International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
Reduced CNN Model for Face Image Detection with GAN Oversampling GAN过采样人脸图像检测的简化CNN模型
Jiha Kim, Hyunhee Park
{"title":"Reduced CNN Model for Face Image Detection with GAN Oversampling","authors":"Jiha Kim, Hyunhee Park","doi":"10.1007/978-3-030-79728-7_23","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_23","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133615544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An APP-Based E-Learning Platform for Artificial Intelligence Cross-Domain Application Practices 基于app的人工智能跨领域应用实践电子学习平台
A. Liao
{"title":"An APP-Based E-Learning Platform for Artificial Intelligence Cross-Domain Application Practices","authors":"A. Liao","doi":"10.1007/978-3-030-79728-7_34","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_34","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132389875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C 软件盗版与逆向工程漏洞分析——基于C软件
Jaehyuk Lee, Kangbin Yim, Kyungroul Lee
{"title":"Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C","authors":"Jaehyuk Lee, Kangbin Yim, Kyungroul Lee","doi":"10.1007/978-3-030-79728-7_7","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_7","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114176675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation Results of a DQN Based AAV Testbed in Corner Environment: A Comparison Study for Normal DQN and TLS-DQN 角环境下基于DQN的AAV试验台仿真结果:普通DQN与TLS-DQN的比较研究
Nobuki Saito, Tetsuya Oda, Aoto Hirata, Kyohei Toyoshima, Masaharu Hirota, L. Barolli
{"title":"Simulation Results of a DQN Based AAV Testbed in Corner Environment: A Comparison Study for Normal DQN and TLS-DQN","authors":"Nobuki Saito, Tetsuya Oda, Aoto Hirata, Kyohei Toyoshima, Masaharu Hirota, L. Barolli","doi":"10.1007/978-3-030-79728-7_16","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_16","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124705348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of the Causal Relationship Among Diversification Strategies, Financial Performance and Market Values by the Three-Stage Least Squares (3SLS) 基于三阶段最小二乘法的多元化战略、财务绩效与市场价值因果关系分析
Ying-Li Lin, Kuei-Yuan Wang, Jia-Yu Chen
{"title":"Analysis of the Causal Relationship Among Diversification Strategies, Financial Performance and Market Values by the Three-Stage Least Squares (3SLS)","authors":"Ying-Li Lin, Kuei-Yuan Wang, Jia-Yu Chen","doi":"10.1007/978-3-030-79728-7_43","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_43","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116516623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Neighborhood-Connectivity of Locally Twisted Cube Networks 局部扭曲立方体网络的邻域连通性
Tzu-Liang Kung, Cheng-Kuan Lin, Chun-Nan Hung
{"title":"On the Neighborhood-Connectivity of Locally Twisted Cube Networks","authors":"Tzu-Liang Kung, Cheng-Kuan Lin, Chun-Nan Hung","doi":"10.1007/978-3-030-79728-7_31","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_31","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129418887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Scheme for Checking Similarity and Its Application in Outsourced Image Processing 一种相似度检测方案及其在外包图像处理中的应用
Yunxuan Su, Xu An Wang, Yunlong Ge
{"title":"A Scheme for Checking Similarity and Its Application in Outsourced Image Processing","authors":"Yunxuan Su, Xu An Wang, Yunlong Ge","doi":"10.1007/978-3-030-79728-7_52","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_52","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131673106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain 基于区块链的VANETs路况预警与车辆激励机制
Shuai Zhou, Tianhan Gao
{"title":"VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain","authors":"Shuai Zhou, Tianhan Gao","doi":"10.1007/978-3-030-79728-7_5","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_5","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"482 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122501775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain Based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Sensor Networks 基于区块链的无线传感器网络安全路由认证与信任评估机制
Saba Awan, Maimoona Bint E. Sajid, Sana Amjad, Usman Aziz, Muhammad Usman Gurmani, N. Javaid
{"title":"Blockchain Based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Sensor Networks","authors":"Saba Awan, Maimoona Bint E. Sajid, Sana Amjad, Usman Aziz, Muhammad Usman Gurmani, N. Javaid","doi":"10.1007/978-3-030-79728-7_11","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_11","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130057408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An ELF Recovery Method for Linux Malicious Process Detection 用于Linux恶意进程检测的ELF恢复方法
Zheng Wang, Bao Cui, Yang Zhang
{"title":"An ELF Recovery Method for Linux Malicious Process Detection","authors":"Zheng Wang, Bao Cui, Yang Zhang","doi":"10.1007/978-3-030-79728-7_28","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_28","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116771088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信