Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Shengang Hao"'
Autor:
Shengang Hao, Jun Zheng, Jie Yang, Haipeng Sun, Quanxin Zhang, Li Zhang, Nan Jiang, Yuanzhang Li
Publikováno v:
Information Sciences. 634:85-100
Publikováno v:
International Journal of Intelligent Systems. 37:11382-11406
Publikováno v:
Chinese Journal of Electronics. 31:732-740
Publikováno v:
Electronics
Volume 12
Issue 5
Pages: 1189
Volume 12
Issue 5
Pages: 1189
Deep map prediction plays a crucial role in comprehending the three-dimensional structure of a scene, which is essential for enabling mobile robots to navigate autonomously and avoid obstacles in complex environments. However, most existing depth est
Publikováno v:
Scientific Programming. 2022:1-13
With the continuous expansion of software scale and the continuous complexity of software functions, abnormal parameter configuration often brings adverse effects to the software system and even leads to system failure. Therefore, a method is needed
Publikováno v:
Computer Communications. 182:212-222
VoLTE (Voice over Long-Term Evolution) is a widely used, high-performance, and end-to-end transmission solution in 4G and 5G. However, it also provides a new foundation for the CTC (covert timing channel), which transmits data in a hidden way. Becaus
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031168147
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3e712e69e6598e5eedd31065eecd8a9c
https://doi.org/10.1007/978-3-031-16815-4_6
https://doi.org/10.1007/978-3-031-16815-4_6
Publikováno v:
IJCAI
Deep neural networks (DNNs) have been found to be vulnerable to adversarial examples. Adversarial examples are malicious images with visually imperceptible perturbations. While these carefully crafted perturbations restricted with tight Lp norm bound
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1cc77cf57d22933caa224eb1b3ea7b51
http://arxiv.org/abs/2107.01396
http://arxiv.org/abs/2107.01396
Publikováno v:
Annals of Telecommunications. 74:451-460
As a small-sized database engine, SQLite is widely used in embedded devices, such as mobile phones and PDAs. Large amounts of sensitive personal data are stored in SQLite. Any unintentional data deletion or unexpected device damage can cause consider
Publikováno v:
Mathematical Methods in the Applied Sciences. 38:2680-2702
In this paper, we are concerned with the Cauchy problem for the density-dependent incompressible flow of liquid crystals in thewhole space (N ≥ 2).We prove the localwell-posedness for large initial velocity field and director field of the system in