Zobrazeno 1 - 10
of 36
pro vyhledávání: '"Daojun, Han"'
Publikováno v:
Complex & Intelligent Systems, Vol 10, Iss 6, Pp 7893-7905 (2024)
Abstract Named Entity Recognition (NER) is fundamental in natural language processing, involving identifying entity spans and types within a sentence. Nested NER contains other entities, which pose a significant challenge, especially pronounced in th
Externí odkaz:
https://doaj.org/article/fe760adb37d44dcfbd984c8d88a8874a
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 10, Pp 9252-9272 (2022)
Image encryption is an effective method to protect private images by converting them into meaningless ones, but many current image encryption algorithms still have security and efficiency problems. This paper combines compressed sensing (CS) and secr
Externí odkaz:
https://doaj.org/article/5849ce2c0e674f96bad2e127fcad28eb
Publikováno v:
Scientific Reports, Vol 12, Iss 1, Pp 1-11 (2022)
Abstract Aviation activities are constantly increasing as a result of the growth of the global economic system. How to increase airspace capacity within the limited airspace resources while ensuring smooth and safe aircraft operations is a challenge
Externí odkaz:
https://doaj.org/article/1191f7c95b0b49b7b838da3d419b41bc
Publikováno v:
IEEE Internet of Things Journal. 10:7380-7392
Publikováno v:
IEEE Access, Vol 7, Pp 154224-154238 (2019)
Security issues such as natural disasters and terrorist attacks have attracted increasing global concern and attention. How to effectively detect security events has become worrisome to countries worldwide. Advances in mobile Internet technology have
Externí odkaz:
https://doaj.org/article/83f0a9b6c3d94b48a9a880012e62efdf
Publikováno v:
International Journal of Digital Crime and Forensics. 14:1-13
Role-based access control(RBAC) system has been widely used in data security because of its good flexibility and security, wherein RBAC dominates the field of access control. However, the process of establishing RBAC roles is complex and time-consumi
Publikováno v:
Wireless Communications and Mobile Computing.
As a trusted decentralized application, smart contracts manage a large number of digital assets on the blockchain. Vulnerability detection of smart contracts is an important part of ensuring the security of digital assets. At present, many researcher
Publikováno v:
2022 4th International Conference on Frontiers Technology of Information and Computer (ICFTIC).
Publikováno v:
IEEE Access, Vol 7, Pp 154224-154238 (2019)
Security issues such as natural disasters and terrorist attacks have attracted increasing global concern and attention. How to effectively detect security events has become worrisome to countries worldwide. Advances in mobile Internet technology have
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::22ebaa1477b7a0cb9d7b7b2b239b79b7
https://doi.org/10.32920/21505110.v1
https://doi.org/10.32920/21505110.v1
Publikováno v:
Information Sciences. 556:305-340
An efficient visually meaningful double color image encryption algorithm is proposed by combining 2D compressive sensing (CS) with an embedding technique. First, two color images are measured by measurement matrices in two directions to achieve simul