Open Access
ARTICLE
Hongyang Wang1,2, Yichen Shi3, Jun Feng1,2,*, Zitong Yu4, Zhuofu Tao5
1 School of Information Science and Technology, Shijiazhuang Tiedao University, Shijiazhuang, 050043, China
2 Shijiazhuang Key Laboratory of Artificial Intelligence, Shijiazhuang Tiedao University, Shijiazhuang, 050043, China
3 School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China
4 School of Computer Science and Technology, Great Bay University, Dongguan, 523808, China
5 School of Electrical and Computer Engineering, University of California, Los Angeles, CA 90095, USA
* Corresponding Author: Jun Feng. Email:
(This article belongs to the Special Issue: Multimedia Security in Deep Learning)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.061019
Received 14 November 2024; Accepted 11 February 2025; Published online 18 March 2025
View
Download
Like
Using Imbalanced Triangle Synthetic Data for Machine Learning Anomaly Detection
Menghua Luo, Ke Wang, Zhiping...A Scalable Method of Maintaining Order Statistics for Big Data Stream
Zhaohui Zhang, Jian Chen, Ligong...Key Process Protection of High Dimensional Process Data in Complex Production
He Shi, Wenli Shang, Chunyu Chen,...