Zobrazeno 1 - 10
of 104
pro vyhledávání: '"Yanping Xiang"'
Publikováno v:
Complex & Intelligent Systems, Vol 10, Iss 3, Pp 4033-4054 (2024)
Abstract Learning with Noisy Labels (LNL) methods aim to improve the accuracy of Deep Neural Networks (DNNs) when the training set contains samples with noisy or incorrect labels, and have become popular in recent years. Existing popular LNL methods
Externí odkaz:
https://doaj.org/article/f13026690cef4e31b36574ed72449a1e
Autor:
Yakubu Imrana, Yanping Xiang, Liaqat Ali, Adeeb Noor, Kwabena Sarpong, Muhammed Amin Abdullah
Publikováno v:
Complex & Intelligent Systems, Vol 10, Iss 3, Pp 3353-3370 (2024)
Abstract Identifying and preventing malicious network behavior is a challenge for establishing a secure network communication environment or system. Malicious activities in a network system can seriously threaten users’ privacy and potentially jeop
Externí odkaz:
https://doaj.org/article/fa3e6463a35f45beb0246e30c47ee0e6
Publikováno v:
Frontiers in Chemistry, Vol 10 (2022)
In this study, a novel sulfonic acid-modified catalyst for MOFs (UIO-66-SO3H) was synthesized using chlorosulfonic acid as a sulfonating reagent and first used as efficient heterogeneous catalysts for the one-pot conversion of fructose into biofuel 5
Externí odkaz:
https://doaj.org/article/5364414bf508401fb871f4696eb264d9
Publikováno v:
IEEE Access, Vol 7, Pp 6937-6946 (2019)
In this paper, a quantum image encryption scheme is proposed by using the inter–intra bit-level permutation strategy. The image to be encrypted is first represented by a novel enhanced quantum representation model, and then, the intra and inter per
Externí odkaz:
https://doaj.org/article/a79f8cf770274c2e8434eb4d8d441453
Autor:
Yakubu Imrana, Yanping Xiang, Liaqat Ali, Zaharawu Abdul-Rauf, Yu-Chen Hu, Seifedine Kadry, Sangsoon Lim
Publikováno v:
Sensors, Vol 22, Iss 5, p 2018 (2022)
In a network architecture, an intrusion detection system (IDS) is one of the most commonly used approaches to secure the integrity and availability of critical assets in protected systems. Many existing network intrusion detection systems (NIDS) util
Externí odkaz:
https://doaj.org/article/d38e160009324408ac5235df78f22f5b
Publikováno v:
IEEE Access, Vol 6, Pp 34477-34487 (2018)
Recently, cloud computing has been widely used by relying on its powerful resource integration and computing abilities. In the cloud computing system (CCS), the quality of service (QoS) is an important service evaluation criterion from provider and c
Externí odkaz:
https://doaj.org/article/c3367a0aa8e34ec2ad3e8ef5aed3a028
Publikováno v:
IEEE Transactions on Services Computing. 15:1774-1784
Publikováno v:
International Journal of Digital Crime and Forensics. 13:1-19
In this paper, we propose a compressive sensing(CS)-based scheme that combines encryption and data hiding to provide double protection to the image data in the cloud outsourcing. Different domain techniques are integrated for efficiency and security.
Publikováno v:
IEEE Transactions on Systems, Man, and Cybernetics: Systems. 52:1787-1794
This article considers heterogeneous, cold standby systems performing missions with the fixed amount of work when a failure of an operating element results in a mission failure. A system is operating in a random environment modeled by the Poisson pro
Autor:
Yanping Xiang, Kangyu Zhao, Shuolin Zhou, Wenguang Zhao, Zhijuan Zeng, Xiaoting Zhu, Xianxiang Liu
Publikováno v:
Sustainable Energy & Fuels. 6:2368-2376
The sulfonic acid grafted halloysite nanotubes (HNTs-SO3H) exhibited excellent catalytic activity in the synthesis of biofuel 5-ethoxymethylfurfural from biomass-derived 5-hydroxymethylfurfural.