CSpace

浏览/检索结果: 共14条,第1-10条 帮助

限定条件        
已选(0)清除 条数/页:   排序方式:
Context-Driven Image Caption With Global Semantic Relations of the Named Entities 期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 143584-143594
作者:  Jing, Yun;  Zhiwei Xu;  Guanglai Gao
收藏  |  浏览/下载:41/0  |  提交时间:2020/12/10
Semantics  Visualization  Task analysis  Computational modeling  Knowledge based systems  Correlation  Organizations  Image caption  named entity  semantic relation  
CloudDLP: Transparent and Scalable Data Sanitization for Browser-Based Cloud Storage 期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 68449-68459
作者:  Han, Peiyi;  Liu, Chuanyi;  Cao, Jiahao;  Duan, Shaoming;  Pan, Hezhong;  Cao, Zekun;  Fang, Binxing
收藏  |  浏览/下载:95/0  |  提交时间:2020/12/10
Cloud computing  Machine learning  Browsers  Protocols  Cryptography  Electronic mail  Data loss prevention  data sanitization  data security  cloud storage  
A Reliability-Aware Joint Design Method of Application Mapping and Wavelength Assignment for WDM-Based Silicon Photonic Interconnects on Chip 期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 73457-73474
作者:  Li, Hui;  Liu, Feiyang;  Gu, Huaxi;  Chu, Zhuqin;  Ye, Xiaochun
收藏  |  浏览/下载:42/0  |  提交时间:2020/12/10
Wavelength assignment  Reliability  Photonics  Crosstalk  Optical device fabrication  Silicon  Optical crosstalk  Silicon photonic interconnects on chip  design method  reliability  application mapping  wavelength assignment  
Adaptive Slide Window-Based Feature Cognition for Deceptive Information Identification 期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 134311-134323
作者:  Yang, Haolin;  Xu, Zhiwei;  Liu, Limin;  Tian, Jie;  Zhang, Yujun
收藏  |  浏览/下载:85/0  |  提交时间:2020/12/10
Feature extraction  Semantics  Adaptation models  Data mining  Cognition  Convolutional neural networks  Business  Deceptive information cognition  adaptive slide window  semantic structure representation  trivial sentence element elimination  convolutional neural network  
CoL-GAN: Plausible and Collision-Less Trajectory Prediction by Attention-Based GAN 期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 101662-101671
作者:  Liu, Shaohua;  Liu, Haibo;  Bi, Huikun;  Mao, Tianlu
收藏  |  浏览/下载:50/0  |  提交时间:2020/12/10
Trajectory  Generative adversarial networks  Gallium nitride  Predictive models  Collision avoidance  Decoding  Generators  Trajectory prediction  generative adversarial network  deep learning  
MultiPAD: A Multivariant Partition-Based Method for Audio Adversarial Examples Detection 期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 63368-63380
作者:  Guo, Qingli;  Ye, Jing;  Hu, Yu;  Zhang, Guohe;  Li, Xiaowei;  Li, Huawei
收藏  |  浏览/下载:42/0  |  提交时间:2020/12/10
Speech recognition  Feature extraction  Decoding  Mathematical model  Acoustics  Psychoacoustic models  Radio frequency  Adversarial examples  audio  detection  multivariant partition  
A Blockchain-Based Access Control Framework for Cyber-Physical-Social System Big Data 期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 77215-77226
作者:  Tan, Liang;  Shi, Na;  Yang, Caixia;  Yu, Keping
收藏  |  浏览/下载:374/0  |  提交时间:2020/12/10
Servers  Cloud computing  Big Data  Iron  Computer architecture  Authorization  CPSS  CPS  access control  blockchain  transaction  
Moving Object Detection With Deep CNNs 期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 29729-29741
作者:  Zhu, Haidi;  Yan, Xin;  Tang, Hongying;  Chang, Yuchao;  Li, Baoqing;  Yuan, Xiaobing
收藏  |  浏览/下载:42/0  |  提交时间:2020/12/10
Connected region detection  deep convolution neural networks  foreground extraction  high resolution  moving object detection  
Image-Based Rendering for Large-Scale Outdoor Scenes With Fusion of Monocular and Multi-View Stereo Depth 期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 117551-117565
作者:  Liu, Shaohua;  Li, Minghao;  Zhang, Xiaona;  Liu, Shuang;  Li, Zhaoxin;  Liu, Jing;  Mao, Tianlu
收藏  |  浏览/下载:312/0  |  提交时间:2020/12/10
Image-based rendering  multi-view stereo  monocular depth estimation  view synthesis  outdoor scenes  
AuthPrivacyChain: A Blockchain-Based Access Control Framework With Privacy Protection in Cloud 期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 70604-70615
作者:  Yang, Caixia;  Tan, Liang;  Shi, Na;  Xu, Bolei;  Cao, Yang;  Yu, Keping
收藏  |  浏览/下载:269/0  |  提交时间:2020/12/10
Cloud computing  Authorization  Privacy  Distributed databases  Cloud computing  cloud security  access control  blockchain  privacy protection