책 이미지

책 정보
· 분류 : 외국도서 > 컴퓨터 > 정보통신기술(IT)
· ISBN : 9783031545276
· 쪽수 : 536쪽
· 출판일 : 2024-02-23
목차
Deep Learning and Application.-?Task Offloading in UAV-to-Cell MEC Networks: Cell?Clustering and Path Planning.LAMB: Label-induced Mixed-level Blending for?Multimodal Multi-label Emotion Detection.-?MSAM: Deep Semantic Interaction Network for Visual Question Answering.- Defeating the non-stationary opponent using deep reinforcement learning and opponent modeling.- Multi-agent Deep Reinforcement Learning-based Approach to Mobility-aware Caching.- D-AE: A Discriminant Encode-Decode Nets For Data Generation.- ECCRG: A Emotion- and Content-controllable Response Generation Model.- Origin-Destination Convolution Recurrent Network: A Novel OD Matrix Prediction Framework.- MD-TransUNet: TransUNet with Multi-Attention and Dilated Convolution for Brain Stroke Lesion Segmentation.-?Graph Computing.- DGFormer: An Effective Dynamic Graph Transformer based Anomaly Detection Model for IoT Time Series.- STAPointGNN: Spatial-Temporal Attention Graph Neural Network for Gesture Recognition Using Millimeter-Wave Radar.- NPGraph: An Efficient Graph Computing Model in NUMA-Based Persistent Memory Systems.- tHR-Net: A Hybrid Reasoning Framework for Temporal Knowledge Graph.- Improving Code Representation Learning via Multi-view Contrastive Graph Pooling for Abstract Syntax Tree.-?Security and Privacy Protection.- Protect applications and data in use in IoT environment using collaborative computing.- Robustness-enhanced assertion generation method based on code mutation and attack defense.-?Secure Traffic Data Sharing in UAV-Assisted VANETs.- A Lightweight PUF-Based Group Authentication Scheme for Privacy-Preserving Metering Data Collection in Smart Grid.- A Semi-Supervised Learning Method for Malware Traffic Classification with Raw Bitmaps.- Secure and Private Approximated Coded Distributed Computing Using Elliptic Curve Cryptography.- A Novel Semi-supervised IoT Time Series Anomaly Detection Model using Graph Structure Learning.- Structural Adversarial Attack for Code Representation Models.- An Efficient Authentication and Key Agreement Scheme for CAV Internal Applications.-?Processing and Recognition.- SimBPG: A comprehensive similarity evaluation metric for business process graphs.- Probabilistic Inference Based Incremental Graph Index for Similarity Search on Social Networks.- Cloud-Edge-Device Collaborative Image Retrieval and Recognition for Mobile Web.- Contrastive Learning-based Finger-Vein Recognition with Automatic Adversarial Augmentation.- Multi-Dimensional Sequential Contrastive Learning for QoS Prediction.