Found: 66
Select item for more details and to access through your institution.
Multi‐modal brain tumor image segmentation based on SDAE.
- Published in:
- International Journal of Imaging Systems & Technology, 2018, v. 28, n. 1, p. 38, doi. 10.1002/ima.22254
- By:
- Publication type:
- Article
Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 5, p. 669, doi. 10.3390/sym11050669
- By:
- Publication type:
- Article
Guaranteed distributed machine learning: Privacy-preserving empirical risk minimization.
- Published in:
- Mathematical Biosciences & Engineering, 2021, v. 18, n. 4, p. 4772, doi. 10.3934/mbe.2021243
- By:
- Publication type:
- Article
Insuring against the perils in distributed learning: privacy-preserving empirical risk minimization.
- Published in:
- Mathematical Biosciences & Engineering, 2021, v. 18, n. 4, p. 3006, doi. 10.3934/mbe.2021151
- By:
- Publication type:
- Article
Public key encryption with temporary and fuzzy keyword search.
- Published in:
- Mathematical Biosciences & Engineering, 2019, v. 16, n. 5, p. 3914, doi. 10.3934/mbe.2019193
- By:
- Publication type:
- Article
A pairing-free key-insulated certificate-based signature scheme with provable security.
- Published in:
- KSII Transactions on Internet & Information Systems, 2015, v. 9, n. 3, p. 1246, doi. 10.3837/tiis.2015.03.023
- By:
- Publication type:
- Article
BranchFusionNet: An energy-efficient lightweight framework for superior retinal vessel segmentation.
- Published in:
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 5, p. 3133, doi. 10.1007/s12083-024-01738-3
- By:
- Publication type:
- Article
Taas: Trust assessment as a service for secure communication of green edge-assisted UAV network.
- Published in:
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 4, p. 2221, doi. 10.1007/s12083-024-01701-2
- By:
- Publication type:
- Article
A location privacy protection scheme for convoy driving in autonomous driving era.
- Published in:
- Peer-to-Peer Networking & Applications, 2021, v. 14, n. 3, p. 1388, doi. 10.1007/s12083-020-01034-w
- By:
- Publication type:
- Article
MSDP: multi-scheme privacy-preserving deep learning via differential privacy.
- Published in:
- Personal & Ubiquitous Computing, 2023, v. 27, n. 2, p. 221, doi. 10.1007/s00779-021-01545-0
- By:
- Publication type:
- Article
Fully Constant-Size CP-ABE with Privacy-Preserving Outsourced Decryption for Lightweight Devices in Cloud-Assisted IoT.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6676862
- By:
- Publication type:
- Article
Invalid Signatures Searching Bitwise Divisions-Based Algorithm for Vehicular Ad-Hoc Networks.
- Published in:
- Journal of Advanced Transportation, 2021, p. 1, doi. 10.1155/2021/9970851
- By:
- Publication type:
- Article
Invalid Signatures Searching Bitwise Divisions-Based Algorithm for Vehicular Ad-Hoc Networks.
- Published in:
- Journal of Advanced Transportation, 2021, p. 1, doi. 10.1155/2021/9970851
- By:
- Publication type:
- Article
Brain MR Image Classification for Alzheimer’s Disease Diagnosis Based on Multifeature Fusion.
- Published in:
- Computational & Mathematical Methods in Medicine, 2017, p. 1, doi. 10.1155/2017/1952373
- By:
- Publication type:
- Article
Efficient access control with traceability and user revocation in IoT.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 20, p. 31487, doi. 10.1007/s11042-021-11286-0
- By:
- Publication type:
- Article
DCIL: Devices Collaboration Indoor Localization with Soft AP.
- Published in:
- Adhoc & Sensor Wireless Networks, 2016, v. 30, n. 1/2, p. 47
- By:
- Publication type:
- Article
Stock Market Prediction with Gaussian Naïve Bayes Machine Learning Algorithm.
- Published in:
- Informatica (03505596), 2021, v. 45, n. 2, p. 243, doi. 10.31449/inf.v45i2.3407
- By:
- Publication type:
- Article
Stock Market Decision Support Modeling with Tree-Based Adaboost Ensemble Machine Learning Models.
- Published in:
- Informatica (03505596), 2020, v. 44, n. 4, p. 477, doi. 10.31449/inf.v44i4.3159
- By:
- Publication type:
- Article
Equality test with an anonymous authorization in cloud computing.
- Published in:
- Wireless Networks (10220038), 2021, v. 27, n. 2, p. 1063, doi. 10.1007/s11276-020-02462-5
- By:
- Publication type:
- Article
Synthetic Aperture Radar Automatic Target Recognition Based on a Simple Attention Mechanism.
- Published in:
- International Journal of Interactive Multimedia & Artificial Intelligence, 2023, v. 8, n. 4, p. 67, doi. 10.9781/ijimai.2023.02.004
- By:
- Publication type:
- Article
Recent Advancements in Fruit Detection and Classification Using Deep Learning Techniques.
- Published in:
- Mathematical Problems in Engineering, 2022, p. 1, doi. 10.1155/2022/9210947
- By:
- Publication type:
- Article
Accelerating pairwise statistical significance estimation for local alignment by harvesting GPU's power.
- Published in:
- BMC Bioinformatics, 2012, v. 13, n. Suppl 5, p. 1, doi. 10.1186/1471-2105-13-S5-S3
- By:
- Publication type:
- Article
Security quality of KMS and KMS adoption: The context of SMEs.
- Published in:
- Human Systems Management, 2022, v. 41, n. 3, p. 357, doi. 10.3233/HSM-211227
- By:
- Publication type:
- Article
Does the knowledge-sharing platform specialist matter in knowledge sharing for secured KMS?
- Published in:
- Human Systems Management, 2021, v. 40, n. 4, p. 519, doi. 10.3233/HSM-200998
- By:
- Publication type:
- Article
A five-factor KMS success model: An empirical study.
- Published in:
- Human Systems Management, 2020, v. 39, n. 3, p. 381, doi. 10.3233/HSM-190791
- By:
- Publication type:
- Article
Enhancing Alzheimer's Disease Classification using 3D Convolutional Neural Network and Multilayer Perceptron Model with Attention Network.
- Published in:
- KSII Transactions on Internet & Information Systems, 2023, v. 17, n. 11, p. 2924, doi. 10.3837/tiis.2023.11.002
- By:
- Publication type:
- Article
Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System.
- Published in:
- KSII Transactions on Internet & Information Systems, 2021, v. 15, n. 1, p. 302, doi. 10.3837/tiis.2021.01.017
- By:
- Publication type:
- Article
The Structural Properties of Online Social Networks and their Application Areas.
- Published in:
- IAENG International Journal of Computer Science, 2016, v. 43, n. 2, p. 156
- By:
- Publication type:
- Article
Multi-Head Spatiotemporal Attention Graph Convolutional Network for Traffic Prediction.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 8, p. 3836, doi. 10.3390/s23083836
- By:
- Publication type:
- Article
Attention Autoencoder for Generative Latent Representational Learning in Anomaly Detection.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 1, p. 123, doi. 10.3390/s22010123
- By:
- Publication type:
- Article
CA-ViT: Contour-Guided and Augmented Vision Transformers to Enhance Glaucoma Classification Using Fundus Images.
- Published in:
- Bioengineering (Basel), 2024, v. 11, n. 9, p. 887, doi. 10.3390/bioengineering11090887
- By:
- Publication type:
- Article
MIA-UNet: Multi-Scale Iterative Aggregation U-Network for Retinal Vessel Segmentation.
- Published in:
- CMES-Computer Modeling in Engineering & Sciences, 2021, v. 129, n. 2, p. 805, doi. 10.32604/cmes.2021.017332
- By:
- Publication type:
- Article
Incorporating Word Significance into Aspect-Level Sentiment Analysis.
- Published in:
- Applied Sciences (2076-3417), 2019, v. 9, n. 17, p. 3522, doi. 10.3390/app9173522
- By:
- Publication type:
- Article
Flood or Non-Flooded: A Comparative Study of State-of-the-Art Models for Flood Image Classification Using the FloodNet Dataset with Uncertainty Offset Analysis.
- Published in:
- Water (20734441), 2023, v. 15, n. 5, p. 875, doi. 10.3390/w15050875
- By:
- Publication type:
- Article
Quantum Dialogue Based on Hypertanglement Against Collective Noise.
- Published in:
- International Journal of Theoretical Physics, 2016, v. 55, n. 8, p. 3607, doi. 10.1007/s10773-016-2989-8
- By:
- Publication type:
- Article
A Service Recommendation Algorithm Based on Modeling of Dynamic and Diverse Demands.
- Published in:
- International Journal of Web Services Research, 2018, v. 15, n. 1, p. 47, doi. 10.4018/IJWSR.2018010103
- By:
- Publication type:
- Article
Features to Text: A Comprehensive Survey of Deep Learning on Semantic Segmentation and Image Captioning.
- Published in:
- Complexity, 2021, p. 1, doi. 10.1155/2021/5538927
- By:
- Publication type:
- Article
Transfer Learning and Semisupervised Adversarial Detection and Classification of COVID-19 in CT Images.
- Published in:
- Complexity, 2021, p. 1, doi. 10.1155/2021/6680455
- By:
- Publication type:
- Article
Certificateless-Based Anonymous Authentication and Aggregate Signature Scheme for Vehicular Ad Hoc Networks.
- Published in:
- Wireless Communications & Mobile Computing, 2021, p. 1, doi. 10.1155/2021/6677137
- By:
- Publication type:
- Article
Alternating Relaxed Twin Bounded Support Vector Clustering.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 2, p. 1129, doi. 10.1007/s11277-017-5147-6
- By:
- Publication type:
- Article
Characterization of Complex Networks for Epidemics Modeling.
- Published in:
- Wireless Personal Communications, 2015, v. 83, n. 4, p. 2835, doi. 10.1007/s11277-015-2569-x
- By:
- Publication type:
- Article
Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes.
- Published in:
- Wireless Personal Communications, 2015, v. 80, n. 4, p. 1671, doi. 10.1007/s11277-014-2106-3
- By:
- Publication type:
- Article
Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 2, p. 1401, doi. 10.1007/s11277-014-1936-3
- By:
- Publication type:
- Article
On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol.
- Published in:
- Wireless Personal Communications, 2014, v. 74, n. 2, p. 883, doi. 10.1007/s11277-013-1328-0
- By:
- Publication type:
- Article
Electroencephalogram-Based Subject Matching Learning (ESML): A Deep Learning Framework on Electroencephalogram-Based Biometrics and Task Identification.
- Published in:
- Behavioral Sciences (2076-328X), 2023, v. 13, n. 9, p. 765, doi. 10.3390/bs13090765
- By:
- Publication type:
- Article
Oblivious transfer with hidden access control and outsourced decryption from deterministic finite automata‐based functional encryption for an in‐vehicle sensor database system.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2022, v. 33, n. 5, p. 1, doi. 10.1002/ett.3870
- By:
- Publication type:
- Article
Constructing secure‐channel free identity‐based encryption with equality test for vehicle‐data sharing in cloud computing.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2022, v. 33, n. 5, p. 1, doi. 10.1002/ett.3896
- By:
- Publication type:
- Article
Computer-Mediated Communication Portal Implementation Framework: A Higher Education Institutional Perspective.
- Published in:
- International Journal of Emerging Technologies in Learning, 2020, v. 15, n. 3, p. 180, doi. 10.3991/ijet.v15i03.11641
- By:
- Publication type:
- Article
Managing an Information System Transformat in Higher Educational Institutions: A Case Study on CMC Portal in Ghana.
- Published in:
- International Journal of Emerging Technologies in Learning, 2019, v. 14, n. 22, p. 232, doi. 10.3991/ijet.v14i22.11240
- By:
- Publication type:
- Article
Medical Image Registration Using B-Spline Transform.
- Published in:
- International Journal of Simulation: Systems, Science & Technology, 2016, v. 17, n. 48, p. 1.1, doi. 10.5013/IJSSST.a.17.48.01
- By:
- Publication type:
- Article