Automatic Counting of Railway Tools Based on Deep Learning

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:SocialSec (6. : 2020 : Tientsin) Security and privacy in social networks and big data
1. Verfasser: Wei, Wei (VerfasserIn)
Weitere Verfasser: Yang, Jin (VerfasserIn), Wang, Sikai (VerfasserIn), Chen, Deng (VerfasserIn), Zhang, Yanduo (VerfasserIn), Zhang, Zihang (VerfasserIn), Liu, Wei (VerfasserIn), Duan, Gonghao (VerfasserIn), Zheng, Chaohui (VerfasserIn), Ju, Jianping (VerfasserIn), Tang, Jianyin (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A Malicious URL Detection Model Based on Convolutional Neural Network 2020 Wang, Zhiqiang
A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning 2020 Wang, Shuoru
Research on LDoS Attack Detection and Defense Mechanism in Software Defined Networks 2020 Xie, Shengxu
An Efficient and Revocable Auditing Scheme for the Internet of Things 2020 Jun-Feng, Tian
A VirtualXposed-Based Inline Hooking Framework for Android Native Methods 2020 Feng, Shuo
An Android Data Protection Scheme for System-as-Root Architectures 2020 Yang, Kai
The Movie Recommendation System Based on Differential Privacy 2020 Li, Min
Automatic Counting of Railway Tools Based on Deep Learning 2020 Wei, Wei
On the Security of a Certificateless Public Verification Scheme for Cloud-Based Cyber-Physical-Social Systems 2020 Wang, Jing
Forward Calculation for Improving the Sensitivity of Multiple Perturbations in Magnetic Induction Tomography Based on Brain Tissue Structure 2020 Lv, Yi
UAV-Enabled Social Internet of Vehicles: Roles, Security Issues and Use Cases 2020 Tang, Chaogang
An Efficient Influence Maximization Algorithm Based on Social Relationship Priority in Mobile Social Networks 2020 Zhang, Xinxin
Key Nodes Recognition in Opportunistic Network 2020 Wang, Zhifei
Efficient and Secure Two-Party Distributed Signing Protocol for the GOST Signature Algorithm 2020 Zhang, Yunru
Generating Adversarial Malware Examples with API Semantics-Awareness for Black-Box Attacks 2020 Peng, Xiaowei
A Two-Fitness Resource Scheduling Strategy Based on Improved Particle Swarm Optimization 2020 Qiao, Xueming
Privacy-Preserving Graph Operations for Social Network Analysis 2020 Li, Peng
Risk Assessment of Heterogeneous CPS Systems Under Different Proportions of Links 2020 Peng, Hao
Security-Enhanced Timed-Release Encryption in the Random Oracle Model 2020 Yuan, Ke
Unsupervised Analysis of Encrypted Video Traffic Based on Levenshtein Distance 2020 Yang, Luming
Alle Artikel auflisten