Zobrazeno 1 - 10
of 132
pro vyhledávání: '"Yunyun DONG"'
Publikováno v:
IET Image Processing, Vol 18, Iss 13, Pp 3801-3814 (2024)
Abstract Image hiding is a task that embeds secret images in digital images without being detected. The performance of image hiding has been greatly improved by using the invertible neural network. However, current image hiding methods are less robus
Externí odkaz:
https://doaj.org/article/4ec66acbb0164eef9f422b479c886abf
Publikováno v:
IET Image Processing, Vol 18, Iss 13, Pp 3961-3975 (2024)
Abstract Image steganography aims to hide secret data in the cover media for covert communication. Though many deep‐learning‐based image steganography methods have been presented, these approaches suffer from the inefficiency of building long‐d
Externí odkaz:
https://doaj.org/article/aacd534488394870a823aedbee92098d
Publikováno v:
IET Image Processing, Vol 18, Iss 10, Pp 2679-2689 (2024)
Abstract Image steganography is the art of concealing secret information within images to prevent detection. In deep‐learning‐based image steganography, a common practice is to fuse the secret image with the cover image to directly generate the s
Externí odkaz:
https://doaj.org/article/a086ba2f370b46c6bf7a11b035084c8b
Publikováno v:
IET Image Processing, Vol 18, Iss 10, Pp 2800-2815 (2024)
Abstract Image hiding is a task that hides secret images into cover images. The purposes of image hiding are to ensure the secret images are invisible to the human and the secret images can be recovered. The current state‐of‐the‐art steganograp
Externí odkaz:
https://doaj.org/article/2d99afd03be0498e9b79560255f99022
Autor:
Yunyun Dong, Yunqing Chang, Yuxiang Wang, Qixuan Han, Xiaoyuan Wen, Ziting Yang, Yan Zhang, Yan Qiang, Kun Wu, Xiaole Fan, Xiaoqiang Ren
Publikováno v:
BMC Bioinformatics, Vol 25, Iss 1, Pp 1-24 (2024)
Abstract Drug combination therapy is generally more effective than monotherapy in the field of cancer treatment. However, screening for effective synergistic combinations from a wide range of drug combinations is particularly important given the incr
Externí odkaz:
https://doaj.org/article/20d331eafe9d471481d56ff4112c2cc4
Publikováno v:
Advanced Intelligent Systems, Vol 6, Iss 7, Pp n/a-n/a (2024)
Image preprocessing models are usually employed as the preceding operations of high‐level vision tasks to improve the performance. The adversarial attack technology makes both these models face severe challenges. Prior research is focused solely on
Externí odkaz:
https://doaj.org/article/d14d2a398bfb42419828da97d4dbc99f
Autor:
Yunyun Dong, Yujie Bai, Haitao Liu, Ziting Yang, Yunqing Chang, Jianguang Li, Qixuan Han, Xiufang Feng, Xiaole Fan, Xiaoqiang Ren
Publikováno v:
Frontiers in Genetics, Vol 15 (2024)
Introduction: Synergistic medication, a crucial therapeutic strategy in cancer treatment, involves combining multiple drugs to enhance therapeutic effectiveness and mitigate side effects. Current research predominantly employs deep learning models fo
Externí odkaz:
https://doaj.org/article/fea5b48904fc42c9992b44114727dc8a
Publikováno v:
网络与信息安全学报, Vol 9, Pp 154-165 (2023)
The issue of model explainability has gained significant attention in understanding the vulnerabilities and anonymous decision-making processes inherent in deep neural networks (DNN).While there has been considerable research on explainability for tr
Externí odkaz:
https://doaj.org/article/29b00d6e844d4c7890d200c7ddfff1aa
Publikováno v:
Remote Sensing, Vol 16, Iss 22, p 4201 (2024)
In recent years, super-resolution technology has gained widespread attention in the field of remote sensing. Despite advancements, current methods often employ uniform reconstruction techniques across entire remote sensing images, neglecting the inhe
Externí odkaz:
https://doaj.org/article/6845535d518348c2a37a3654913865b2
Publikováno v:
Algorithms, Vol 17, Iss 8, p 370 (2024)
In the rapidly evolving domain of mobile edge–cloud computing (MECC), the proliferation of Internet of Things (IoT) devices and mobile applications poses significant challenges, particularly in dynamically managing computational demands and user mo
Externí odkaz:
https://doaj.org/article/62661e03a416439d9bd244f4f7c39856