Zobrazeno 1 - 10
of 364
pro vyhledávání: '"JinZhao Wu"'
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-15 (2024)
Abstract This paper introduces two three-term trust region conjugate gradient algorithms, TT-TR-WP and TT-TR-CG, which are capable of converging under non-Lipschitz continuous gradient functions without any additional conditions. These algorithms pos
Externí odkaz:
https://doaj.org/article/f2530d4a34fa4df0abd34012f8e22d1a
Publikováno v:
Alexandria Engineering Journal, Vol 61, Iss 11, Pp 8417-8429 (2022)
In response to the problem that facial features are likely to cause privacy leakage and identity theft of the user, this paper presents a method for generating De-identification facial images based on attention models and adversarial examples. The me
Externí odkaz:
https://doaj.org/article/ea0cbea4e50e4c78a92149698f2075ea
Publikováno v:
IET Image Processing, Vol 14, Iss 15, Pp 3676-3681 (2020)
Privacy information leaks have become a major problem hindering the development of the convolutional neural network and deep learning. Differential privacy protection has been applied to deep learning by more and more scholars to protect image traini
Externí odkaz:
https://doaj.org/article/6f26d56a77d9451196239252d02774d8
Publikováno v:
IEEE Access, Vol 8, Pp 2109-2121 (2020)
Semi-supervised learning is a machine learning approach that tackles the challenge of having a large set of unlabeled data and few labeled ones. In this paper we adopt a semi-supervised self-training method to increase the amount of training data, pr
Externí odkaz:
https://doaj.org/article/da8636969d0f4e54bdc23d1ce3470fed
Publikováno v:
IEEE Access, Vol 8, Pp 103385-103394 (2020)
The features in facial images, which are utilized for a variety of technological applications, pose a significant privacy concern for users. This paper proposes a method for protecting privacy in facial images based on the principal components of adv
Externí odkaz:
https://doaj.org/article/3594701131fa411b981dbdd43f4a7ff5
Publikováno v:
Systems Science & Control Engineering, Vol 7, Iss 2, Pp 48-52 (2019)
Ordinary differential equations (ODEs) have a wide range of potential applications in science and engineering with regard to nonlinear dynamic systems. Frequently, there is a focus upon locating unique solutions to ODEs, with non-unique solutions bei
Externí odkaz:
https://doaj.org/article/3d29fb575ef349189f72301896188863
Publikováno v:
Mathematical Biosciences and Engineering, Vol 16, Iss 3, Pp 1280-1299 (2019)
Secret sharing (SS) can be used as an important group key management technique for distributed cloud storage and cloud computing. In a traditional threshold SS scheme, a secret is shared among a number of participants and each participant receives on
Externí odkaz:
https://doaj.org/article/1666b29a81504886b1c0319913b81c9c
Publikováno v:
IEEE Access, Vol 7, Pp 156326-156337 (2019)
Determining the affine equivalence of Boolean functions has significant applications in circuit and cryptography. Previous methods for determining this require a large amount of computation when Boolean functions are bent functions or when the truth
Externí odkaz:
https://doaj.org/article/c44541ab8ce64d3f92e17b4b30ef8f57
Publikováno v:
International Journal of Software Engineering and Knowledge Engineering. 33:733-763
Consistency is a significant indicator to measure the correctness of a software system in its lifecycle. It is inevitable to introduce inconsistencies between different software artifacts in the software development process. In practice, developers p
Autor:
Zhenxing Xu, Jinzhao Wu
Publikováno v:
Symmetry, Vol 14, Iss 2, p 365 (2022)
In this article, we propose a new computational method for initial value problems in ordinary differential equations. The algorithm combines the merits of the group preserving scheme (GPS), which has the ability of avoiding possible spurious solution
Externí odkaz:
https://doaj.org/article/45ff7f070ba747158c60c85d7dc803b2