標(biāo)題: Titlebook: Advanced Intelligent Computing Technology and Applications; 20th International C De-Shuang Huang,Chuanlei Zhang,Jiayang Guo Conference proc [打印本頁] 作者: 強烈興趣 時間: 2025-3-21 19:32
書目名稱Advanced Intelligent Computing Technology and Applications影響因子(影響力)
書目名稱Advanced Intelligent Computing Technology and Applications影響因子(影響力)學(xué)科排名
書目名稱Advanced Intelligent Computing Technology and Applications網(wǎng)絡(luò)公開度
書目名稱Advanced Intelligent Computing Technology and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Advanced Intelligent Computing Technology and Applications被引頻次
書目名稱Advanced Intelligent Computing Technology and Applications被引頻次學(xué)科排名
書目名稱Advanced Intelligent Computing Technology and Applications年度引用
書目名稱Advanced Intelligent Computing Technology and Applications年度引用學(xué)科排名
書目名稱Advanced Intelligent Computing Technology and Applications讀者反饋
書目名稱Advanced Intelligent Computing Technology and Applications讀者反饋學(xué)科排名
作者: 無瑕疵 時間: 2025-3-21 21:36
Lineare Netze im Eingeschwungenen Zustand,evaluate our system, we collect MAC layer traffic data over 125 h from more than 40 apps. The experimental results show that MACPrint can achieve an accuracy of over 96% for recognizing apps and actions in the closed-world setting, and obtains an accuracy of over 86% in the open-world setting.作者: 鑲嵌細(xì)工 時間: 2025-3-22 00:30
,Der Stromkreis im Quasistation?ren Zustand,at share the same feature space with IQ samples. Then, the distinct advantages of an IQ fingerprinting model in feature extraction are transferred to its CSI counterpart via an auxiliary training strategy. Finally, the trained CSI fingerprinting model is used to decide which device the sample under 作者: modifier 時間: 2025-3-22 06:26 作者: 不容置疑 時間: 2025-3-22 09:19 作者: 偽善 時間: 2025-3-22 13:29 作者: palpitate 時間: 2025-3-22 18:48 作者: pessimism 時間: 2025-3-22 21:47
https://doi.org/10.1007/978-3-662-66188-8d our own practical assembly dataset. What’s more, the practical implementation of a dish-washing machine assembly line shows that our method can help promote both product quality and production efficiency. Our Industrial Assembly Dataset (IndAD) with the video data collected from several practical 作者: Asymptomatic 時間: 2025-3-23 01:30 作者: 多產(chǎn)子 時間: 2025-3-23 08:26 作者: 緯線 時間: 2025-3-23 12:10 作者: Irremediable 時間: 2025-3-23 14:05
Grundlagen der Ephemeridenrechnungh-imaging task planning using a novel representation of grid which can map points and regions of interest to a uniform quantification according to significance distribution in a grid cell. A multi-satellite collaborative observations is then proposed using this grid representation to image a large n作者: 殘暴 時間: 2025-3-23 20:15 作者: 浪蕩子 時間: 2025-3-24 02:07 作者: Ascribe 時間: 2025-3-24 03:16 作者: extract 時間: 2025-3-24 07:40
Textual Backdoor Attack via Keyword Positioning the sentence, that is, the keywords that help the target model make judgments. Therefore, interference with these words often makes the target model make errors in judgment. In this article, we first calculate the importance score and part-of-speech label of each word in the sentence, then select t作者: 火車車輪 時間: 2025-3-24 10:44 作者: 心神不寧 時間: 2025-3-24 17:03 作者: 食料 時間: 2025-3-24 21:58
Spatial-Temporal Transformer Network for Continuous Action Recognition in Industrial Assemblyd our own practical assembly dataset. What’s more, the practical implementation of a dish-washing machine assembly line shows that our method can help promote both product quality and production efficiency. Our Industrial Assembly Dataset (IndAD) with the video data collected from several practical 作者: headlong 時間: 2025-3-25 02:04 作者: 使堅硬 時間: 2025-3-25 06:13
Quantum Robust Coding for Quantum Image Watermarkinge (BER) under “Salt and Pepper” noise and inversion attacks. By comparing with the watermarking process without QRC, the BER of watermark using QRC is reduced by an average of 26.63%, with the highest being 27.86%. Experiments with inversion attacks on images demonstrate that our QRC has an informat作者: 解開 時間: 2025-3-25 08:58 作者: 翅膀拍動 時間: 2025-3-25 14:46
Planning for Earth Imaging Tasks via Grid Significance Mappingh-imaging task planning using a novel representation of grid which can map points and regions of interest to a uniform quantification according to significance distribution in a grid cell. A multi-satellite collaborative observations is then proposed using this grid representation to image a large n作者: 我怕被刺穿 時間: 2025-3-25 18:52 作者: 不能約 時間: 2025-3-25 23:26 作者: Neuropeptides 時間: 2025-3-26 01:48 作者: Frequency-Range 時間: 2025-3-26 07:39
https://doi.org/10.1007/978-3-662-66188-8on of anomaly is refined by a bi-directional inference strategy. Experimental results on both the public dataset MVTec AD and our practical dataset demonstrate the superiority of our method over other state-of-the-art approaches.作者: 注射器 時間: 2025-3-26 09:36 作者: 繁榮地區(qū) 時間: 2025-3-26 13:10 作者: 淺灘 時間: 2025-3-26 19:52 作者: 冥界三河 時間: 2025-3-26 21:14 作者: 滲入 時間: 2025-3-27 04:39 作者: 推遲 時間: 2025-3-27 08:22 作者: 存心 時間: 2025-3-27 12:55
PyCIM: A Python Framework for the Dynamics of Coherent Ising Machineoupling strengths and pump schedules. Moreover, we analyze the impact of parameters on the performance of CIM, which can be used to guide the design and optimization of actual physical systems. Finally, we evaluate the performance of the CIM on a standard graph benchmark set.作者: 摻和 時間: 2025-3-27 15:53 作者: Fluctuate 時間: 2025-3-27 20:18 作者: 柔聲地說 時間: 2025-3-27 22:44
A Secure Voting Scheme Based on Quantum Walk Theoretically, it achieves unconditional security and provides effective anonymity protection for voters’ identity information. Compared with other quantum voting schemes, the proposed approach has better feasibility.作者: 無價值 時間: 2025-3-28 05:04 作者: FOVEA 時間: 2025-3-28 08:57
0302-9743 4882 - the refereed proceedings of the 20th International Conference on Intelligent Computing, ICIC 2024, held in Tianjin, China, during August 5-8, 2024...The total of 863 regular papers were carefully reviewed and selected from 2189 submissions...This year, the conference concentrated mainly on th作者: Cursory 時間: 2025-3-28 13:00 作者: Employee 時間: 2025-3-28 15:22
,Der Stromkreis im Quasistation?ren Zustand,vide a promising supplement to cryptography-based authentication approaches but rely on dedicated equipment to capture in-phase and quadrature (IQ) samples, hindering their wide adoption. Recent advances advocate easily obtainable channel state information (CSI) by commercial WiFi devices for lightw作者: 迎合 時間: 2025-3-28 20:46 作者: 描述 時間: 2025-3-29 02:19 作者: Fortify 時間: 2025-3-29 03:08 作者: FECT 時間: 2025-3-29 10:27 作者: Lobotomy 時間: 2025-3-29 12:04
https://doi.org/10.1007/978-3-642-53948-0er from issues such as complex model structures, redundant parameters, and high computational demands. Therefore, striking a balance between model lightweighting and accuracy has become a new challenge. This paper is based on the single-stage YOLOv5 algorithm framework and presents an optimized desi作者: Androgen 時間: 2025-3-29 17:19
https://doi.org/10.1007/978-3-662-66188-8re are often various intrinsic textures or color patterns on cloth images which makes it difficult to distinguish anomaly and normality. To tackle this issue, we propose a novel self-supervised anomaly detection method consisting of three steps. Firstly, the Vision Transformer-based generation netwo作者: ABHOR 時間: 2025-3-29 20:33 作者: 遭受 時間: 2025-3-30 03:48 作者: RACE 時間: 2025-3-30 07:30
https://doi.org/10.1007/978-3-662-58221-3bustness is challenged because the embedded watermark information is prone to errors, especially noise interference and inversion attacks. In order to improve the robustness of quantum watermarking algorithms, this paper proposes a Quantum Robust Coding (QRC) for the watermark information transforma作者: HEDGE 時間: 2025-3-30 09:54 作者: Terminal 時間: 2025-3-30 12:55
https://doi.org/10.1007/978-3-642-24157-4heavy hazy can greatly degrade the performance of object detection. To mitigate this problem, we propose a novel Detection-focused Dehazing Network (DDNet). This architecture utilizes low-level image restoration to assist in high-level visual tasks, enabling end-to-end training and inference. Specif作者: EXALT 時間: 2025-3-30 18:13
Mehrphasen-Netzwerke, Drehstromtechnik,d on quantum walks to address issues such as number limitations in quantum voting. The proposed scheme utilizes single-qubit particles to blind the voting information, and then uses quantum walks techniques to transmit the information. This scheme utilizes quantum encryption technology, ensuring its作者: 平 時間: 2025-3-30 22:26 作者: 要控制 時間: 2025-3-31 01:40 作者: 稱贊 時間: 2025-3-31 06:15 作者: 預(yù)測 時間: 2025-3-31 13:16 作者: 無王時期, 時間: 2025-3-31 16:21 作者: Progesterone 時間: 2025-3-31 19:43
https://doi.org/10.1007/978-981-97-5609-4Information Security; Machine Learning; Knowledge Discovery and Data Mining; Intelligent Computing in C