Zobrazeno 1 - 10
of 295
pro vyhledávání: '"CAO Yuxin"'
Publikováno v:
Shipin yu jixie, Vol 40, Iss 2, Pp 184-191 (2024)
Objective: This study aimed to improve the functional characteristics of Polygonati rhizoma (PR). Methods: Using the freeze-dried fresh PR and nine-steam-nine-bask processing PR as control products, the study comprehensively compared and analyzed
Externí odkaz:
https://doaj.org/article/4fae8c6024364997af51f5a15d5fba1f
Publikováno v:
Shipin Kexue, Vol 45, Iss 1, Pp 301-312 (2024)
Neurodegenerative diseases are often characterized by progressive dysfunction and loss of neuronal structure and function, including Alzheimer’s disease, Parkinson’s disease, Huntington’s disease. Mitochondria, the center of energy metabolism i
Externí odkaz:
https://doaj.org/article/31a3aec60fd1401096d6f167407d2e20
Publikováno v:
Guan'gai paishui xuebao, Vol 41, Iss 2, Pp 18-26 (2022)
【Objective】 Deficit irrigation is a technology used widely in most arid and semi-arid regions to increase water use efficiency, but how to optimize the timing of and duration of the deficit remains elusive. The objective of this paper is to fill
Externí odkaz:
https://doaj.org/article/e39a9d9197cd4cac8a3310b8bff561a6
Publikováno v:
Xibei Gongye Daxue Xuebao, Vol 40, Iss 1, Pp 175-181 (2022)
The problem of crack propagation in reinforced concrete beams is common in practical engineering. It is very important to correctly describe the law of crack propagation, the mechanism of fracture failure and the internal stress and deformation chara
Externí odkaz:
https://doaj.org/article/f98d7d4f9f694ee1b400fe82c395a161
With just a few speech samples, it is possible to perfectly replicate a speaker's voice in recent years, while malicious voice exploitation (e.g., telecom fraud for illegal financial gain) has brought huge hazards in our daily lives. Therefore, it is
Externí odkaz:
http://arxiv.org/abs/2410.20742
Video classification systems based on Deep Neural Networks (DNNs) have demonstrated excellent performance in accurately verifying video content. However, recent studies have shown that DNNs are highly vulnerable to adversarial examples. Therefore, a
Externí odkaz:
http://arxiv.org/abs/2408.12099
Previous works have shown that reducing parameter overhead and computations for transformer-based single image super-resolution (SISR) models (e.g., SwinIR) usually leads to a reduction of performance. In this paper, we present GRFormer, an efficient
Externí odkaz:
http://arxiv.org/abs/2408.07484
Face recognition pipelines have been widely deployed in various mission-critical systems in trust, equitable and responsible AI applications. However, the emergence of adversarial attacks has threatened the security of the entire recognition pipeline
Externí odkaz:
http://arxiv.org/abs/2407.08514
Randomized Smoothing (RS) is currently a scalable certified defense method providing robustness certification against adversarial examples. Although significant progress has been achieved in providing defenses against $\ell_p$ adversaries, the intera
Externí odkaz:
http://arxiv.org/abs/2406.02309
In light of the widespread application of Automatic Speech Recognition (ASR) systems, their security concerns have received much more attention than ever before, primarily due to the susceptibility of Deep Neural Networks. Previous studies have illus
Externí odkaz:
http://arxiv.org/abs/2405.09470