![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Adversarial Training Based on Latent Distribution Calibration
Deep neural networks show vulnerability to adversarial examples, so it is necessary to study adversarial defense techniques in depth to improve the robustness of deep learning models. Most of the existing defe...
-
Chapter and Conference Paper
Path Planning with Improved Dueling DQN Algorithm for UAVs in Unknown Dynamic Environment
Unmanned Aerial Vehicles (UAVs) have been widely used in emergency rescue because of their small size and low cost, which can effectively reduce casualties and improve rescue efficiency. However, for UAV colli...
-
Article
A data authentication scheme for UAV ad hoc network communication
In this paper, we propose an efficient and energy-saving distributed network architecture based on clustering stratification to solve the information security problem of unmanned aerial vehicle ad hoc network ...
-
Article
A multi-focus image fusion algorithm in 5G communications
In this paper, we first build a mobile cloud platform that users can upload multi-focus images or download full-focus images through the 5G network. Then we design a method named Region Mosaicking on Contrast ...
-
Article
An intelligent method of cancer prediction based on mobile cloud computing
In recent years, mobile medical services have gradually become the common focus of the communications and healthcare industries. People can get medical information and services efficiently and conveniently any...
-
Article
A Novel Hybrid Information Security Scheme for 2D Vector Map
Information hiding is an essential research topic in the theory of hybrid information security. 2D vector map contains a wealth of hybrid information, which requires verification of authenticity and integrity....
-
Chapter and Conference Paper
A Novel Fragile Watermarking Scheme for 2D Vector Map Authentication
In this paper, we use a grou** method and feature marking to ensure a good localization accuracy. Then, on the basis of vertex insertion and an embedding strategy that can resist rotation, translation and sc...
-
Chapter and Conference Paper
A Fragile Watermarking Scheme of Anti-deleting Features for 2D Vector Map
This paper proposes a fragile watermarking scheme of anti-deleting features for 2D vector map. The features in vector map are first divided into disjoint groups to ensure the accuracy of tamper localization. I...