Zobrazeno 1 - 10
of 97
pro vyhledávání: '"Ruiying DU"'
Publikováno v:
Tongxin xuebao, Vol 45, Pp 94-105 (2024)
The volume-hiding encrypted multi-map (EMM) scheme is able to prevent attackers from inferring plaintext through the volume leakage, but existing solutions have problems with large storage and search computational costs.Based on the characteristic th
Externí odkaz:
https://doaj.org/article/2191b645849a4a9cb296e8b87aa34eab
Publikováno v:
Tongxin xuebao, Vol 44, Pp 260-277 (2023)
In response to recent developments in adversarial attacks and defenses for object detection, relevant terms and concepts associated with object detection and adversarial learning were first introduced.Subsequently, according to the evolution process
Externí odkaz:
https://doaj.org/article/afaf0c6f3d844e40940f4bc0aea8252e
Autor:
Ruiying Du, Hao Cai, Jiaqi Xuan, Xiaoxi Wang, Miodrag Stevanović, Jan Philipp Dietrich, Alexander Popp, Hermann Lotze-Campen
Publikováno v:
Ecosystem Health and Sustainability, Vol 10 (2024)
The sub-Saharan Africa (SSA) region has experienced substantial population growth over the past decades, accompanied by severe hunger and environmental degradation. Underperforming governance is a major driver of unsustainable agricultural production
Externí odkaz:
https://doaj.org/article/0dab946d600c43d4b8a69b628ccf2f6f
Autor:
Weiping Wang, Ruiying Du, Zhen Wang, Xiong Luo, Haiyan Zhao, Ping Luan, Jipeng Ouyang, Song Liu
Publikováno v:
Brain-X, Vol 1, Iss 3, Pp n/a-n/a (2023)
Abstract Most neuroimaging studies of the pathogenesis of early mild cognitive impairment (EMCI) rely on a node‐centric network model, which only calculates correlations between brain regions. Considering the interaction of low‐order correlations
Externí odkaz:
https://doaj.org/article/5afa18b59e71447aaf0ee30a4f0b5621
Publikováno v:
Frontiers in Bioengineering and Biotechnology, Vol 10 (2022)
On mobile devices, the most important input interface is touchscreen, which can transmit a large amount of sensitive information. Many researchers have proven that sensors can be used as side channels to leak touchscreen interactive information. The
Externí odkaz:
https://doaj.org/article/3b16cd945fec4dd98d0624f2ba8f0f1f
Autor:
Huanguo ZHANG, Ruiying DU
Publikováno v:
网络与信息安全学报, Vol 5, Pp 4-18 (2019)
With rapidly development of electronic information technology and industry,human society comes into information age.In the information age human lives and works in cyberspace.There for,it is the base requirement for human to ensure cyberspace securit
Externí odkaz:
https://doaj.org/article/c8869779e6eb4ab5a42346fecd3813a5
Publikováno v:
网络与信息安全学报, Vol 5, Pp 25-30 (2019)
How to ensure quality of information security undergraduate training under the mode of general education was discussed.Based on the in-depth analysis of the characteristics and knowledge structure of information security specialty,some targeted solut
Externí odkaz:
https://doaj.org/article/224c85e3598f42cf9ab1bb2154032546
Publikováno v:
IEEE Access, Vol 7, Pp 6117-6128 (2019)
In the recent years, the vulnerabilities of conventional public key infrastructure are exposed by the real-world attacks, such as the certificate authority’s single-point-of-failure or clients’ private information leakage. Aimed at the first issu
Externí odkaz:
https://doaj.org/article/87aa4650bfde416f86f02c39568840b8
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:4002-4018
Autor:
Hanzhi SHI, Dian WEN, Yongdong HUANG, Shoujun XU, Tenghaobo DENG, Furong LI, Zhichao WU, Xu WANG, Peihua ZHAO, Fuhua WANG, Ruiying DU
Publikováno v:
Pedosphere. 32:665-672