|
|
|
Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez and Tanveer Ahmad
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve effi...
ver más
|
|
|
|
|
|
Yuanming Chen, Xiaobin Hong, Bin Cui and Rongfa Peng
With the increasingly maturing technology of unmanned surface vehicles (USVs), their applications are becoming more and more widespread. In order to meet operational requirements in complex scenarios, the real-time interaction and linkage of a large amou...
ver más
|
|
|
|
|
|
Hayat Ullah and Arslan Munir
The recognition of human activities using vision-based techniques has become a crucial research field in video analytics. Over the last decade, there have been numerous advancements in deep learning algorithms aimed at accurately detecting complex human ...
ver más
|
|
|
|
|
|
Guilherme Perin, Lichao Wu and Stjepan Picek
The adoption of deep neural networks for profiling side-channel attacks opened new perspectives for leakage detection. Recent publications showed that cryptographic implementations featuring different countermeasures could be broken without feature selec...
ver más
|
|
|
|
|
|
Xu Gao, Chenyi Liu, Hongkai Zhang, Kunlin Yang, Yingjie Hu and Xiaofei Guo
In underground coal mines, the stability of the retracement channel in the surrounding rock is crucial for the safe and efficient retracement of the equipment and to guarantee the continuity of the retracement work. To reveal the deformation and damage m...
ver más
|
|
|