A Local Rotation Transformation Model for Vehicle Re-Identification

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:WASA (17. : 2022 : Dalian) Wireless algorithms, systems, and applications ; Part 1
1. Verfasser: Chen, Yanbing (VerfasserIn)
Weitere Verfasser: Ke, Wei (VerfasserIn), Sheng, Hao (VerfasserIn), Xiong, Zhang (VerfasserIn)
Pages:1
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement 2022 Zhao, Jiapeng
A Trust Secure Data Aggregation Model with Multiple Attributes for WSNs 2022 Li, Zhaowei
A Novel Self-supervised Few-shot Network Intrusion Detection Method 2022 Zhang, Jing
Reinforcement Learning Based Vulnerability Analysis for Smart Grids Against False Data Injection Attacks 2022 Xu, Shiyu
An Efficient Soft Analytical Side-Channel Attack on Ascon 2022 Luo, Sinian
Phishing Frauds Detection Based on Graph Neural Network on Ethereum 2022 Duan, Xincheng
Wi-KF: A Rehabilitation Motion Recognition in Commercial Wireless Devices 2022 Dang, Xiaochao
A Caching Strategy Based on Spreading Influence in Information-Centric Satellite Networks 2022 Wang, Haowei
E2M: Evolving Mobility Modeling in Metropolitan-Scale Electric Taxi Systems 2022 Wang, Yizong
A Spatial-Temporal Convolutional Model with Improved Graph Representation 2022 Lv, Yang
A Proof-of-Weighted-Planned-Behavior Consensus for Efficient and Reliable Cyber-Physical Systems 2022 Ouyang, Fang
Inferring Device Interactions for Attack Path Discovery in Smart Home IoT 2022 Sun, Mengjie
A Smart Contract-Based Intelligent Traffic Adaptive Signal Control Scheme 2022 Wang, Wenyue
Energy Efficiency Optimization for RIS Assisted RSMA System over Estimated Channel 2022 Gao, Caina
A Practical Data Authentication Scheme for Unattended Wireless Sensor Networks Using Physically Unclonable Functions 2022 Wang, Pingchuan
Interference Mitigation via Collaborative Beamforming in UAV-Enabled Data Collections: A Multi-objective Optimization Method 2022 Li, Hongjuan
Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability 2022 Wang, Xiaolei
A Secure Aggregation Scheme for Model Update in Federated Learning 2022 Wang, Baolin
Efficient Post Quantum Random Oblivious Transfer Based on Lattice 2022 Xu, Lidong
Blockchain-Based Secure and Efficient Federated Learning with Three-phase Consensus and Unknown Device Selection 2022 Wang, Jianrong
Alle Artikel auflisten