Proceedings of 2023 International Conference on Medical Imaging and Computer-Aided Diagnosis (MICAD 2023)
Medical Imaging and Computer-Aided Diagnosis
Book and Conference Proceedings
Medical Imaging and Computer-Aided Diagnosis
Chapter and Conference Paper
Adversarial attacks can help to reveal the vulnerability of neural networks. In the text classification domain, synonym replacement is an effective way to generate adversarial examples. However, the number of ...
Book and Conference Proceedings
Proceedings of 2022 International Conference on Medical Imaging and Computer-Aided Diagnosis (MICAD 2022)
Article
With the rapid development of IoT, to manage the explosive growth of devices, time synchronization in IoT systems has become crucial. A traditional solution is to designate a trusted time relay to provide time...
Book and Conference Proceedings
Medical Imaging and Computer-Aided Diagnosis
Article
Article
Because Unmanned Aerial Vehicle (UAV) image exhibits low positioning accuracy, the accurate registration of the image is required. Since the viewpoint direction, capturing time and shoot height are considerabl...
Book and Conference Proceedings
Proceeding of 2020 International Conference on Medical Imaging and Computer-Aided Diagnosis (MICAD 2020)
Article
Due to the penetration of various digital devices in our daily life, the data increases in an explosive way. It is highly agreed that the big data era is coming. Big data has a significant and promising future...
Article
With the popularity of mobile social network, more and more people are willing to use a mobile device to accomplish some social activities, such as payment when shop**, product information inquiries, where R...
Chapter and Conference Paper
RFID is widely used on mobile devices and makes it possible to take advantage of RFID system to complete mobile payment or merchandise information reading. However, the widespread use of RFID tags brings the p...
Article
To safeguard the interests of transacting parties, non-repudiation mechanisms need to assure fairness and timeliness. The non-repudiation service currently implemented usually does not consider the requirement...
Chapter and Conference Paper
As demands for secure communication bandwidth grow, efficient processing of cryptographic server at the host has become a constraint that prevents the achievement of acceptable secure services at large e-comme...