|
|
|
Xingchen Wang and Peng Li
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private informat...
ver más
|
|
|
|
|
|
Adil Redaoui, Amina Belalia and Kamel Belloulata
Deep network-based hashing has gained significant popularity in recent years, particularly in the field of image retrieval. However, most existing methods only focus on extracting semantic information from the final layer, disregarding valuable structura...
ver más
|
|
|
|
|
|
Qiuyue Li, Hao Sheng, Mingxue Sheng and Honglin Wan
Efficient document recognition and sharing remain challenges in the healthcare, insurance, and finance sectors. One solution to this problem has been the use of deep learning techniques to automatically extract structured information from paper documents...
ver más
|
|
|
|
|
|
Jingbei Sun, Huimin Li, Wenming Lin and Yijun He
Spaceborne synthetic aperture radar (SAR) has been proven to be a useful technique for observing the sea surface wind and current over the open ocean given its all-weather data-gathering capability and high spatial resolution. In addition to the commonly...
ver más
|
|
|
|
|
|
Josue-Rafael Montes-Martínez, Hugo Jiménez-Hernández, Ana-Marcela Herrera-Navarro, Luis-Antonio Díaz-Jiménez, Jorge-Luis Perez-Ramos and Julio-César Solano-Vargas
Artificial vision system applications have generated significant interest as they allow information to be obtained through one or several of the cameras that can be found in daily life in many places, such as parks, avenues, squares, houses, etc. When th...
ver más
|
|
|