Skip to main content

previous disabled Page of 2
and
Your search also matched 34 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

A computer-aided diagnosis system for breast pathology: a deep learning approach with model interpretability from pathological perspective

Include preview-only content
  1. Article

    Open Access

    Knowledge Mining: A Cross-disciplinary Survey

    Knowledge mining is a widely active research area across disciplines such as natural language processing (NLP), data mining (DM), and machine learning (ML). The overall objective of extracting knowledge from d...

    Yong Rui, Vicente Ivan Sanchez Carmona, Mohsen Pourvali in Machine Intelligence Research (2022)

  2. Book and Conference Proceedings

    Cyber Security

    19th China Annual Conference, CNCERT 2022, Bei**g, China, August 16–17, 2022, Revised Selected Papers

    Wei Lu, Yuqing Zhang, Wei** Wen, Hanbing Yan, Chao Li in Communications in Computer and Information Science (2022)

  3. Book and Conference Proceedings

    Cyber Security

    18th China Annual Conference, CNCERT 2021, Bei**g, China, July 20–21, 2021, Revised Selected Papers

    Wei Lu, Yuqing Zhang, Wei** Wen, Hanbing Yan, Chao Li in Communications in Computer and Information Science (2022)

  4. Chapter and Conference Paper

    Considerations on Evaluation of Practical Cloud Data Protection

    With the continuous growth of enterprises’ digital transformation, business-driven cloud computing has seen tremendous growth. The security community has proposed a large body of technical mechanisms, operatio...

    Rui Mei, Han-Bing Yan, Yongqiang He, Qinqin Wang, Shengqiang Zhu in Cyber Security (2022)

  5. Book and Conference Proceedings

    Cyber Security

    17th China Annual Conference, CNCERT 2020, Bei**g, China, August 12, 2020, Revised Selected Papers

    Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Wei** Wen in Communications in Computer and Information Science (2020)

  6. Chapter and Conference Paper

    Correction to: Single Image Super-Resolution via a Holistic Attention Network

    In the originally published version of chapter 12, the first affiliation stated a wrong city and country. This has been corrected.

    Ben Niu, Weilei Wen, Wenqi Ren, **angde Zhang, Lian** Yang in Computer Vision – ECCV 2020 (2020)

  7. Chapter and Conference Paper

    Faster Enumeration-Based Lattice Reduction: Root Hermite Factor  \(k^{1/(2k)}\)  Time  \(k^{k/8+o(k)}\)

    We give a lattice reduction algorithm that achieves root Hermite factor \(k^{1/(2k)}\) in time

    Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque in Advances in Cryptology – CRYPTO 2020 (2020)

  8. Chapter and Conference Paper

    Towards Classical Hardness of Module-LWE: The Linear Rank Case

    We prove that the module learning with errors ( \(\mathrm {M\text {-}LWE}\) ...

    Katharina Boudgoust, Corentin Jeudy in Advances in Cryptology – ASIACRYPT 2020 (2020)

  9. Book and Conference Proceedings

    Cyber Security

    15th International Annual Conference, CNCERT 2018, Bei**g, China, August 14–16, 2018, Revised Selected Papers

    **aochun Yun, Wei** Wen, Bo Lang, Hanbing Yan, Li Ding in Communications in Computer and Information Science (2019)

  10. Chapter and Conference Paper

    Study on Three-Dimensional Data Acquisition of Crop Grains

    The rapid, efficient and non-destructive 3D morphological data acquisition of plants are great significance to the study of digital plant, functional structural plant model and crop phenotype. This paper discu...

    Zetao Yu, Weiliang Wen, **nyu Guo, **anju Lu in Computer and Computing Technologies in Agr… (2019)

  11. Chapter and Conference Paper

    Android Malware Detection Method Based on Frequent Pattern and Weighted Naive Bayes

    With the market share of Android system becoming the first in the world, the security problem of Android system is becoming more and more serious. How to effectively detect Android malware has become a signifi...

    **gwei Li, Bozhi Wu, Wei** Wen in Cyber Security (2019)

  12. Chapter and Conference Paper

    Fruit Trees 3D Data Acquisition and Reconstruction Based on Multi-source

    In order to realize three-dimensional reconstruction of canopy at different growth stages of fruit trees, 3D data acquisition methods and canopy reconstruction methods were studied. Based on the analysis of mo...

    Sheng Wu, Boxiang **ao, Weiliang Wen in Computer and Computing Technologies in Agr… (2019)

  13. Chapter and Conference Paper

    Multi-scale 3D Data Acquisition of Maize

    In recent years, three-dimensional (3D) data acquisition and model reconstruction of plants have been developed as a hot topic of plant scientific researches. However, the morphological structure of plants is ...

    Weiliang Wen, **nyu Guo, **anju Lu in Computer and Computing Technologies in Agr… (2019)

  14. Chapter and Conference Paper

    A 3D Canopy Reconstruction and Phenotype Analysis Method for Wheat

    A high precise and high realistic three-dimensional wheat canopy model is important in modern agriculture. In this paper, we proposed a 3D reconstruction and quantitative calculation for phenotype analysis met...

    Boxiang **ao, Sheng Wu, **nyu Guo in Computer and Computing Technologies in Agr… (2019)

  15. Chapter and Conference Paper

    Learning with Errors and Extrapolated Dihedral Cosets

    The hardness of the learning with errors (LWE) problem is one of the most fruitful resources of modern cryptography. In particular, it is one of the most prominent candidates for secure post-quantum cryptograp...

    Zvika Brakerski, Elena Kirshanova, Damien Stehlé in Public-Key Cryptography – PKC 2018 (2018)

  16. Chapter and Conference Paper

    Measuring, Simulating and Exploiting the Head Concavity Phenomenon in BKZ

    The Blockwise-Korkine-Zolotarev (BKZ) lattice reduction algorithm is central in cryptanalysis, in particular for lattice-based cryptography. A precise understanding of its practical behavior in terms of run-ti...

    Shi Bai, Damien Stehlé, Weiqiang Wen in Advances in Cryptology – ASIACRYPT 2018 (2018)

  17. Chapter and Conference Paper

    Image Quality Assessment of Enriched Tonal Levels Images

    The quality assessment of a high dynamic image is a challenging task. The few available no reference image quality methods for high dynamic range images are generally in evaluation stage. The most available i...

    Jie Zhao, Wei Wen, Siamak Khatibi in Image and Graphics (2017)

  18. Chapter and Conference Paper

    Novel Software-Based Method to Widen Dynamic Range of CCD Sensor Images

    In the past twenty years, CCD sensor has made huge progress in improving resolution and low-light performance by hardware. However due to physical limits of the sensor design and fabrication, fill factor has b...

    Wei Wen, Siamak Khatibi in Image and Graphics (2015)

  19. Chapter and Conference Paper

    Filling Holes in Triangular Meshes of Plant Organs

    Data missing was always when scanning plant organs by using 3D laser scanner, and this could lead to holes appearing in the mesh surface generated from the scanned point cloud. Basing on the analyzing to the g...

    Zhihui Sun, **nyu Guo, Shenglian Lu in Computer and Computing Technologies in Agr… (2014)

  20. Chapter and Conference Paper

    Virtual Mouse: A Low Cost Proximity-Based Gestural Pointing Device

    Effectively addressing the portability of a computer mouse has motivated researchers to generate diverse solutions. Eliminating the constraints of mouse form factor by adopting vision-based techniques has reco...

    Sheng Kai Tang, Wen Chieh Tseng, Wei Wen Luo in Human-Computer Interaction. Interaction Te… (2011)

previous disabled Page of 2