Zobrazeno 1 - 10
of 111
pro vyhledávání: '"Haibin ZHENG"'
Autor:
Hao Li, Jian-Wen Huang, Longhai Dai, Haibin Zheng, Si Dai, Qishan Zhang, Licheng Yao, Yunyun Yang, Yu Yang, Jian Min, Rey-Ting Guo, Chun-Chi Chen
Publikováno v:
Nature Communications, Vol 14, Iss 1, Pp 1-9 (2023)
Abstract The biosynthesis of neurotoxin aetokthonotoxin (AETX) that features a unique structure of pentabrominated biindole nitrile involves a first-of-its-kind nitrile synthase termed AetD, an enzyme that shares very low sequence identity to known s
Externí odkaz:
https://doaj.org/article/f7d5b80f288c4ed4b179b1eeec5e85ef
Publikováno v:
Nutrition Journal, Vol 22, Iss 1, Pp 1-9 (2023)
Abstract Background Population-based studies have shown that adequate magnesium intake is associated with a lower risk of stroke and all-cause mortality. Whether adequate magnesium intake is important for reducing all-cause mortality risk after strok
Externí odkaz:
https://doaj.org/article/0e310091e5ab400a989a6532fef68079
Publikováno v:
网络与信息安全学报, Vol 9, Pp 1-20 (2023)
Federated learning (FL) is a distributed machine learning technology that enables joint construction of machine learning models by transmitting intermediate results (e.g., model parameters, parameter gradients, embedding representation, etc.)
Externí odkaz:
https://doaj.org/article/a0a7627e9aa243e8b76ff967cfd126b7
Publikováno v:
High-Confidence Computing, Vol 3, Iss 3, Pp 100131- (2023)
The communication efficiency optimization, censorship resilience, and generation of shared randomness are inseparable from the threshold cryptography in the existing Byzantine Fault Tolerant (BFT) consensus. The membership in consensus in a blockchai
Externí odkaz:
https://doaj.org/article/41572cad395d4f4bb3e77de1a0702529
Publikováno v:
网络与信息安全学报, Vol 8, Pp 48-63 (2022)
Deep learning is widely used in various fields such as image processing, natural language processing, network mining and so on.However, it is vulnerable to malicious adversarial attacks and many defensive methods have been proposed accordingly.Most d
Externí odkaz:
https://doaj.org/article/a3ae1ee7de3b48f692ca05ac8a3febcd
Publikováno v:
Nutrition Journal, Vol 22, Iss 1, Pp 1-1 (2023)
Externí odkaz:
https://doaj.org/article/89ef9268876844ba8d2d2ff50f5590b4
Publikováno v:
网络与信息安全学报, Vol 8, Pp 180-189 (2022)
Liveness detection technology has become an important application in daily life, and it is used in scenarios including mobile phone face unlock, face payment, and remote authentication.However, if attackers use fake video generation technology to gen
Externí odkaz:
https://doaj.org/article/24f861ba86d74cf28167ed6bee6ed76c
Publikováno v:
Tongxin xuebao, Vol 42, Pp 197-210 (2021)
For the problem of poor performance of exciting membership inference attack (MIA) when facing the transfer learning model that is generalized, the MIA for the transfer learning model that is generalized was first systematically studied, the anomaly d
Externí odkaz:
https://doaj.org/article/00689770140949f5982156b440c1ffdd
Autor:
Yang Yang, Shangbin Han, Ping Xie, Yan Zhu, Zhenyang Ding, Shengjie Hou, Shicheng Xu, Haibin Zheng
Publikováno v:
Sensors, Vol 22, Iss 16, p 5951 (2022)
With the increasing demand for privacy protection in the blockchain, the universal zero-knowledge proof protocol has been developed and widely used. Because hash function is an important cryptographic primitive in a blockchain, the zero-knowledge pro
Externí odkaz:
https://doaj.org/article/bd7aaecfb14a4aeca39cfc10515bb3df
Autor:
Shuangyu He, Qianhong Wu, Xizhao Luo, Zhi Liang, Dawei Li, Hanwen Feng, Haibin Zheng, Yanan Li
Publikováno v:
IEEE Access, Vol 6, Pp 7654-7663 (2018)
Effective cryptocurrency key management has become an urgent requirement for modern cryptocurrency. Although a large body of cryptocurrency wallet-management schemes has been proposed, they are mostly constructed for specific application scenarios an
Externí odkaz:
https://doaj.org/article/dd6b226b6a324c52a5e54dd1a146d145