Found: 59
Select item for more details and to access through your institution.
A federated graph neural network framework for privacy-preserving personalization.
- Published in:
- Nature Communications, 2022, v. 13, n. 1, p. 1, doi. 10.1038/s41467-022-30714-9
- By:
- Publication type:
- Article
Fine-Grained Sleep Apnea Detection Method from Multichannel Ballistocardiogram Using Convolution Neural Network.
- Published in:
- Journal of Donghua University (English Edition), 2023, v. 40, n. 2, p. 185, doi. 10.19884/j.1672-5220.202112002
- By:
- Publication type:
- Article
Prediction of Online Judge Practice Passing Rate Based on Knowledge Tracing.
- Published in:
- Journal of Donghua University (English Edition), 2021, v. 38, n. 3, p. 240, doi. 10.19884/j.1672-5220.202011091
- By:
- Publication type:
- Article
Deep Knowledge Tracing Embedding Neural Network for Individualized Learning.
- Published in:
- Journal of Donghua University (English Edition), 2020, v. 37, n. 6, p. 512, doi. 10.19884/j.1672-5220.202009062
- By:
- Publication type:
- Article
Enabling Efficient Verification of Dynamic Data Possession and Batch Updating in Cloud Storage.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 6, p. 2429, doi. 10.3837/tiis.2018.06.001
- By:
- Publication type:
- Article
Text Selenography Based on CIA-poetry Generation Using Markov Chain Model.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 9, p. 4568, doi. 10.3837/tiis.2016.09.029
- By:
- Publication type:
- Article
Performance of Database Driven Network Applications from the User Perspective.
- Published in:
- KSII Transactions on Internet & Information Systems, 2009, v. 3, n. 3, p. 235, doi. 10.3837/tiis.2009.03.002
- By:
- Publication type:
- Article
Communication-efficient federated learning via knowledge distillation.
- Published in:
- Nature Communications, 2022, v. 13, n. 1, p. 1, doi. 10.1038/s41467-022-29763-x
- By:
- Publication type:
- Article
Blockchain-Based Privacy-Preserving Public Auditing for Group Shared Data.
- Published in:
- Intelligent Automation & Soft Computing, 2023, v. 35, n. 3, p. 2604, doi. 10.32604/iasc.2023.030191
- By:
- Publication type:
- Article
A Fuzzy Computing Model for Identifying Polarity of Chinese Sentiment Words.
- Published in:
- Computational Intelligence & Neuroscience, 2015, v. 2015, p. 1, doi. 10.1155/2015/525437
- By:
- Publication type:
- Article
Study on Very Fast Transient Overvoltage Characteristics of Gas-Insulated Switchgear Substation Based on Hybrid Reactive Power Compensation.
- Published in:
- Mathematical Problems in Engineering, 2022, v. 2022, p. 1, doi. 10.1155/2022/2914983
- By:
- Publication type:
- Article
TS-CSW: text steganalysis and hidden capacity estimation based on convolutional sliding windows.
- Published in:
- Multimedia Tools & Applications, 2020, v. 79, n. 25/26, p. 18293, doi. 10.1007/s11042-020-08716-w
- By:
- Publication type:
- Article
A novel steganographic method for algebraic-code-excited-linear-prediction speech streams based on fractional pitch delay search.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 7, p. 8447, doi. 10.1007/s11042-018-6867-7
- By:
- Publication type:
- Article
The Diverse Health Preservation Literature and Ideas in the Sanyuan Canzan Yanshou Shu.
- Published in:
- Religions, 2024, v. 15, n. 7, p. 834, doi. 10.3390/rel15070834
- By:
- Publication type:
- Article
Taiyi: The Axis of Philosophy of the Laozi.
- Published in:
- Religions, 2023, v. 14, n. 11, p. 1372, doi. 10.3390/rel14111372
- By:
- Publication type:
- Article
A New Study on Features Exploring of the Concept of Wen and Zhi in Lao-Zhuang's Philosophy.
- Published in:
- Religions, 2023, v. 14, n. 8, p. 1013, doi. 10.3390/rel14081013
- By:
- Publication type:
- Article
A Goddess with Bird's Claws: An Exploration of the Image of Magu.
- Published in:
- Religions, 2023, v. 14, n. 7, p. 944, doi. 10.3390/rel14070944
- By:
- Publication type:
- Article
A New Study on Fushi of Early Quanzhen Daoism.
- Published in:
- Religions, 2023, v. 14, n. 6, p. 814, doi. 10.3390/rel14060814
- By:
- Publication type:
- Article
Women Become Immortal through the Use of Procreation Ability: A Study on the Fertility Concept of Female Alchemy.
- Published in:
- Religions, 2023, v. 14, n. 6, p. 727, doi. 10.3390/rel14060727
- By:
- Publication type:
- Article
A Study on Pei Yue and His Poems Written to Monks.
- Published in:
- Religions, 2022, v. 13, n. 3, p. 194, doi. 10.3390/rel13030194
- By:
- Publication type:
- Article
Differentially private knowledge transfer for federated learning.
- Published in:
- Nature Communications, 2023, v. 14, n. 1, p. 1, doi. 10.1038/s41467-023-38794-x
- By:
- Publication type:
- Article
An ECC-based access control scheme with lightweight decryption and conditional authentication for data sharing in vehicular networks.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2020, v. 24, n. 24, p. 18881, doi. 10.1007/s00500-020-05117-x
- By:
- Publication type:
- Article
Public audit for operation behavior logs with error locating in cloud storage.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2019, v. 23, n. 11, p. 3779, doi. 10.1007/s00500-018-3038-8
- By:
- Publication type:
- Article
Enabling public auditability for operation behaviors in cloud storage.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2017, v. 21, n. 8, p. 2175, doi. 10.1007/s00500-016-2311-y
- By:
- Publication type:
- Article
Distributed steganalysis of compressed speech.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2017, v. 21, n. 3, p. 795, doi. 10.1007/s00500-015-1816-0
- By:
- Publication type:
- Article
Multi-period early-warning precipitation identification method for the easily waterlogged districts in Jiangxi province, China.
- Published in:
- Theoretical & Applied Climatology, 2024, v. 155, n. 4, p. 2705, doi. 10.1007/s00704-023-04774-w
- By:
- Publication type:
- Article
A Multi-grained Log Auditing Scheme for Cloud Data Confidentiality.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 2, p. 842, doi. 10.1007/s11036-019-01328-1
- By:
- Publication type:
- Article
A High-Capacity Covering Code for Voice-Over-IP Steganography.
- Published in:
- International Journal of Information Technology & Web Engineering, 2015, v. 10, n. 3, p. 46, doi. 10.4018/IJITWE.2015070104
- By:
- Publication type:
- Article
Solidification of Undercooled Liquid under Supergravity Field by Phase-Field Crystal Approach.
- Published in:
- Metals (2075-4701), 2022, v. 12, n. 2, p. N.PAG, doi. 10.3390/met12020232
- By:
- Publication type:
- Article
Layer‐Tunable Nonlinear Optical Characteristics and Photocarrier Dynamics of 2D PdSe<sub>2</sub> in Broadband Spectra.
- Published in:
- Small, 2021, v. 17, n. 50, p. 1, doi. 10.1002/smll.202103938
- By:
- Publication type:
- Article
Constructing a Reinforced and Gradient Solid Electrolyte Interphase on Si Nanoparticles by In‐Situ Thiol‐Ene Click Reaction for Long Cycling Lithium‐Ion Batteries.
- Published in:
- Small, 2021, v. 17, n. 40, p. 1, doi. 10.1002/smll.202102316
- By:
- Publication type:
- Article
UEPF: A blockchain based Uniform Encoding and Parsing Framework in multi-cloud environments.
- Published in:
- KSII Transactions on Internet & Information Systems, 2021, v. 15, n. 8, p. 2849, doi. 10.3837/tiis.2021.08.008
- By:
- Publication type:
- Article
Detecting Steganography of Adaptive Multirate Speech with Unknown Embedding Rate.
- Published in:
- Mobile Information Systems, 2017, p. 1, doi. 10.1155/2017/5418978
- By:
- Publication type:
- Article
Review Rating Prediction Based on User Context and Product Context.
- Published in:
- Applied Sciences (2076-3417), 2018, v. 8, n. 10, p. 1849, doi. 10.3390/app8101849
- By:
- Publication type:
- Article
Λ-Nonlocality of Multipartite States and the Related Nonlocality Inequalities.
- Published in:
- International Journal of Theoretical Physics, 2018, v. 57, n. 5, p. 1498, doi. 10.1007/s10773-018-3677-7
- By:
- Publication type:
- Article
Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating.
- Published in:
- Computational Intelligence & Neuroscience, 2016, p. 1, doi. 10.1155/2016/5968705
- By:
- Publication type:
- Article
Some Fundamental Results on Complex Network Problem for Large-Scale Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 4, p. 2927, doi. 10.1007/s11277-014-1677-3
- By:
- Publication type:
- Article
Removing AI's sentiment manipulation of personalized news delivery.
- Published in:
- Humanities & Social Sciences Communications, 2022, v. 9, n. 1, p. 1, doi. 10.1057/s41599-022-01473-1
- By:
- Publication type:
- Article
The evaluation and application of node influence in dynamic networks based on evolving communities.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2019, v. 30, n. 9, p. N.PAG, doi. 10.1002/ett.3556
- By:
- Publication type:
- Article
Blockchain-Based Light-Weighted Provable Data Possession for Low Performance Devices.
- Published in:
- Computers, Materials & Continua, 2022, v. 73, n. 2, p. 2205, doi. 10.32604/cmc.2022.027939
- By:
- Publication type:
- Article
Novel Insights into Energy Storage Mechanism of Aqueous Rechargeable Zn/MnO<sub>2</sub> Batteries with Participation of Mn<sup>2+</sup>.
- Published in:
- Nano-Micro Letters, 2019, v. 11, n. 1, p. N.PAG, doi. 10.1007/s40820-019-0278-9
- By:
- Publication type:
- Article
Optimization of CNN through Novel Training Strategy for Visual Classification Problems.
- Published in:
- Entropy, 2018, v. 20, n. 4, p. 290, doi. 10.3390/e20040290
- By:
- Publication type:
- Article
Long-Lived Multifunctional Superhydrophobic Heterostructure Via Molecular Self-Supply.
- Published in:
- Advanced Materials Interfaces, 2016, v. 3, n. 5, p. n/a, doi. 10.1002/admi.201500727
- By:
- Publication type:
- Article
An Improved Method for Web Text Affective Cognition Computing Based on Knowledge Graph.
- Published in:
- Computers, Materials & Continua, 2019, v. 59, n. 1, p. 1, doi. 10.32604/cmc.2019.06032
- By:
- Publication type:
- Article
Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing.
- Published in:
- Computers, Materials & Continua, 2018, v. 56, n. 1, p. 1, doi. 10.3970/cmc.2018.03697
- By:
- Publication type:
- Article
SSLSS: Semi-Supervised Learning-based Steganalysis Scheme for Instant Voice Communication Network.
- Published in:
- Journal of Residuals Science & Technology, 2017, v. 14, n. 3, p. 291, doi. 10.14355/jrst.2017.1403.029
- By:
- Publication type:
- Article
Analytical Calculation of Critical Anchoring Length of Steel Bar and GFRP Antifloating Anchors in Rock Foundation.
- Published in:
- Mathematical Problems in Engineering, 2021, p. 1, doi. 10.1155/2021/7838042
- By:
- Publication type:
- Article
Blockchain-based Privacy-Preserving Group Data Auditing with Secure User Revocation.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 45, n. 1, p. 183, doi. 10.32604/csse.2023.031030
- By:
- Publication type:
- Article
Regional Cortical Surface Area in Adolescents: A Preliminary MRI Twin Study of Genetic and Environmental Contributions.
- Published in:
- Behavior Genetics, 2016, v. 46, n. 2, p. 205, doi. 10.1007/s10519-015-9755-1
- By:
- Publication type:
- Article
CSFL: A novel unsupervised convolutionr neural network approach for visual pattern classification.
- Published in:
- AI Communications, 2017, v. 30, n. 5, p. 311, doi. 10.3233/AIC-170739
- By:
- Publication type:
- Article