ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Communications in Computer and Information Science - Artificial Intelligence and Security
Latest Publications
TOTAL DOCUMENTS
66
(FIVE YEARS 66)
H-INDEX
1
(FIVE YEARS 1)
Published By Springer Singapore
9789811580857, 9789811580864
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Medical Image Digital Watermarking Algorithm Based on DWT-DFRFT
Communications in Computer and Information Science - Artificial Intelligence and Security
◽
10.1007/978-981-15-8086-4_60
◽
2020
◽
pp. 637-649
Author(s):
Yanlin Liu
◽
Jingbing Li
◽
Jing Liu
◽
Yanwei Chen
◽
Hui Li
◽
...
Keyword(s):
Digital Watermarking
◽
Medical Image
Start Chat
Download Full-text
Defense Against Adversarial Attack Using PCA
Communications in Computer and Information Science - Artificial Intelligence and Security
◽
10.1007/978-981-15-8086-4_59
◽
2020
◽
pp. 627-636
Author(s):
Jie Yang
◽
Man Wu
◽
Xiao-Zhang Liu
Keyword(s):
Adversarial Attack
Start Chat
Download Full-text
An Image Steganalysis Model Combined with the Directionality of Residuals
Communications in Computer and Information Science - Artificial Intelligence and Security
◽
10.1007/978-981-15-8086-4_52
◽
2020
◽
pp. 546-556
Author(s):
Zhujun Jin
◽
Hao Li
◽
Yu Yang
◽
Jialin Lin
Keyword(s):
Image Steganalysis
Start Chat
Download Full-text
Hybrid Low Rank Model Based Deep Neural Network Compression with Application in Data Recovery
Communications in Computer and Information Science - Artificial Intelligence and Security
◽
10.1007/978-981-15-8086-4_4
◽
2020
◽
pp. 38-50
Author(s):
Chuanxiang Xu
◽
Weize Sun
◽
Lei Huang
◽
Jingxin xu
◽
Min Huang
Keyword(s):
Neural Network
◽
Deep Neural Network
◽
Data Recovery
◽
Low Rank
◽
Model Based
◽
Network Compression
Start Chat
Download Full-text
Location Privacy Protection Algorithm Based on the Division Method of Voronoi in the Internet of Vehicles
Communications in Computer and Information Science - Artificial Intelligence and Security
◽
10.1007/978-981-15-8086-4_39
◽
2020
◽
pp. 412-422
Author(s):
Peng-shou Xie
◽
Xue-ming Han
◽
Tao Feng
◽
Yan Yan
◽
Guo-qiang Ma
Keyword(s):
Privacy Protection
◽
Location Privacy
◽
The Internet
◽
Internet Of Vehicles
◽
Location Privacy Protection
Start Chat
Download Full-text
Vehicular Trajectory Big Data: Driving Behavior Recognition Algorithm Based on Deep Learning
Communications in Computer and Information Science - Artificial Intelligence and Security
◽
10.1007/978-981-15-8086-4_30
◽
2020
◽
pp. 324-336
Author(s):
Xiaorun Yang
◽
Fei Ding
◽
Dengyin Zhang
◽
Min Zhang
Keyword(s):
Big Data
◽
Deep Learning
◽
Driving Behavior
◽
Recognition Algorithm
◽
Behavior Recognition
Start Chat
Download Full-text
Contrast Adjustment Forensics Based on Second-Order Statistical and Deep Learning Features
Communications in Computer and Information Science - Artificial Intelligence and Security
◽
10.1007/978-981-15-8086-4_3
◽
2020
◽
pp. 27-37
Author(s):
Xinyi Wang
◽
Shaozhang Niu
◽
He Wang
Keyword(s):
Deep Learning
◽
Second Order
◽
Deep Learning Features
Start Chat
Download Full-text
Precipitation Phase Inversion Algorithm for Extremely Unbalanced Data
Communications in Computer and Information Science - Artificial Intelligence and Security
◽
10.1007/978-981-15-8086-4_29
◽
2020
◽
pp. 312-323
Author(s):
Shengchun Wang
◽
Chengcheng Jiang
◽
Jingui Huang
◽
Jinyu Xu
◽
Hong Deng
◽
...
Keyword(s):
Phase Inversion
◽
Unbalanced Data
◽
Inversion Algorithm
◽
Precipitation Phase
Start Chat
Download Full-text
Two-Dimensional Seismic Data Reconstruction Method Based on Compressed Sensing
Communications in Computer and Information Science - Artificial Intelligence and Security
◽
10.1007/978-981-15-8086-4_25
◽
2020
◽
pp. 265-277
Author(s):
Caifeng Cheng
◽
Xiang’e Sun
◽
Deshu Lin
Keyword(s):
Compressed Sensing
◽
Seismic Data
◽
Data Reconstruction
◽
Reconstruction Method
◽
Two Dimensional
◽
Seismic Data Reconstruction
Start Chat
Download Full-text
Propagator Method Based on Virtual Array Manifold Matching Algorithm for 2D DOA Estimation
Communications in Computer and Information Science - Artificial Intelligence and Security
◽
10.1007/978-981-15-8086-4_24
◽
2020
◽
pp. 255-264
Author(s):
Sheng Liu
◽
Jing Zhao
◽
Weizhi Xiong
◽
Xiangjun Dai
Keyword(s):
Doa Estimation
◽
Matching Algorithm
◽
Propagator Method
◽
Virtual Array
◽
2D Doa Estimation
Start Chat
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close