Open Access
ARTICLE
Xiaoying Qiu1,*, Xiaoyu Ma1, Guangxu Zhao1, Jinwei Yu2, Wenbao Jiang1, Zhaozhong Guo1, Maozhi Xu3
1 College of Computer Science, Beijing Information Science and Technology University, Beijing, 100192, China
2 School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, 100876, China
3 School of Mathematical Sciences, Peking University, Beijing, 100871, China
* Corresponding Author: Xiaoying Qiu. Email:
(This article belongs to the Special Issue: Applications of Artificial Intelligence for Information Security)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.061869
Received 05 December 2024; Accepted 10 February 2025; Published online 07 March 2025
View
Download
Like
Investigation of the Embedded Element Technique for ModellingWavy CNT Composites
Anna Y. Matveeva, Helmut J. Böhm,...An O(N) Fast Multipole Hybrid Boundary Node Method for 3D Elasticity
Q. Wang, Y. Miao, H.P. Zhu, C....A lattice Boltzmann-Based Study of Plasma Sprayed Particles Behaviours
R. Djebali, B. Pateyron, M. ElGanaoui