Have a personal or library account? Click to login

Showing 817-828 of 159237

Three-Dimensional Line-of-Sight Estimation Based on RTACM-Net and Vision Transformer
Article

Three-Dimensional Line-of-Sight Estimation Based on RTACM-Net and Vision Transformer

Tingjuan Sang, Wuqi Gao
Power Optimization Approaches in Mobile Operating Systems
Article

Power Optimization Approaches in Mobile Operating Systems

Shekh Abdullah-Al-Musa Ahmed, Md.Atiqur Rahman Sifat, Muhammad Imtiaz Ahmed, Fahmida Dipty
Research on a Lightweight Small Object Detection Method Based on Lite-RFB Modules
Article

Research on a Lightweight Small Object Detection Method Based on Lite-RFB Modules

Fei Wang, Liping Lu
Speech Processing Using Dynamic Micro-Block Optimization Based on Deep Learning
Article

Speech Processing Using Dynamic Micro-Block Optimization Based on Deep Learning

Jiajun Hao, Chaoyang Geng
Research on Semantic Segmentation Algorithm Based on Lightweight DeepLabV3+ Network
Article

Research on Semantic Segmentation Algorithm Based on Lightweight DeepLabV3+ Network

Jiayu Chen, Zhongsheng Wang
MD-YOLOV12: Two-Stage Feature Injection for Robust Tool Wear Detection
Article

MD-YOLOV12: Two-Stage Feature Injection for Robust Tool Wear Detection

Jiaxin Cao, Yu Bai
Research on night vision pedestrian detection algorithm by incorporating attention mechanism
Article

Research on night vision pedestrian detection algorithm by incorporating attention mechanism

Jiaxue Yang, Pingping Liu
ML-GS: Module Lattice-Based Group Signature Scheme
Article

ML-GS: Module Lattice-Based Group Signature Scheme

Deng Pan, Yatao Yang, Weitao Sun, Shuaibo Wang, Ke Wang
A Novel Forward-Secure Key Establishment Protocol from Physically Related Functions
Article

A Novel Forward-Secure Key Establishment Protocol from Physically Related Functions

Lakshmi Kuppusamy, B R Shankar, Cheng-Chi Lee
Illusion of Presence: Physical Deception and Direct Manipulation in Social Engineering
Article

Illusion of Presence: Physical Deception and Direct Manipulation in Social Engineering

Jibran Rasheed Khan, Sumaira Mustafa Qureshi, Farhan Ahmed Siddiqui, Syed Asim Ali
Deterministic Quantum Key Distribution with Untrusted Relay and Finite Sources
Article

Deterministic Quantum Key Distribution with Untrusted Relay and Finite Sources

Guo-Dong Kang, Li-Jun Zhang, Xiao-Lu Wu, Qing-Ping Zhou, Mao-Fa Fang
Tight Analysis of Grover-Meets-Simon and Alg-PolyQ2 Attacks via Formalizing Quantum Rank-Solving under Deferred Measurement
Article

Tight Analysis of Grover-Meets-Simon and Alg-PolyQ2 Attacks via Formalizing Quantum Rank-Solving under Deferred Measurement

Qiqing Xia, Qianru Zhu, Huiqin Xie, Li Yang