Found: 66
Select item for more details and to access through your institution.
Hierarchical Graph Neural Network: A Lightweight Image Matching Model with Enhanced Message Passing of Local and Global Information in Hierarchical Graph Neural Networks.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 10, p. 602, doi. 10.3390/info15100602
- By:
- Publication type:
- Article
BranchFusionNet: An energy-efficient lightweight framework for superior retinal vessel segmentation.
- Published in:
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 5, p. 3133, doi. 10.1007/s12083-024-01738-3
- By:
- Publication type:
- Article
CA-ViT: Contour-Guided and Augmented Vision Transformers to Enhance Glaucoma Classification Using Fundus Images.
- Published in:
- Bioengineering (Basel), 2024, v. 11, n. 9, p. 887, doi. 10.3390/bioengineering11090887
- By:
- Publication type:
- Article
Leveraging Image Visual Features in Content-Based Recommender System.
- Published in:
- Scientific Programming, 2018, p. 1, doi. 10.1155/2018/5497070
- By:
- Publication type:
- Article
Frequent Symptom Sets Identification from Uncertain Medical Data in Differentially Private Way.
- Published in:
- Scientific Programming, 2017, p. 1, doi. 10.1155/2017/7545347
- By:
- Publication type:
- Article
Fully Constant-Size CP-ABE with Privacy-Preserving Outsourced Decryption for Lightweight Devices in Cloud-Assisted IoT.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6676862
- By:
- Publication type:
- Article
Taas: Trust assessment as a service for secure communication of green edge-assisted UAV network.
- Published in:
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 4, p. 2221, doi. 10.1007/s12083-024-01701-2
- By:
- Publication type:
- Article
A location privacy protection scheme for convoy driving in autonomous driving era.
- Published in:
- Peer-to-Peer Networking & Applications, 2021, v. 14, n. 3, p. 1388, doi. 10.1007/s12083-020-01034-w
- By:
- Publication type:
- Article
Invalid Signatures Searching Bitwise Divisions-Based Algorithm for Vehicular Ad-Hoc Networks.
- Published in:
- Journal of Advanced Transportation, 2021, p. 1, doi. 10.1155/2021/9970851
- By:
- Publication type:
- Article
Invalid Signatures Searching Bitwise Divisions-Based Algorithm for Vehicular Ad-Hoc Networks.
- Published in:
- Journal of Advanced Transportation, 2021, p. 1, doi. 10.1155/2021/9970851
- By:
- Publication type:
- Article
Stock Market Prediction with Gaussian Naïve Bayes Machine Learning Algorithm.
- Published in:
- Informatica (03505596), 2021, v. 45, n. 2, p. 243, doi. 10.31449/inf.v45i2.3407
- By:
- Publication type:
- Article
Stock Market Decision Support Modeling with Tree-Based Adaboost Ensemble Machine Learning Models.
- Published in:
- Informatica (03505596), 2020, v. 44, n. 4, p. 477, doi. 10.31449/inf.v44i4.3159
- By:
- Publication type:
- Article
Features to Text: A Comprehensive Survey of Deep Learning on Semantic Segmentation and Image Captioning.
- Published in:
- Complexity, 2021, p. 1, doi. 10.1155/2021/5538927
- By:
- Publication type:
- Article
Transfer Learning and Semisupervised Adversarial Detection and Classification of COVID-19 in CT Images.
- Published in:
- Complexity, 2021, p. 1, doi. 10.1155/2021/6680455
- By:
- Publication type:
- Article
Security quality of KMS and KMS adoption: The context of SMEs.
- Published in:
- Human Systems Management, 2022, v. 41, n. 3, p. 357, doi. 10.3233/HSM-211227
- By:
- Publication type:
- Article
Does the knowledge-sharing platform specialist matter in knowledge sharing for secured KMS?
- Published in:
- Human Systems Management, 2021, v. 40, n. 4, p. 519, doi. 10.3233/HSM-200998
- By:
- Publication type:
- Article
A five-factor KMS success model: An empirical study.
- Published in:
- Human Systems Management, 2020, v. 39, n. 3, p. 381, doi. 10.3233/HSM-190791
- By:
- Publication type:
- Article
Electroencephalogram-Based Subject Matching Learning (ESML): A Deep Learning Framework on Electroencephalogram-Based Biometrics and Task Identification.
- Published in:
- Behavioral Sciences (2076-328X), 2023, v. 13, n. 9, p. 765, doi. 10.3390/bs13090765
- By:
- Publication type:
- Article
Non-interactive deniable ring signature without random oracles.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 12, p. 1810, doi. 10.1002/sec.859
- By:
- Publication type:
- Article
Synthetic Aperture Radar Automatic Target Recognition Based on a Simple Attention Mechanism.
- Published in:
- International Journal of Interactive Multimedia & Artificial Intelligence, 2023, v. 8, n. 4, p. 67, doi. 10.9781/ijimai.2023.02.004
- By:
- Publication type:
- Article
Multi‐modal brain tumor image segmentation based on SDAE.
- Published in:
- International Journal of Imaging Systems & Technology, 2018, v. 28, n. 1, p. 38, doi. 10.1002/ima.22254
- By:
- Publication type:
- Article
Flood or Non-Flooded: A Comparative Study of State-of-the-Art Models for Flood Image Classification Using the FloodNet Dataset with Uncertainty Offset Analysis.
- Published in:
- Water (20734441), 2023, v. 15, n. 5, p. 875, doi. 10.3390/w15050875
- By:
- Publication type:
- Article
Enhancing Alzheimer's Disease Classification using 3D Convolutional Neural Network and Multilayer Perceptron Model with Attention Network.
- Published in:
- KSII Transactions on Internet & Information Systems, 2023, v. 17, n. 11, p. 2924, doi. 10.3837/tiis.2023.11.002
- By:
- Publication type:
- Article
Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System.
- Published in:
- KSII Transactions on Internet & Information Systems, 2021, v. 15, n. 1, p. 302, doi. 10.3837/tiis.2021.01.017
- By:
- Publication type:
- Article
A pairing-free key-insulated certificate-based signature scheme with provable security.
- Published in:
- KSII Transactions on Internet & Information Systems, 2015, v. 9, n. 3, p. 1246, doi. 10.3837/tiis.2015.03.023
- By:
- Publication type:
- Article
The Structural Properties of Online Social Networks and their Application Areas.
- Published in:
- IAENG International Journal of Computer Science, 2016, v. 43, n. 2, p. 156
- By:
- Publication type:
- Article
Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework.
- Published in:
- Information (2078-2489), 2020, v. 11, n. 6, p. 334, doi. 10.3390/info11060334
- By:
- Publication type:
- Article
Evaluation of Tree-Based Ensemble Machine Learning Models in Predicting Stock Price Direction of Movement.
- Published in:
- Information (2078-2489), 2020, v. 11, n. 6, p. 332, doi. 10.3390/info11060332
- By:
- Publication type:
- Article
An ECDSA Approach to Access Control in Knowledge Management Systems Using Blockchain.
- Published in:
- Information (2078-2489), 2020, v. 11, n. 2, p. 111, doi. 10.3390/info11020111
- By:
- Publication type:
- Article
Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 5, p. 669, doi. 10.3390/sym11050669
- By:
- Publication type:
- Article
A Service Recommendation Algorithm Based on Modeling of Dynamic and Diverse Demands.
- Published in:
- International Journal of Web Services Research, 2018, v. 15, n. 1, p. 47, doi. 10.4018/IJWSR.2018010103
- By:
- Publication type:
- Article
MSDP: multi-scheme privacy-preserving deep learning via differential privacy.
- Published in:
- Personal & Ubiquitous Computing, 2023, v. 27, n. 2, p. 221, doi. 10.1007/s00779-021-01545-0
- By:
- Publication type:
- Article
MIA-UNet: Multi-Scale Iterative Aggregation U-Network for Retinal Vessel Segmentation.
- Published in:
- CMES-Computer Modeling in Engineering & Sciences, 2021, v. 129, n. 2, p. 805, doi. 10.32604/cmes.2021.017332
- By:
- Publication type:
- Article
Quantum Dialogue Based on Hypertanglement Against Collective Noise.
- Published in:
- International Journal of Theoretical Physics, 2016, v. 55, n. 8, p. 3607, doi. 10.1007/s10773-016-2989-8
- By:
- Publication type:
- Article
Accelerating pairwise statistical significance estimation for local alignment by harvesting GPU's power.
- Published in:
- BMC Bioinformatics, 2012, v. 13, n. Suppl 5, p. 1, doi. 10.1186/1471-2105-13-S5-S3
- By:
- Publication type:
- Article
Efficient access control with traceability and user revocation in IoT.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 20, p. 31487, doi. 10.1007/s11042-021-11286-0
- By:
- Publication type:
- Article
A Lightweight Fine-Grained Search Scheme over Encrypted Data in Cloud-Assisted Wireless Body Area Networks.
- Published in:
- Wireless Communications & Mobile Computing, 2019, p. 1, doi. 10.1155/2019/9340808
- By:
- Publication type:
- Article
Towards high performance security policy evaluation.
- Published in:
- Journal of Supercomputing, 2012, v. 59, n. 3, p. 1577, doi. 10.1007/s11227-011-0569-5
- By:
- Publication type:
- Article
Multi-Classification of Breast Cancer Lesions in Histopathological Images Using DEEP_Pachi: Multiple Self-Attention Head.
- Published in:
- Diagnostics (2075-4418), 2022, v. 12, n. 5, p. N.PAG, doi. 10.3390/diagnostics12051152
- By:
- Publication type:
- Article
Medical Image Registration Using B-Spline Transform.
- Published in:
- International Journal of Simulation: Systems, Science & Technology, 2016, v. 17, n. 48, p. 1.1, doi. 10.5013/IJSSST.a.17.48.01
- By:
- Publication type:
- Article
Recent Advancements in Fruit Detection and Classification Using Deep Learning Techniques.
- Published in:
- Mathematical Problems in Engineering, 2022, p. 1, doi. 10.1155/2022/9210947
- By:
- Publication type:
- Article
Alternating Relaxed Twin Bounded Support Vector Clustering.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 2, p. 1129, doi. 10.1007/s11277-017-5147-6
- By:
- Publication type:
- Article
Characterization of Complex Networks for Epidemics Modeling.
- Published in:
- Wireless Personal Communications, 2015, v. 83, n. 4, p. 2835, doi. 10.1007/s11277-015-2569-x
- By:
- Publication type:
- Article
Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes.
- Published in:
- Wireless Personal Communications, 2015, v. 80, n. 4, p. 1671, doi. 10.1007/s11277-014-2106-3
- By:
- Publication type:
- Article
Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 2, p. 1401, doi. 10.1007/s11277-014-1936-3
- By:
- Publication type:
- Article
On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol.
- Published in:
- Wireless Personal Communications, 2014, v. 74, n. 2, p. 883, doi. 10.1007/s11277-013-1328-0
- By:
- Publication type:
- Article
Incorporating Word Significance into Aspect-Level Sentiment Analysis.
- Published in:
- Applied Sciences (2076-3417), 2019, v. 9, n. 17, p. 3522, doi. 10.3390/app9173522
- By:
- Publication type:
- Article
Constructing secure‐channel free identity‐based encryption with equality test for vehicle‐data sharing in cloud computing.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2022, v. 33, n. 5, p. 1, doi. 10.1002/ett.3896
- By:
- Publication type:
- Article
Oblivious transfer with hidden access control and outsourced decryption from deterministic finite automata‐based functional encryption for an in‐vehicle sensor database system.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2022, v. 33, n. 5, p. 1, doi. 10.1002/ett.3870
- By:
- Publication type:
- Article
FRP: a fast resource placement algorithm in distributed cloud computing platform.
- Published in:
- Concurrency & Computation: Practice & Experience, 2016, v. 28, n. 5, p. 1399, doi. 10.1002/cpe.3654
- By:
- Publication type:
- Article