咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 4 篇 计算机科学与技术...
    • 1 篇 电子科学与技术(可...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 2 篇 coverless stegan...
  • 1 篇 internet of thin...
  • 1 篇 semantic feature
  • 1 篇 reversible water...
  • 1 篇 privacy protecti...
  • 1 篇 dual-chaining
  • 1 篇 image preprocess...
  • 1 篇 image segmentati...
  • 1 篇 medical image
  • 1 篇 adaptive median ...
  • 1 篇 mask rcnn
  • 1 篇 lbp
  • 1 篇 resource-exhaust...
  • 1 篇 machine learning
  • 1 篇 ecological secur...
  • 1 篇 attention mechan...
  • 1 篇 resnet
  • 1 篇 psr model
  • 1 篇 densenet
  • 1 篇 convolutional ne...

机构

  • 4 篇 college of compu...
  • 3 篇 department of ma...
  • 1 篇 department of ma...
  • 1 篇 key laboratory o...
  • 1 篇 engineering rese...
  • 1 篇 college of infor...
  • 1 篇 jiangsu engineer...
  • 1 篇 department of ma...
  • 1 篇 department of ma...
  • 1 篇 hunan urban and ...
  • 1 篇 the second xiang...

作者

  • 6 篇 neal nxiong
  • 4 篇 yun tan
  • 4 篇 xuyu xiang
  • 4 篇 jiaohua qin
  • 2 篇 yuanjing luo
  • 1 篇 qi jin
  • 1 篇 wentao ma
  • 1 篇 hao tang
  • 1 篇 yuanyuan fu
  • 1 篇 wei li
  • 1 篇 weiwen kong
  • 1 篇 baowei wang
  • 1 篇 zhenggang xu
  • 1 篇 xiaozhou li
  • 1 篇 qingyang zhou
  • 1 篇 yunlin zhao
  • 1 篇 ling tan
  • 1 篇 zhibin he

语言

  • 6 篇 英文
检索条件"作者=Neal NXiong"
6 条 记 录,以下是1-10 订阅
排序:
A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things
收藏 引用
Computers, Materials & Continua 2019年 第3期58卷 679-695页
作者: Baowei Wang Weiwen Kong Wei Li neal nxiong Jiangsu Engineering Centre of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment TechnologySchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Engineering Research Center of Electronic Information and Control from Fujian Provincial Education Department Fuzhou350108China Department of Mathematics and Computer Science Northeastern State UniversityOklahomaUSA.
Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment,especially in resource-constrained sensor networks,such as the perception layer of Internet of Things **... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Algorithm of Helmet Wearing Detection Based on AT-YOLO Deep Mode
收藏 引用
Computers, Materials & Continua 2021年 第10期69卷 159-174页
作者: Qingyang Zhou Jiaohua Qin Xuyu Xiang Yun Tan neal nxiong College of Computer Science and Information Technology Central South University of Forestry&TechnologyChangsha410004China Department of Mathematics and Computer Science Northeastern State UniversityTahlequah74464OKUSA
The existing safety helmet detection methods are mainly based on one-stage object detection algorithms with high detection speed to reach the real-time detection requirements,but they can’t accurately detect small ob... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Coverless Image Steganography Based on Image Segmentation
收藏 引用
Computers, Materials & Continua 2020年 第8期64卷 1281-1295页
作者: Yuanjing Luo Jiaohua Qin Xuyu Xiang Yun Tan Zhibin He neal nxiong College of Computer Science and Information Technology Central South University of Forestry&TechnologyChangsha410114China Department of Mathematics and Computer Science Northeastern State UniversityTahlequah74464USA
To resist the risk of the stego-image being maliciously altered during transmission,we propose a coverless image steganography method based on image *** existing coverless steganography methods are based on whole feat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Ecological Security Evaluation Algorithm for Resource-Exhausted Cities Based on the PSR Model
收藏 引用
Computers, Materials & Continua 2021年 第10期69卷 985-1001页
作者: Xiaozhou Li Zhenggang Xu Yuanyuan Fu Qi Jin Yunlin Zhao neal nxiong Key Laboratory of Forestry Remote Sensing Based Big Data&Ecological Security for Hunan Province Central South University of Forestry and TechnologyChangsha410004China Hunan Urban and Rural Ecological Planning and Restoration Engineering Research Center Hunan City UniversityYiyang413000China College of Information and Electronic Engineering Hunan City UniversityYiyang413000China Department of Mathematics and Computer Science Northeastern State UniversityTahlequah74464USA
Today,resource depletion threatens a number of resource-based cities in *** ecological security problem caused by the long-term exploitation of natural resources is a key issue to be solved in the development of resou... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Adaptive Median Filtering Algorithm Based on Divide and Conquer and Its Application in CAPTCHA Recognition
收藏 引用
Computers, Materials & Continua 2019年 第3期58卷 665-677页
作者: Wentao Ma Jiaohua Qin Xuyu Xiang Yun Tan Yuanjing Luo neal nxiong College of Computer Science and Information Technology Central South University of Forestry&TechnologyChangsha410114China Department of Mathematics and Computer Science Northeastern State UniversityOklahoma74464USA.
As the first barrier to protect cyberspace,the CAPTCHA has made significant contributions to maintaining Internet security and preventing malicious *** researching the CAPTCHA,we can find its vulnerability and improve... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Privacy Protection for Medical Images Based on DenseNet and Coverless Steganography
收藏 引用
Computers, Materials & Continua 2020年 第9期64卷 1797-1817页
作者: Yun Tan Jiaohua Qin Hao Tang Xuyu Xiang Ling Tan neal nxiong College of Computer Science and Information Technology Central South University of Forestry&TechnologyChangsha410114China The Second Xiangya Hospital of Central South University Changsha410011China Department of Mathematics and Computer Science Northeastern State UniversityTahlequah74464USA
With the development of the internet of medical things(IoMT),the privacy protection problem has become more and more *** this paper,we propose a privacy protection scheme for medical images based on DenseNet and cover... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论