Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 450
1.
  • Survey on blockchain for In... Survey on blockchain for Internet of Things
    Wang, Xu; Zha, Xuan; Ni, Wei ... Computer communications, February 2019, 2019-02-00, Volume: 136
    Journal Article
    Peer reviewed

    The Internet of Things (IoT) is poised to transform human life and unleash enormous economic benefit. However, inadequate data security and trust of current IoT are seriously limiting its adoption. ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
2.
  • Captioning Transformer with... Captioning Transformer with Stacked Attention Modules
    Zhu, Xinxin; Li, Lixiang; Liu, Jing ... Applied sciences, 05/2018, Volume: 8, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    Image captioning is a challenging task. Meanwhile, it is important for the machine to understand the meaning of an image better. In recent years, the image captioning usually use the ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
3.
  • Building an Effective Intru... Building an Effective Intrusion Detection System Using the Modified Density Peak Clustering Algorithm and Deep Belief Networks
    Yang, Yanqing; Zheng, Kangfeng; Wu, Chunhua ... Applied sciences, 01/2019, Volume: 9, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Machine learning plays an important role in building intrusion detection systems. However, with the increase of data capacity and data dimension, the ability of shallow machine learning is becoming ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
4.
  • A genre trust model for def... A genre trust model for defending shilling attacks in recommender systems
    Yang, Li; Niu, Xinxin Complex & intelligent systems, 06/2023, Volume: 9, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Shilling attacks have been a significant vulnerability of collaborative filtering (CF) recommender systems, and trust in CF recommender algorithms has been proven to be helpful for improving the ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
5.
  • Structural advantages and e... Structural advantages and enhancement strategies of heterostructure water-splitting electrocatalysts
    Zheng, Dong; Yu, Linhai; Liu, Wenxian ... Cell reports physical science, 06/2021, Volume: 2, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    As an environmentally friendly and resource-rich energy, hydrogen is recognized as an ideal alternative to conventional fossil fuels. Among various methods for hydrogen production, electrochemical ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
6.
  • SMOTETomek-based Resampling... SMOTETomek-based Resampling for Personality Recognition (July 2019)
    Wang, Zhe; Wu, Chunhua; Zheng, Kangfeng ... IEEE access, 01/2019, Volume: 7
    Journal Article
    Peer reviewed
    Open access

    The main challenge of user personality recognition is low accuracy resulting from small sample size and severe sample distribution imbalance. This paper analyzes the impact of imbalanced data ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
7.
  • A Secure and Efficient Tran... A Secure and Efficient Transmission Method in Connected Vehicular Cloud Computing
    Yang, Yixian; Niu, Xinxin; Li, Lixiang ... IEEE network, 05/2018, Volume: 32, Issue: 3
    Journal Article
    Peer reviewed

    Connected vehicular cloud computing (CVCC) and the VANET can realize real-time monitoring and intelligent adjustment of traffic conditions. With the data collected by vehicles and the guidance ...
Full text
Available for: IJS, NUK, UL
8.
  • Virus Propagation Modeling ... Virus Propagation Modeling and Convergence Analysis in Large-Scale Networks
    Wang, Xu; Ni, Wei; Zheng, Kangfeng ... IEEE transactions on information forensics and security, 10/2016, Volume: 11, Issue: 10
    Journal Article
    Peer reviewed

    Biological epidemic models, widely used to model computer virus propagations, suffer from either limited scalability to large networks, or accuracy loss resulting from simplifying approximations. In ...
Full text
Available for: IJS, NUK, UL
9.
  • Key-Policy Attribute-Based ... Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing
    Zhu, Huijun; Wang, Licheng; Ahmad, Haseeb ... IEEE access, 01/2017, Volume: 5
    Journal Article
    Peer reviewed
    Open access

    The privacy of users must be considered as the utmost priority in distributed networks. To protect the identities of users, attribute-based encryption (ABE) was presented by Sahai et al. ABE has been ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
10.
  • A Wide‐Temperature Adaptive... A Wide‐Temperature Adaptive Aqueous Zinc‐Air Battery‐Based on Cu–Co Dual Metal–Nitrogen‐Carbon/Nanoparticle Electrocatalysts
    Feng, Jinxiu; Zheng, Dong; Yin, Ruilian ... Small structures, July 2023, 2023-07-00, 20230701, 2023-07-01, Volume: 4, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    Zinc‐air batteries (ZABs) are promising electrochemical energy storage devices, but the inherent semi‐open configuration and catalytically dependent working principle make their performance ...
Full text
Available for: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
1 2 3 4 5
hits: 450

Load filters