CORC

浏览/检索结果: 共16条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Deep Learning for Face Anti-Spoofing: A Survey 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 5, 页码: 5609-5631
作者:  Yu, Zitong;  Qin, Yunxiao;  Li, Xiaobai;  Zhao, Chenxu;  Lei, Zhen
收藏  |  浏览/下载:4/0  |  提交时间:2023/11/16
Unified unsupervised and semi-supervised domain adaptation network for cross-scenario face anti-spoofing 期刊论文
PATTERN RECOGNITION, 2021, 卷号: 115, 页码: 13
作者:  Jia, Yunpei;  Zhang, Jie;  Shan, Shiguang;  Chen, Xilin
收藏  |  浏览/下载:33/0  |  提交时间:2021/12/01
Unsupervised Adversarial Domain Adaptation for Cross-Domain Face Presentation Attack Detection 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 卷号: 16, 页码: 56-69
作者:  Wang, Guoqing;  Han, Hu;  Shan, Shiguang;  Chen, Xilin
收藏  |  浏览/下载:45/0  |  提交时间:2020/12/10
Hierarchical 2-D Feature Coding for Secure Pilot Authentication in Multi-User Multi-Antenna OFDM Systems: A Reliability Bound Contraction Perspective 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 卷号: 14, 页码: 592-607
作者:  Xu, Dongyang;  Ren, Pinyi;  Ritcey, James A.
收藏  |  浏览/下载:37/0  |  提交时间:2019/11/19
Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 卷号: 14, 页码: 387-402
作者:  Xu, Dongyang;  Ren, Pinyi;  Ritcey, James A.
收藏  |  浏览/下载:20/0  |  提交时间:2019/11/19
E-business information fuzzy retrieval system based on block chain anti-attack algorithm 期刊论文
2018, 页码: 1-12
作者:  Gao, Fei;  Basu, M.A.
收藏  |  浏览/下载:4/0  |  提交时间:2019/04/15
E-business information fuzzy retrieval system based on block chain anti-attack algorithm. 期刊论文
2018, 卷号: Vol.35 No.4, 页码: 4475-4486
作者:  Gao, Fei;  Basu, M.A.;  Fernández-Martínez, Manuel;  Guirao, Juan L.G.
收藏  |  浏览/下载:7/0  |  提交时间:2019/04/15
An Image Steganography Algorithm Based on Quantization Index Modulation Resisting Scaling Attacks and Statistical Detection 期刊论文
CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 卷号: 56, 期号: 1
作者:  Zhang, Yue;  Ye, Dengpan;  Gan, Junjun;  Li, Zhenyu;  Cheng, Qingfeng
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
A Whole-Process WiFi Security Perception Software System 期刊论文
2017 INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEM AND SIMULATION (ICCSS 2017), 2017, 页码: 151-156
作者:  Ao, Shiliang;  Huang, Heqing;  Ja, Yan;  Hu, Yanjun
收藏  |  浏览/下载:13/0  |  提交时间:2019/04/24
A Guidance Law with Impact Angle Constraint for Anti-ship Missiles Cooperative Attack 会议论文
2014 33RD CHINESE CONTROL CONFERENCE (CCC), 2014-01-01
作者:  Wu Xiaolong;  Wu Sentang;  Xing Zhihui
收藏  |  浏览/下载:3/0  |  提交时间:2020/01/06


©版权所有 ©2017 CSpace - Powered by CSpace