Open Access
ARTICLE
Youhe Wang, Yi Sun*, Yujie Li, Chuanqi Zhou
Henan Province Key Laboratory of Information Security, Information Engineering University, Zhengzhou, 450000, China
* Corresponding Author: Yi Sun. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2024.057710
Received 26 August 2024; Accepted 30 October 2024; Published online 21 November 2024
View
Download
Like
Securing Display Path for Security-Sensitive Applications on Mobile Devices
Jinhua Cui, Yuanyuan Zhang, Zhiping...A First-Principles Computational Framework for Liquid Mineral Systems
B.B. Karki, D. Bhattarai, L. StixrudeFault Diagnosis of Motor in Frequency Domain Signal by Stacked De-noising Auto-encoder
Xiaoping Zhao, Jiaxin Wu, Yonghong...Improve Computer Visualization of Architecture Based on the Bayesian Network
Tao Shen, Yukari Nagai, Chan GaoFeedback LSTM Network Based on Attention for Image Description Generator
Zhaowei Qu, Bingyu Cao, Xiaoru...