Skip to main content

and
  1. No Access

    Book and Conference Proceedings

  2. No Access

    Chapter and Conference Paper

    Searching for Textual Adversarial Examples with Learned Strategy

    Adversarial attacks can help to reveal the vulnerability of neural networks. In the text classification domain, synonym replacement is an effective way to generate adversarial examples. However, the number of ...

    **angzhe Guo, Ruidan Su, Shikui Tu, Lei Xu in Neural Information Processing (2023)

  3. No Access

    Article

    Automated accurate registration method between UAV image and Google satellite map

    Because Unmanned Aerial Vehicle (UAV) image exhibits low positioning accuracy, the accurate registration of the image is required. Since the viewpoint direction, capturing time and shoot height are considerabl...

    Yijie Yuan, Wei Huang, **angxin Wang, Huaiyu Xu in Multimedia Tools and Applications (2020)

  4. No Access

    Chapter and Conference Paper

    ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device

    RFID is widely used on mobile devices and makes it possible to take advantage of RFID system to complete mobile payment or merchandise information reading. However, the widespread use of RFID tags brings the p...

    Kai Fan, Nan Ge, Yuanyuan Gong, Hui Li in Wireless Algorithms, Systems, and Applicat… (2015)

  5. No Access

    Chapter and Conference Paper

    Design and Implementation of a Parallel Crypto Server

    As demands for secure communication bandwidth grow, efficient processing of cryptographic server at the host has become a constraint that prevents the achievement of acceptable secure services at large e-comme...

    **aofeng Rong, **aojuan Gao, Ruidan Su in Computational Intelligence and Security (2005)