Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Jingxuan Zhai"'
Autor:
Zhenghong Wang, Zewen Li, Yujie Zhang, Jingye Liao, Kaixiang Guan, Jingxuan Zhai, Pengfei Meng, Xianli Tang, Tao Dong, Yi Song
Publikováno v:
Nature Communications, Vol 15, Iss 1, Pp 1-17 (2024)
Abstract Drought is one of the most serious abiotic stresses, and emerging evidence suggest plant microbiome affects plant drought tolerance. However, there is a lack of genetic evidence regarding whether and how plants orchestrate the dynamic assemb
Externí odkaz:
https://doaj.org/article/8044f930671d488f88cbf8fb3d4f5eb4
Autor:
Zhaoli Wu, Xuehan Wu, Yuancai Zhu, Jingxuan Zhai, Haibo Yang, Zhiwei Yang, Chao Wang, Jilong Sun
Publikováno v:
Wireless Communications and Mobile Computing, Vol 2022 (2022)
In this paper, we propose a target detection algorithm based on adversarial discriminative domain adaptation for infrared and visible image fusion using unsupervised learning methods to reduce the differences between multimodal image information. Fir
Publikováno v:
Wireless Personal Communications. 96:5825-5848
Radio Frequency Identification (RFID) technology is expected to play a key role in the Internet of Things (IoT) and has applications in a wide variety of domains ranging from automation to healthcare systems. Therefore, the security and privacy of RF
Publikováno v:
Chinese Journal of Electronics. 25:912-920
With the development of Radio frequency identification (RFID) technologies, theoretical study on the protocol's design promotes the increasing reality applications of this product. The protocol designers attach significance to untraceability analysis
Publikováno v:
International Journal of Future Generation Communication and Networking. 9:199-212
Nowaday, the worldwide applications of RFID technologies have contributed to the development of supply chain system. However, to be confronted with various security and privacy issues in lightweight RFID protocols, the security analysis of lightweigh
Publikováno v:
Computer Networks. 105:47-59
RFID and Cloud computing are widely used in the IoT (Internet of Things). However, there are few research works which combine RFID ownership transfer schemes with Cloud computing. Subsequently, this paper points out the weaknesses in two protocols pr
Publikováno v:
International Journal of Security and Its Applications. 9:165-174
Publikováno v:
International Journal of Security and Its Applications. 9:387-396
Dynamic ID-based authentication schemes based on password and smart card are widely used to provide two-factor authentication and user anonymity. However, these schemes have one or the other possible security weaknesses. In this paper, we analyze the