计算机科学最新文献

筛选
英文 中文
Multi-atlas functional and effective connectivity attention fusion method for autism spectrum disorder diagnosis 多图谱功能有效的连接注意融合方法在自闭症谱系障碍诊断中的应用
IF 8 2区 计算机科学
Engineering Applications of Artificial Intelligence Pub Date : 2025-08-16 DOI: 10.1016/j.engappai.2025.111877
Minqi Yu, Jinduo Liu, Junzhong Ji
{"title":"Multi-atlas functional and effective connectivity attention fusion method for autism spectrum disorder diagnosis","authors":"Minqi Yu,&nbsp;Jinduo Liu,&nbsp;Junzhong Ji","doi":"10.1016/j.engappai.2025.111877","DOIUrl":"10.1016/j.engappai.2025.111877","url":null,"abstract":"<div><div>The brain connectivity patterns, such as functional connectivity (FC) and effective connectivity (EC), describe the complex interaction patterns in brain networks. By combining FC and EC information, essential biomarkers for characterizing brain abnormalities can be further extracted. However, existing FC–EC fusion methods often process FC and EC networks independently, neglecting the intrinsic interrelationships between them. In addition, current FC–EC fusion methods rely on single segmentation atlas data, whereas multi-atlas data provides a more comprehensive display of brain information. To address these issues, we propose a novel multi-atlas dual branch graph convolution functional effective connectivity attention fusion (MaFECAF) method. It comprises three modules: multi-atlas data fusion, functional and effective connectivity construction, and functional and effective connectivity attention fusion. First, two atlases are fused using the cosine similarity matrix as weights. Next, we use the fused data to construct the FC and EC networks via spatio-temporal graph convolutional network and variational autoencoder parameterized by graph neural network architecture, respectively. Subsequently, the FC and EC networks are merged via a dynamic graph convolutional network and an adaptive self-attention feature extraction unit, followed by the application of the obtained features to autism spectrum disorder (ASD) classification. The experimental results have demonstrated the effectiveness of the proposed method and the benefits of integrating FC and EC. The proposed method achieved a 74.7% classification accuracy for ASD and outperformed state-of-the-art methods.</div></div>","PeriodicalId":50523,"journal":{"name":"Engineering Applications of Artificial Intelligence","volume":"160 ","pages":"Article 111877"},"PeriodicalIF":8.0,"publicationDate":"2025-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144852768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Event-triggered control for uncertain singular switched positive systems with actuator saturation under persistent dwell-time constraint 持续驻留时间约束下具有执行器饱和的不确定奇异开关正系统的事件触发控制
IF 2.5 3区 计算机科学
Systems & Control Letters Pub Date : 2025-08-16 DOI: 10.1016/j.sysconle.2025.106215
Ang Gao, Jinling Wang, Cheng-Tang Zhang, Yangang Yao, Qiang Li
{"title":"Event-triggered control for uncertain singular switched positive systems with actuator saturation under persistent dwell-time constraint","authors":"Ang Gao,&nbsp;Jinling Wang,&nbsp;Cheng-Tang Zhang,&nbsp;Yangang Yao,&nbsp;Qiang Li","doi":"10.1016/j.sysconle.2025.106215","DOIUrl":"10.1016/j.sysconle.2025.106215","url":null,"abstract":"<div><div>This paper explores the event-triggered (E-T) control problem for a class of singular switched positive systems with actuator saturation and parameter uncertainties, subject to persistent dwell-time (PDT) constraints. Generally, the introduction of an E-T mechanism can enhance resource utilization and prevent data congestion. Subsequently, both state feedback control strategies and observer-based control schemes are applied. Sufficient conditions, derived through linear programming (LP), are presented to ensure the positivity, causality, regularity, and exponential stability of the corresponding closed-loop systems. Furthermore, the controller gain matrices and the auxiliary gain matrices are constructed by employing matrix decomposition techniques. Finally, the effectiveness of the theoretical results is validated through an illustrative example.</div></div>","PeriodicalId":49450,"journal":{"name":"Systems & Control Letters","volume":"204 ","pages":"Article 106215"},"PeriodicalIF":2.5,"publicationDate":"2025-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144851780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Preserving Genetic Matching Diagnosis on Lightweight Devices 轻量级设备上保护隐私的遗传匹配诊断
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-08-16 DOI: 10.1002/cpe.70235
Xianning Tang, Jichao Xiong, Jiageng Chen, Hui Liu, Heng Xu
{"title":"Privacy-Preserving Genetic Matching Diagnosis on Lightweight Devices","authors":"Xianning Tang,&nbsp;Jichao Xiong,&nbsp;Jiageng Chen,&nbsp;Hui Liu,&nbsp;Heng Xu","doi":"10.1002/cpe.70235","DOIUrl":"https://doi.org/10.1002/cpe.70235","url":null,"abstract":"<div>\u0000 \u0000 <p>Next-generation sequencing (NGS) technology has revolutionized human genome research, significantly advancing the field of genetics. NGS provides unmatched abilities to analyze DNA and RNA molecules efficiently and cost-effectively, transforming genomics research. This technology detects specific alleles within tissues, allowing for accurate diagnoses of genetic mutation-related diseases. However, the sensitivity of genetic information necessitates careful protection across different usage scenarios. In this paper, we introduce an efficient protocol for privacy-preserving genetic matching based on the Private Set Intersection (PSI) technique. Our protocol allows genetic diagnoses without disclosing individual genetic data, offering greater security than previous methods that required external server storage or processing of genetic data. By keeping the data on the individuals local device, we reduce the risks associated with cloud storage. The protocol uses a collision-resistant cuckoo hash table and symmetric encryption methods, ensuring data accuracy and error-free genetic matching diagnoses. Moreover, our protocol is lightweight, utilizing minimal encryption components to maintain security while minimizing computational complexity and client-side load. Experimental results demonstrate that our protocol enhances performance by approximately 31.135% compared to similar protocols on average. These attributes make our PSI-based protocol a robust solution for privacy-preserving genetic matching, safeguarding sensitive genetic information while meeting the efficiency needs of practical applications.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 21-22","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144853824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The manufacturer’s optimal mode implementation strategies for third-party resale platform operations: trade-in vs. trade-in and refurbishment 制造商针对第三方转售平台运营的最佳模式实施策略:以旧换新vs以旧换新
IF 7.5 1区 计算机科学
Expert Systems with Applications Pub Date : 2025-08-15 DOI: 10.1016/j.eswa.2025.129228
Xiaobing Jin , Bohai Liu , Xian Liu , Tao Zhou , Handong Zheng , Kai Li
{"title":"The manufacturer’s optimal mode implementation strategies for third-party resale platform operations: trade-in vs. trade-in and refurbishment","authors":"Xiaobing Jin ,&nbsp;Bohai Liu ,&nbsp;Xian Liu ,&nbsp;Tao Zhou ,&nbsp;Handong Zheng ,&nbsp;Kai Li","doi":"10.1016/j.eswa.2025.129228","DOIUrl":"10.1016/j.eswa.2025.129228","url":null,"abstract":"<div><div>In response to the circular economy and sustainable development, there are many manufacturers implementing trade-in and refurbishment strategies. By constructing a two-period game model involving the manufacturer and strategic consumers, we explore two trade-in strategies: trade-in vs. trade-in and refurbishment. Meanwhile, third-party resale platforms have emerged as significant sales channels for second-hand products. Consequently, along this line, we further consider whether the resale platform exists, developing four game models, i.e., Scenario NT (no resale platform exists and the manufacturer implements trade-in strategies), Scenario NTR (no resale platform exists and the manufacturer implements trade-in and refurbishment strategies), Scenario PT (a resale platform exists and the manufacturer implements trade-in strategies) and Scenario PTR (a resale platform exists and the manufacturer implements trade-in and refurbishment strategies). We examine how the manufacturer determines optimal trade-in strategies for third-party resale platform operations in four different scenarios, deriving several insights: Firstly, higher depreciation rates incentivize the manufacturer to implement trade-in strategies. However, the higher upgrade level instead puts the manufacturer in a profit dilemma when implementing either strategy. Secondly, the platform can effectively mitigate the direct shock of the depreciation rate on old products’ prices and decrease the manufacturer’s reliance on recycling channels. Ultimately, we discover that the existence of the platform is not always favorable for the manufacturer to implement trade-in strategies. The effectiveness of the platform can be fully captured only when the depreciation rate is either relatively low or high.</div></div>","PeriodicalId":50461,"journal":{"name":"Expert Systems with Applications","volume":"297 ","pages":"Article 129228"},"PeriodicalIF":7.5,"publicationDate":"2025-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144841034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collision-free path planning method for digital orthodontic treatment 指指正畸治疗的无碰撞路径规划方法
IF 2.2 4区 计算机科学
Graphical Models Pub Date : 2025-08-15 DOI: 10.1016/j.gmod.2025.101297
Hao Yu , Longdu Liu , Shuangmin Chen , Lin Lu , Yuanfeng Zhou , Shiqing Xin , Changhe Tu
{"title":"Collision-free path planning method for digital orthodontic treatment","authors":"Hao Yu ,&nbsp;Longdu Liu ,&nbsp;Shuangmin Chen ,&nbsp;Lin Lu ,&nbsp;Yuanfeng Zhou ,&nbsp;Shiqing Xin ,&nbsp;Changhe Tu","doi":"10.1016/j.gmod.2025.101297","DOIUrl":"10.1016/j.gmod.2025.101297","url":null,"abstract":"<div><div>The rapid evolution of digital orthodontics has highlighted a critical need for automated treatment planning systems that balance computational efficiency with clinical reliability. However, existing methods still suffer from several limitations, including excessive clinician involvement (accounting for over 35% of treatment planning time), reliance on empirically defined key frames, and limited biomechanical plausibility, particularly in cases of severe dental crowding. This paper proposes a novel collision-free optimization framework to address these issues simultaneously. Our method defines a total movement energy function evaluated over each tooth’s pose at intermediate time frames. This energy is minimized iteratively using a steepest descent strategy. A rollback mechanism is employed: if inter-tooth penetration is detected during an update, the step size is halved repeatedly until collisions are eliminated. The framework allows flexible control over the number of intermediate frames to enforce a strict constraint on per-tooth displacement, limiting it to 0.2 mm translation or <span><math><mrow><mn>2</mn><mo>°</mo></mrow></math></span> rotation every 10 to 14 days. Clinical evaluations show that the proposed algorithm can generate desirable and clinically valid tooth movement plans, even in complex cases, while significantly reducing the need for manual intervention.</div></div>","PeriodicalId":55083,"journal":{"name":"Graphical Models","volume":"141 ","pages":"Article 101297"},"PeriodicalIF":2.2,"publicationDate":"2025-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144842157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Informed protein–ligand docking via geodesic guidance in translational, rotational and torsional spaces 通过在平移,旋转和扭转空间的测地线引导,了解蛋白质配体对接
IF 23.8 1区 计算机科学
Nature Machine Intelligence Pub Date : 2025-08-15 DOI: 10.1038/s42256-025-01091-x
Raúl Miñán, Javier Gallardo, Álvaro Ciudad, Alexis Molina
{"title":"Informed protein–ligand docking via geodesic guidance in translational, rotational and torsional spaces","authors":"Raúl Miñán, Javier Gallardo, Álvaro Ciudad, Alexis Molina","doi":"10.1038/s42256-025-01091-x","DOIUrl":"https://doi.org/10.1038/s42256-025-01091-x","url":null,"abstract":"<p>Molecular docking plays a crucial role in structure-based drug discovery, enabling the prediction of how small molecules interact with protein targets. Traditional docking methods rely on scoring functions and search heuristics, whereas recent generative approaches, such as DiffDock, leverage deep learning for pose prediction. However, blind-diffusion-based docking often struggles with binding site localization and pose accuracy, particularly in complex protein–ligand systems. This work introduces GeoDirDock (GDD), a guided diffusion approach to molecular docking that enhances the accuracy and physical plausibility of ligand docking predictions. GDD guides the denoising process of a diffusion model along geodesic paths within multiple spaces representing translational, rotational and torsional degrees of freedom. Our method leverages expert knowledge to direct the generative modelling process, specifically targeting desired protein–ligand interaction regions. We demonstrate that GDD outperforms existing blind docking methods in terms of root mean squared distance accuracy and physicochemical pose realism. Our results indicate that incorporating domain expertise into the diffusion process leads to more biologically relevant docking predictions. Additionally, we explore the potential of GDD as a template-based modelling tool for lead optimization in drug discovery through angle transfer in maximum common substructure docking, showcasing its capability to accurately predict ligand orientations for chemically similar compounds. Future applications in real-world drug discovery campaigns will naturally continue to refine and extend the utility of prior-informed diffusion docking methods.</p>","PeriodicalId":48533,"journal":{"name":"Nature Machine Intelligence","volume":"8 1","pages":""},"PeriodicalIF":23.8,"publicationDate":"2025-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144851536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient NTT/INTT processor for FALCON post-quantum cryptography 猎鹰后量子密码的高效NTT/INTT处理器
IF 3.7 2区 计算机科学
Journal of Information Security and Applications Pub Date : 2025-08-15 DOI: 10.1016/j.jisa.2025.104177
Ghada Alsuhli , Hani Saleh , Mahmoud Al-Qutayri , Baker Mohammad , Thanos Stouraitis
{"title":"Efficient NTT/INTT processor for FALCON post-quantum cryptography","authors":"Ghada Alsuhli ,&nbsp;Hani Saleh ,&nbsp;Mahmoud Al-Qutayri ,&nbsp;Baker Mohammad ,&nbsp;Thanos Stouraitis","doi":"10.1016/j.jisa.2025.104177","DOIUrl":"10.1016/j.jisa.2025.104177","url":null,"abstract":"<div><div>FALCON is a lattice-based post-quantum cryptographic (PQC) digital signature standard known for its compact signatures and resistance to quantum attacks. Since its recent standardization, its hardware implementation remains an open challenge, particularly for key generation, which is significantly more complex than the simple and well-studied signature verification process. In this paper, targeting edge devices with constrained resources, we present an energy-efficient and area-optimized NTT/INTT architecture tailored to the specific requirements of FALCON key generation. By leveraging NTT-friendly primes and reducing the size of the multipliers in the Montgomery reduction algorithm — optimized for ASIC implementation — our design minimizes hardware complexity, achieving the lowest power and area consumption compared to state-of-the-art Montgomery reduction implementations. The proposed hardware architecture features a processing element array, distributed SRAMs, and ROMs, with three levels of reconfigurability, supporting both NTT and INTT operations. Designed using the Global Foundries’ 22 nm FD-SOI process, an Application-Specific Integrated Circuit (ASIC) is estimated to occupy 0.04 mm<span><math><msup><mrow></mrow><mrow><mn>2</mn></mrow></msup></math></span> and consume 18.2 mW at 1 GHz. The proposed processor achieves 700 times greater energy efficiency and performs computations 200 times faster than software implementations on the ARM Cortex-M4. It also achieves the lowest area–time product and highest energy efficiency among state-of-the-art NTT/INTT hardware accelerators. By carefully balancing power consumption and computational speed, this design offers an efficient solution for deploying FALCON key generation on devices with limited resources.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"93 ","pages":"Article 104177"},"PeriodicalIF":3.7,"publicationDate":"2025-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144841758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning radiomics of elastography for diagnosing compensated advanced chronic liver disease: an international multicenter study. 弹性成像的深度学习放射组学诊断代偿晚期慢性肝病:一项国际多中心研究。
IF 6 4区 计算机科学
Visual Computing for Industry Biomedicine and Art Pub Date : 2025-08-15 DOI: 10.1186/s42492-025-00199-6
Xue Lu, Haoyan Zhang, Hidekatsu Kuroda, Matteo Garcovich, Victor de Ledinghen, Ivica Grgurević, Runze Linghu, Hong Ding, Jiandong Chang, Min Wu, Cheng Feng, Xinping Ren, Changzhu Liu, Tao Song, Fankun Meng, Yao Zhang, Ye Fang, Sumei Ma, Jinfen Wang, Xiaolong Qi, Jie Tian, Xin Yang, Jie Ren, Ping Liang, Kun Wang
{"title":"Deep learning radiomics of elastography for diagnosing compensated advanced chronic liver disease: an international multicenter study.","authors":"Xue Lu, Haoyan Zhang, Hidekatsu Kuroda, Matteo Garcovich, Victor de Ledinghen, Ivica Grgurević, Runze Linghu, Hong Ding, Jiandong Chang, Min Wu, Cheng Feng, Xinping Ren, Changzhu Liu, Tao Song, Fankun Meng, Yao Zhang, Ye Fang, Sumei Ma, Jinfen Wang, Xiaolong Qi, Jie Tian, Xin Yang, Jie Ren, Ping Liang, Kun Wang","doi":"10.1186/s42492-025-00199-6","DOIUrl":"https://doi.org/10.1186/s42492-025-00199-6","url":null,"abstract":"<p><p>Accurate, noninvasive diagnosis of compensated advanced chronic liver disease (cACLD) is essential for effective clinical management but remains challenging. This study aimed to develop a deep learning-based radiomics model using international multicenter data and to evaluate its performance by comparing it to the two-dimensional shear wave elastography (2D-SWE) cut-off method covering multiple countries or regions, etiologies, and ultrasound device manufacturers. This retrospective study included 1937 adult patients with chronic liver disease due to hepatitis B, hepatitis C, or metabolic dysfunction-associated steatotic liver disease. All patients underwent 2D-SWE imaging and liver biopsy at 17 centers across China, Japan, and Europe using devices from three manufacturers (SuperSonic Imagine, General Electric, and Mindray). The proposed generalized deep learning radiomics of elastography model integrated both elastographic images and liver stiffness measurements and was trained and tested on stratified internal and external datasets. A total of 1937 patients with 9472 2D-SWE images were included in the statistical analysis. Compared to 2D-SWE, the model achieved a higher area under the receiver operating characteristic curve (AUC) (0.89 vs 0.83, P = 0.025). It also achieved a highly consistent diagnosis across all subanalyses (P values: 0.21-0.91), whereas 2D-SWE exhibited different AUCs in the country or region (P < 0.001) and etiology (P = 0.005) subanalyses but not in the manufacturer subanalysis (P = 0.24). The model demonstrated more accurate and robust performance in noninvasive cACLD diagnosis than 2D-SWE across different countries or regions, etiologies, and manufacturers.</p>","PeriodicalId":29931,"journal":{"name":"Visual Computing for Industry Biomedicine and Art","volume":"8 1","pages":"19"},"PeriodicalIF":6.0,"publicationDate":"2025-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144856587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Communications Publication Information IEEE通讯出版信息汇刊
IF 8.3 2区 计算机科学
IEEE Transactions on Communications Pub Date : 2025-08-15 DOI: 10.1109/TCOMM.2025.3594968
{"title":"IEEE Transactions on Communications Publication Information","authors":"","doi":"10.1109/TCOMM.2025.3594968","DOIUrl":"https://doi.org/10.1109/TCOMM.2025.3594968","url":null,"abstract":"","PeriodicalId":13041,"journal":{"name":"IEEE Transactions on Communications","volume":"73 8","pages":"C2-C2"},"PeriodicalIF":8.3,"publicationDate":"2025-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11126912","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144858566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrections to “A Comprehensive Review of Unimodal and Multimodal Fingerprint Biometric Authentication Systems: Fusion, Attacks, and Template Protection” 对“单模态和多模态指纹生物识别认证系统的综合综述:融合、攻击和模板保护”的更正
IF 3.6 3区 计算机科学
IEEE Access Pub Date : 2025-08-15 DOI: 10.1109/ACCESS.2025.3595616
U. Sumalatha;K. Krishna Prakasha;Srikanth Prabhu;Vinod C. Nayak
{"title":"Corrections to “A Comprehensive Review of Unimodal and Multimodal Fingerprint Biometric Authentication Systems: Fusion, Attacks, and Template Protection”","authors":"U. Sumalatha;K. Krishna Prakasha;Srikanth Prabhu;Vinod C. Nayak","doi":"10.1109/ACCESS.2025.3595616","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3595616","url":null,"abstract":"Presents corrections to the paper, (Corrections to “A Comprehensive Review of Unimodal and Multimodal Fingerprint Biometric Authentication Systems: Fusion, Attacks, and Template Protection”).","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"136995-136995"},"PeriodicalIF":3.6,"publicationDate":"2025-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11126906","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144853113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信