Zobrazeno 1 - 10
of 2 255
pro vyhledávání: '"WENG Jian"'
Publikováno v:
Shanghai yufang yixue, Vol 36, Iss 4, Pp 348-351 (2024)
ObjectiveTo analyze the etiological results of influenza-like case surveillance in Taizhou, Zhejiang Province from 2013 to 2022, to timely understand the epidemic trend of influenza viruses and the change rule of dominant virus strains, and to
Externí odkaz:
https://doaj.org/article/6643bfc55c5d4a778af48802a564d602
Autor:
WANG Ziyi, WENG Jian, WANG Hongzhu, SHENG Ying, LI Guixia, CHEN Xikai, LI Congcong, GUAN Yaya, SHEN Weiwei
Publikováno v:
Shanghai yufang yixue, Vol 34, Iss 7, Pp 638-641 (2022)
ObjectiveWe examined the principal respiratory pathogens in patients with acute respiratory tract infection in Taizhou, Zhejiang Province during 2020‒2021 to provide evidence for prevention, diagnosis and treatment of acute respiratory tract in
Externí odkaz:
https://doaj.org/article/9c3a9b1341214e9286dda24be098ddf5
The great economic values of deep neural networks (DNNs) urge AI enterprises to protect their intellectual property (IP) for these models. Recently, proof-of-training (PoT) has been proposed as a promising solution to DNN IP protection, through which
Externí odkaz:
http://arxiv.org/abs/2410.04397
Knowledge tracing (KT) is the problem of predicting students' future performance based on their historical interaction sequences. With the advanced capability of capturing contextual long-term dependency, attention mechanism becomes one of the essent
Externí odkaz:
http://arxiv.org/abs/2407.17097
Publikováno v:
网络与信息安全学报, Vol 5, Iss 3, Pp 44-53 (2019)
The competition in cyberspace is ultimately the competition of talents. Nowadays, countries around the world pay great attention to the training of cyber security talents. the current situation of cyber security talents cultivation is introduced, the
Externí odkaz:
https://doaj.org/article/538c606ebcbc4082927276e0be756347
Autor:
Qiao Li, Cai Peng-Peng, Shen Zhong-Hua, Wu Hong-Ke, Tan Cheng-Xia, Weng Jian-Quan, Liu Xing-Hai
Publikováno v:
Heterocyclic Communications, Vol 25, Iss 1, Pp 66-72 (2019)
Two pyrazol-4-carboxamides, 3-(difluoromethyl)-N-(mesitylcarbamoyl)-1-methyl-1H-pyrazole-4-carboxa-mide (7a) and 3-(difluoromethyl)-N-((3,5-dimethylphenyl) carbamoyl)-1-methyl-1H-pyrazole-4-carboxamide (7b) were synthesized and their structures were
Externí odkaz:
https://doaj.org/article/05f4d65bdab842418b7a3177dbb910c4
Federated learning (FL) has attracted widespread attention because it supports the joint training of models by multiple participants without moving private dataset. However, there are still many security issues in FL that deserve discussion. In this
Externí odkaz:
http://arxiv.org/abs/2405.04029
Deep neural network (DNN) typically involves convolutions, pooling, and activation function. Due to the growing concern about privacy, privacy-preserving DNN becomes a hot research topic. Generally, the convolution and pooling operations can be suppo
Externí odkaz:
http://arxiv.org/abs/2403.00239
Developing robust and interpretable vision systems is a crucial step towards trustworthy artificial intelligence. In this regard, a promising paradigm considers embedding task-required invariant structures, e.g., geometric invariance, in the fundamen
Externí odkaz:
http://arxiv.org/abs/2402.15430
Bit-serial Processing-In-Memory (PIM) is an attractive paradigm for accelerator architectures, for parallel workloads such as Deep Learning (DL), because of its capability to achieve massive data parallelism at a low area overhead and provide orders-
Externí odkaz:
http://arxiv.org/abs/2311.11384