CORC

浏览/检索结果: 共58条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Feature Aggregation With Reinforcement Learning for Video-Based Person Re-Identification 期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2019, 卷号: 30, 期号: 12, 页码: 3847-3852
作者:  Zhang, Wei;  He, Xuanyu;  Lu, Weizhi;  Qiao, Hong;  Li, Yibin
收藏  |  浏览/下载:113/0  |  提交时间:2020/03/30
Unbalancing Pairing-Free Identity-Based Authenticated Key Exchange Protocols for Disaster Scenarios 期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2019, 卷号: 6, 页码: 878-890
作者:  Zhang, Jie;  Huang, Xin;  Wang, Wei;  Yue, Yong
收藏  |  浏览/下载:15/0  |  提交时间:2019/11/19
Learning deep features with adaptive triplet loss for person reidentification 其他
2017-01-01
作者:  Li, Zhiqiang;  Sang, Nong;  Chen, Kezhou;  Gao, Changxin;  Wang, Ruolin
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/05
An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices 期刊论文
WIRELESS PERSONAL COMMUNICATIONS, 2017, 卷号: 94, 期号: 4
作者:  Wu, Libing;  Alelaiw, Abdulhameed;  Xie, Yong;  Zhang, Yubo;  Shen, Jian
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network 期刊论文
WIRELESS PERSONAL COMMUNICATIONS, 2017, 卷号: 93, 期号: 2
作者:  Kumar, Neeraj;  Wu, Libing;  Shen, Jian;  Xie, Yong
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/05
Learning deep features with adaptive triplet loss for person reidentification 其他
2017-01-01
作者:  Li, Zhiqiang;  Sang, Nong;  Chen, Kezhou;  Gao, Changxin;  Wang, Ruolin
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure 会议论文
10th International Conference on Provable Security (ProvSec), Nanjing, PEOPLES R CHINA, 2016-11-10
作者:  Zhang, Jianhong;  Li, Pengyan;  Sun, Zhibin;  Mao, Jian
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30
IPad: ID-based public auditing for the outsourced data in the standard model 期刊论文
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 卷号: 19, 页码: 127-138
作者:  Zhang, Jianhong;  Li, Pengyan;  Mao, Jian
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/30
An Id-Based Server-Aided Designcryption Signcryption Scheme 会议论文
8th International Symposium on Computational Intelligence and Design (ISCID), Hangzhou, PEOPLES R CHINA, 2015-01-01
作者:  Lan, Caihui;  Li, Haifeng;  Wang, Caifen
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/09
标准模型下基于身份的入侵容忍签名 学位论文
2013, 2013
蔡建霞
收藏  |  浏览/下载:4/0  |  提交时间:2016/01/13


©版权所有 ©2017 CSpace - Powered by CSpace