Search

Your search keyword '"Nenghai Yu"' showing total 1,318 results

Search Constraints

Start Over You searched for: Author "Nenghai Yu" Remove constraint Author: "Nenghai Yu"
1,318 results on '"Nenghai Yu"'

Search Results

1. Dual-verification-based model fingerprints against ambiguity attacks

2. TamGen: drug design with target-aware molecule generation through a chemical language model

3. Purification scheduling control for throughput maximization in quantum networks

4. Adaptable privacy protection scheme in JPEG images

5. Block level cloud data deduplication scheme based on attribute encryption

6. Lightweight and secure vehicle track verification scheme via broadcast communication channels

7. Privacy leakage risk assessment for reversible neural network

8. Privacy-preserving data compression scheme for k-anonymity model based on Huffman coding

9. Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm

10. Deepfake detection method based on patch-wise lighting inconsistency

11. Deep 3D mesh watermarking with self-adaptive robustness

12. Lip forgery detection via spatial-frequency domain combination

13. Detecting conflict of heterogeneous access control policies

14. Carrier-independent deep optical watermarking algorithm

15. Imperceptible black-box waveform-level adversarial attack towards automatic speaker recognition

16. Computationally secure steganography based on speech synthesis

17. ControlFace: Feature Disentangling for Controllable Face Swapping

18. Reversible data hiding in encrypted images based on fine-grained embedding room reservation

19. A Connection-Oriented Entanglement Distribution Design in Quantum Networks

20. Survey on image non-additive steganography

21. Binary image steganography method based on layered embedding

22. Improved fast leakage assessment based on online counting

23. Rapid responsive and efficient multi-valued Byzantine consensus scheme

24. Compression of bitcoin blockchain

25. Improvement of the blockchain protocol based on memory-hard function

26. Image privacy preservation scheme based on QR code and reversible visible watermarking

27. Quantum information course for the undergraduate students of cyber security

28. A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data

29. Real-Time Online Multi-Object Tracking in Compressed Domain

30. Learning Pixel-Level and Instance-Level Context-Aware Features for Pedestrian Detection in Crowds

31. Scale Voting With Pyramidal Feature Fusion Network for Person Search

32. JamSys: Coverage Optimization of a Microphone Jamming System Based on Ultrasounds

33. A Class of In-Place Linear Transformations Possessing the Cache-Oblivious Property

34. Network function outsourcing system based on prefix-preserving encryption

35. Face Swapping Consistency Transfer with Neural Identity Carrier

Catalog

Books, media, physical & digital resources