Open Access
ARTICLE
Haotang Tan1, Song Sun2,*, Tian Cheng3, Xiyuan Shu2
1 Key Laboratory of GIS Application Research, School of Geography and Tourism, Chongqing Normal University, Chongqing, 401331, China
2 College of Computer and Information Science, Chongqing Normal University, Chongqing, 401331, China
3 Department of Military Installations, Army Logistics Academy, Chongqing, 401331, China
* Corresponding Author: Song Sun. Email:
(This article belongs to the Special Issue: The Latest Deep Learning Architectures for Artificial Intelligence Applications)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2024.052208
Received 26 March 2024; Accepted 22 May 2024; Published online 11 June 2024
View
Download
Like
Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices
En Zhang, Xintao Duan, Siuming...Network Security Situation Awareness Framework based on Threat Intelligence
Hongbin Zhang, Yuzi Yi, Junshe...A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
Yongli Tang, Huanhuan Lian, Zemao...Research on Trust Model in Container-Based Cloud Service
Xiaolan Xie, Tianwei Yuan, Xiao...