As the Internet and informationtechnology advance, safeguarding user personal data is critical. Traditional registration and key storage methods pose security risks like data breaches and centralized vulnerabilities....
详细信息
The protection of personal data has grown to be a top priority around the world. The General Data Protection Regulation (GDPR) enables the data subjects (DS) to get back the control of their personal information, whic...
详细信息
Recent advancements in font generation models include GANs, diffusion models, and transformers. This study introduces a GAN-based model, zi2zi self-attention, which enhances the zi2zi model by incorporating Residual B...
详细信息
Spoofing interference casts significant threat to the GNSS receivers making the enhancement of spoofing detection capability a crucial issue. Detection performance of traditional SQM method encounters evident degradat...
详细信息
Graphs and hypergraphs are popular models for data structured representation. For example, traffic data, weather data, and animal skeleton data are all described by graph structures. Interval-valued fuzzy sets change ...
详细信息
Genetic diseases are conditions caused by a spontaneous alteration or mutation in an individual's DNA. People can inherit genetic disorders from parents, which means they are born with them, even if they are not i...
详细信息
This research study proposes an innovative methodology for the automated estimation of biological profiles through deep learning techniques, with a particular focus on the classification of age and gender derived from...
详细信息
To address issues of imprecise transmission fusion and unsmooth transitions in regions with varying depths of field, as well as color distortion in large white areas after dehazing, this paper proposes a dehazing meth...
详细信息
Multi-user Augmented Reality (MuAR) allows multiple users to interact with shared virtual objects, facilitated by exchanging environment information. Current MuAR systems rely on 3D point clouds for real-world analysi...
详细信息
This paper reviews the limitations of traditional Secret Image Sharing (SIS) methods and recent advancements such as PSIS, RPSIS, and SSIS, and presents an optimized and practical combinatorial method for secret image...
详细信息
暂无评论