We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 5,384 results
  1. Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks

    As cross-chain technologies enable interactions among different blockchains (hereinafter “chains”), multi-chain consensus is becoming increasingly...

    Wenbo Zhang, Tao Wang, ... **gyu Feng in Frontiers of Information Technology & Electronic Engineering
    Article 01 April 2024
  2. Multi-exit self-distillation with appropriate teachers

    Multi-exit architecture allows early-stop inference to reduce computational cost, which can be used in resource-constrained circumstances. Recent...

    Wujie Sun, Defang Chen, ... Chun Chen in Frontiers of Information Technology & Electronic Engineering
    Article 01 April 2024
  3. Characterization of Cascaded DNA Generation Reaction for Amplifying DNA Signal

    Toward the construction of robotic and cybernetic systems with molecular reactions, development of a reaction that can rapidly generate...

    Ken Komiya, Chizuru Noda, Masayuki Yamamura in New Generation Computing
    Article 31 March 2024
  4. Adaptive and augmented active anomaly detection on dynamic network traffic streams

    Active anomaly detection queries labels of sampled instances and uses them to incrementally update the detection model, and has been widely adopted...

    Article 23 March 2024
  5. Towards adaptive graph neural networks via solving prior-data conflicts

    Graph neural networks (GNNs) have achieved remarkable performance in a variety of graph-related tasks. Recent evidence in the GNN community shows...

    Article 23 March 2024
  6. A robust tensor watermarking algorithm for diffusion-tensor images

    Watermarking algorithms that use convolution neural networks have exhibited good robustness in studies of deep learning networks. However, after...

    Chengmeng Liu, Zhi Li, ... Long Zheng in Frontiers of Information Technology & Electronic Engineering
    Article 23 March 2024
  7. Low-rank matrix recovery with total generalized variation for defending adversarial examples

    Low-rank matrix decomposition with first-order total variation (TV) regularization exhibits excellent performance in exploration of image structure....

    Wen Li, Hengyou Wang, ... Wing W. Y. Ng in Frontiers of Information Technology & Electronic Engineering
    Article 23 March 2024
  8. Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system

    Electronic healthcare systems can offer convenience but face the risk of data forgery and information leakage. To solve these issues, we propose an...

    Article 23 March 2024
  9. Vibration harmonic suppression technology for electromagnetic vibrators based on an improved sensorless feedback control method

    To realize low harmonic distortion of the vibration waveform output from electromagnetic vibrators, we propose a vibration harmonic suppression...

    Wei Li, Junning Cui, ... Limin Zou in Frontiers of Information Technology & Electronic Engineering
    Article 23 March 2024
  10. Towards understanding bogus traffic service in online social networks

    Critical functionality and huge influence of the hot trend/topic page (HTP) in microblogging sites have driven the creation of a new kind of...

    ** He, Xuhong Zhang, ... Shouling Ji in Frontiers of Information Technology & Electronic Engineering
    Article 23 March 2024
  11. Engineering applications and technical challenges of active array microsystems

    In the post-Moore era, the development of active phased array antennas will inevitably trend towards active array microsystems. In this paper, the...

    Article 23 March 2024
  12. Good-case early-stop** latency of synchronous byzantine reliable broadcast: the deterministic case

    This paper considers the good-case latency of Byzantine Reliable Broadcast (BRB), i.e., the time taken by correct processes to deliver a message when...

    Timothé Albouy, Davide Frey, ... François Taïani in Distributed Computing
    Article 22 March 2024
  13. The Way Forward with AI-Complete Problems

    Sven Groppe, Sarika Jain in New Generation Computing
    Article 19 March 2024
  14. Deep convolutional encoder–decoder networks based on ensemble learning for semantic segmentation of high-resolution aerial imagery

    Due to the complexity of object information and optical conditions of high-resolution aerial imagery, it is difficult to obtain fine semantic...

    Huming Zhu, Chendi Liu, ... Biao Hou in CCF Transactions on High Performance Computing
    Article 14 March 2024
  15. IRI_Debug: An Ontology Evaluation Tool

    We use ontology to capture the knowledge about domains. There are considerable number of ontologies which have been developed. To develop a new...

    Vishal Lama, Archana Patel, ... Sarika Jain in New Generation Computing
    Article 12 March 2024
  16. Efficient Classification of Hallmark of Cancer Using Embedding-Based Support Vector Machine for Multilabel Text

    The Hallmark of Cancers consists of various biological capabilities of the tumor cell which help the medical experts to understand the development...

    Shikha Verma, Aditi Sharan, Nidhi Malik in New Generation Computing
    Article 12 March 2024
  17. New characterizations of generalized Boolean functions

    This paper focuses on providing the characteristics of generalized Boolean functions from a new perspective. We first generalize the classical...

    Zhiyao Yang, Pinhui Ke, Zuling Chang in Applicable Algebra in Engineering, Communication and Computing
    Article 11 March 2024
Did you find what you were looking for? Share feedback.