | 0.72 | 2009 |
A Fine-Grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement | 1 | 0.36 | 2008 |
Blind source separation/channel equalization of nonlinear channels with binary inputs | 6 | 0.55 | 2005 |