Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Shunzhi Jiang"'
Publikováno v:
Shipin Kexue, Vol 45, Iss 11, Pp 258-266 (2024)
In this study, ‘Sabará’ jabuticaba fruit were stored at (5.0 ± 0.2) ℃ or near-freezing temperature ((0.0 ± 0.2) ℃), and evaluated for changes in quality attributes and antioxidant activity after 18 days. The results showed that compared wi
Externí odkaz:
https://doaj.org/article/149ae62015144b95859555a68f5bf6e7
Publikováno v:
Mathematics, Vol 8, Iss 9, p 1446 (2020)
Steganography is a collection of techniques for concealing the existence of information by embedding it within a cover. With the development of deep learning, some novel steganography methods have appeared based on the autoencoder or generative adver
Externí odkaz:
https://doaj.org/article/0bf01d8508234cbfae7d2d4f0cd23074
Publikováno v:
International Journal of Intelligent Systems. 37:10193-10210
It is well established that neural networks are vulnerable to adversarial examples, which are almost imperceptible on human vision and can cause the deep models misbehave. Such phenomenon may lead to severely inestimable consequences in the safety an
Publikováno v:
IETE Technical Review. 38:184-194
The speech synthesis system of a particular character is a TTS (text-to-speech) synthetic system, which can obtain voice with the specific speaker’s voice characteristics. The traditional method, b...
Publikováno v:
Computers, Materials & Continua. 62:1365-1386
Publikováno v:
Multimedia Tools and Applications. 79:4315-4331
Nowadays, convolutional neural network (CNN) based steganalysis methods achieved great performance. While those methods are also facing security problems. In this paper, we proposed an attack scheme aiming at CNN based steganalyzer including two diff
SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application
Publikováno v:
Journal of Network and Computer Applications. 165:102689
Massive data is transferred in the Internet of Thing (IoT) every single second. Protecting the security of these data is a crucial task. Steganography is a collection of techniques for concealing the existence of information by embedding it within ir
Publikováno v:
Mathematics
Volume 8
Issue 9
Mathematics, Vol 8, Iss 1446, p 1446 (2020)
Volume 8
Issue 9
Mathematics, Vol 8, Iss 1446, p 1446 (2020)
Steganography is a collection of techniques for concealing the existence of information by embedding it within a cover. With the development of deep learning, some novel steganography methods have appeared based on the autoencoder or generative adver
Publikováno v:
Journal of Real-Time Image Processing; Jun2019, Vol. 16 Issue 3, p623-633, 11p
Publikováno v:
Shipin Kexue/ Food Science; 2024, Vol. 45 Issue 11, p258-266, 9p