Found: 115
Select item for more details and to access through your institution.
Automatic non-proliferative diabetic retinopathy screening system based on color fundus image.
- Published in:
- 2017
- By:
- Publication type:
- journal article
ID-NET:INCEPTION DECONVOLUTIONAL NEURAL NETWORK FOR MULTI-CLASS CLASSIFICATION IN RETINAL FUNDUS IMAGE.
- Published in:
- Journal of Mechanics in Medicine & Biology, 2022, v. 22, n. 8, p. 1, doi. 10.1142/S0219519422400292
- By:
- Publication type:
- Article
Self CNN-based time series stream forecasting.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2016, v. 52, n. 22, p. 33, doi. 10.1049/el.2016.2626
- By:
- Publication type:
- Article
Self CNN‐based time series stream forecasting.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2016, v. 52, n. 21, p. 1857, doi. 10.1049/el.2016.2626
- By:
- Publication type:
- Article
Non-Interactive and Secure Data Aggregation Scheme for Internet of Things.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 20, p. 2464, doi. 10.3390/electronics10202464
- By:
- Publication type:
- Article
Robust degraded face recognition with novel face representation and multiscale fusion.
- Published in:
- Optical Engineering, 2013, v. 52, n. 7, p. 1, doi. 10.1117/1.OE.52.7.073102
- By:
- Publication type:
- Article
Crystal-storing histiocytosis in the stomach: A case report and review of the literature .
- Published in:
- Frontiers in Oncology, 2022, v. 12, p. 1, doi. 10.3389/fonc.2022.1024971
- By:
- Publication type:
- Article
Efficient data hiding with histogram-preserving property.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 179, doi. 10.1007/s11235-010-9364-5
- By:
- Publication type:
- Article
Spectrum-estimation based lossless information recovery for sparse array patterns.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 163, doi. 10.1007/s11235-010-9365-4
- By:
- Publication type:
- Article
Efficient Noninteractive Outsourcing of Large-Scale QR and LU Factorizations.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6184920
- By:
- Publication type:
- Article
Steganography Combining Data Decomposition Mechanism and Stego-coding Method.
- Published in:
- Informatica (03505596), 2009, v. 33, n. 1, p. 41
- By:
- Publication type:
- Article
Association between polymorphism in TRAF1/C5 gene and risk of rheumatoid arthritis: a meta-analysis.
- Published in:
- Molecular Biology Reports, 2014, v. 41, n. 1, p. 317, doi. 10.1007/s11033-013-2864-0
- By:
- Publication type:
- Article
Evolutionary selection extreme learning machine optimization for regression.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2012, v. 16, n. 9, p. 1485, doi. 10.1007/s00500-012-0823-7
- By:
- Publication type:
- Article
Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms.
- Published in:
- International Journal of Multimedia Data Engineering & Management, 2014, v. 5, n. 4, p. 36, doi. 10.4018/ijmdem.2014100103
- By:
- Publication type:
- Article
dbAPIS: a database of anti-prokaryotic immune system genes.
- Published in:
- Nucleic Acids Research, 2024, v. 52, n. D1, p. D419, doi. 10.1093/nar/gkad932
- By:
- Publication type:
- Article
dbCAN3: automated carbohydrate-active enzyme and substrate annotation.
- Published in:
- Nucleic Acids Research, 2023, v. 51, n. W1, p. W115, doi. 10.1093/nar/gkad328
- By:
- Publication type:
- Article
dbCAN-seq update: CAZyme gene clusters and substrates in microbiomes.
- Published in:
- Nucleic Acids Research, 2023, v. 51, n. D1, p. D557, doi. 10.1093/nar/gkac1068
- By:
- Publication type:
- Article
Digital image steganalysis based on local textural features and double dimensionality reduction.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 8, p. 729, doi. 10.1002/sec.1094
- By:
- Publication type:
- Article
Commutative reversible data hiding and encryption.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 11, p. 1396, doi. 10.1002/sec.742
- By:
- Publication type:
- Article
Novelty detection methods for online health monitoring and post data analysis of turbopumps.
- Published in:
- Journal of Mechanical Science & Technology, 2013, v. 27, n. 7, p. 1933, doi. 10.1007/s12206-013-0508-x
- By:
- Publication type:
- Article
Precise Control of Crystallization and Phase‐Transition with Green Anti‐Solvent in Wide‐Bandgap Perovskite Solar Cells with Open‐Circuit Voltage Exceeding 1.25 V.
- Published in:
- Small, 2023, v. 19, n. 22, p. 1, doi. 10.1002/smll.202208289
- By:
- Publication type:
- Article
Photopolymerized Features via Beam Pen Lithography as a Novel Tool for the Generation of Large Area Protein Micropatterns.
- Published in:
- Small, 2022, v. 18, n. 13, p. 1, doi. 10.1002/smll.202105998
- By:
- Publication type:
- Article
Exploration of street space architectural color measurement based on street view big data and deep learning—A case study of Jiefang North Road Street in Tianjin.
- Published in:
- PLoS ONE, 2023, v. 18, n. 11, p. 1, doi. 10.1371/journal.pone.0289305
- By:
- Publication type:
- Article
A pH-sensitive binary drug delivery system based on poly(caprolactone)-heparin conjugates.
- Published in:
- Journal of Biomedical Materials Research, Part A, 2014, v. 102, n. 3, p. 880, doi. 10.1002/jbm.a.34735
- By:
- Publication type:
- Article
Cronobacter sakazakii ATCC 29544 Translocated Human Brain Microvascular Endothelial Cells via Endocytosis, Apoptosis Induction, and Disruption of Tight Junction.
- Published in:
- Frontiers in Microbiology, 2021, v. 12, p. 1, doi. 10.3389/fmicb.2021.675020
- By:
- Publication type:
- Article
Stealthy Backdoor Attacks On Deep Point Cloud Recognization Networks.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1879, doi. 10.1093/comjnl/bxad109
- By:
- Publication type:
- Article
Sparse Backdoor Attack Against Neural Networks.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1783, doi. 10.1093/comjnl/bxad100
- By:
- Publication type:
- Article
Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention.
- Published in:
- Computer Journal, 2024, v. 67, n. 2, p. 498, doi. 10.1093/comjnl/bxac190
- By:
- Publication type:
- Article
Soil Hydrothermal Dynamics in the Hengduan Mountains of Southeast Tibet and Associated Influencing Factors.
- Published in:
- Water (20734441), 2024, v. 16, n. 11, p. 1495, doi. 10.3390/w16111495
- By:
- Publication type:
- Article
Constructive Steganography by Tangles.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 8, p. 3911, doi. 10.3837/tiis.2018.08.020
- By:
- Publication type:
- Article
Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing.
- Published in:
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 7, p. 3648, doi. 10.3837/tiis.2017.07.019
- By:
- Publication type:
- Article
Altered expression of serum miR-106a, miR-19b, miR-17, and PTEN in patients with idiopathic membranous nephropathy.
- Published in:
- 2021
- By:
- Publication type:
- journal article
Phospholipase-A2 receptor antibody, 24 hours proteinuria, and serum albumin as indicators of cyclophosphamide efficacy in idiopathic membranous nephropathy.
- Published in:
- 2020
- By:
- Publication type:
- journal article
Visible-light-induced decarboxylative alkynylation of carboxylic acids in batch and continuous flow.
- Published in:
- Green Synthesis & Catalysis, 2024, v. 5, n. 1, p. 20, doi. 10.1016/j.gresc.2022.10.002
- By:
- Publication type:
- Article
Anatomical and biochemical analyses reveal the mechanism of double-color formation in Paeonia suffruticosa ‘Shima Nishiki’.
- Published in:
- 3 Biotech, 2018, v. 8, n. 10, p. 1, doi. 10.1007/s13205-018-1459-9
- By:
- Publication type:
- Article
Small Target Recognition Using Dynamic Time Warping and Visual Attention.
- Published in:
- Computer Journal, 2022, v. 65, n. 2, p. 203, doi. 10.1093/comjnl/bxaa015
- By:
- Publication type:
- Article
Identity-Based Encryption with Verifiable Outsourced Revocation.
- Published in:
- Computer Journal, 2016, v. 59, n. 11, p. 1659, doi. 10.1093/comjnl/bxw029
- By:
- Publication type:
- Article
Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability.
- Published in:
- Information (2078-2489), 2016, v. 7, n. 2, p. 31, doi. 10.3390/info7020031
- By:
- Publication type:
- Article
An Effective Framework for Intellectual Property Protection of NLG Models.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 6, p. 1287, doi. 10.3390/sym15061287
- By:
- Publication type:
- Article
Steganalysis of Neural Networks Based on Symmetric Histogram Distribution.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 5, p. 1079, doi. 10.3390/sym15051079
- By:
- Publication type:
- Article
Secure Steganographic Cover Generation via a Noise-Optimization Stacked StyleGAN2.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 5, p. 979, doi. 10.3390/sym15050979
- By:
- Publication type:
- Article
Perceptual Hash of Neural Networks.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 4, p. N.PAG, doi. 10.3390/sym14040810
- By:
- Publication type:
- Article
Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles.
- Published in:
- Symmetry (20738994), 2018, v. 10, n. 5, p. 128, doi. 10.3390/sym10050128
- By:
- Publication type:
- Article
Cetrimonium bromide promotes the clearance of lipids by activating the TFEB-mediated autophagosome–lysosome pathway in hepatic cells.
- Published in:
- Biochemistry & Cell Biology, 2021, v. 99, n. 5, p. 519, doi. 10.1139/bcb-2020-0570
- By:
- Publication type:
- Article
Feature-transfer network and local background suppression for microaneurysm detection.
- Published in:
- Machine Vision & Applications, 2021, v. 32, n. 1, p. N.PAG, doi. 10.1007/s00138-020-01119-9
- By:
- Publication type:
- Article
Adaptive Backdoor Attack against Deep Neural Networks.
- Published in:
- CMES-Computer Modeling in Engineering & Sciences, 2023, v. 136, n. 3, p. 2617, doi. 10.32604/cmes.2023.025923
- By:
- Publication type:
- Article
Multimedia Security: Novel Steganography and Privacy Preserving.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/6390945
- By:
- Publication type:
- Article
Secure and Efficient Image Retrieval over Encrypted Cloud Data.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/7915393
- By:
- Publication type:
- Article
Distortion Function for Emoji Image Steganography.
- Published in:
- Computers, Materials & Continua, 2019, v. 59, n. 3, p. 943, doi. 10.32604/cmc.2019.05768
- By:
- Publication type:
- Article
Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification.
- Published in:
- Computers, Materials & Continua, 2018, v. 55, n. 3, p. 495, doi. 10.3970/cmc.2018.02440
- By:
- Publication type:
- Article