We use cookies to improve your experience with our site.

DG-CNN: Introducing Margin Information into Convolutional Neural Networks for Breast Cancer Diagnosis in Ultrasound Images
Xiao-Zheng Xie, Jian-Wei Niu, Xue-Feng Liu, Qing-Feng Li, Yong Wang, Jie Han, Shaojie Tang
2022, 37(2): 277-294. DOI: 10.1007/s11390-020-0192-0
Abstract
Document-Level Neural Machine Translation with Hierarchical Modeling of Global Context
Xin Tan, Long-Yin Zhang, Guo-Dong Zhou
2022, 37(2): 295-308. DOI: 10.1007/s11390-021-0286-3
Abstract
Intent-Slot Correlation Modeling for Joint Intent Prediction and Slot Filling
Jun-Feng Fan, Mei-Ling Wang, Chang-Liang Li, Zi-Qiang Zhu, Lu Mao
2022, 37(2): 309-319. DOI: 10.1007/s11390-020-0326-4
Abstract
Imputing DNA Methylation by Transferred Learning Based Neural Network
Xin-Feng Wang, Xiang Zhou, Jia-Hua Rao, Zhu-Jin Zhang, Yue-Dong Yang
2022, 37(2): 320-329. DOI: 10.1007/s11390-021-1174-6
Abstract
Diagnosis of COVID-19 Pneumonia via a Novel Deep Learning Architecture
Xin Zhang, Siyuan Lu, Shui-Hua Wang, Xiang Yu, Su-Jing Wang, Lun Yao, Yi Pan, Yu-Dong Zhang
2022, 37(2): 330-343. DOI: 10.1007/s11390-020-0679-8
Abstract
Quality of Service Support in RPL Networks: Standing State and Future Prospects
Ibrahim S. Alsukayti
2022, 37(2): 344-368. DOI: 10.1007/s11390-022-1027-y
Abstract
Differential Privacy via a Truncated and Normalized Laplace Mechanism
William Croft, Jörg-Rüdiger Sack, Wei Shi
2022, 37(2): 369-388. DOI: 10.1007/s11390-020-0193-z
Abstract
Test-Driven Feature Extraction of Web Components
Yong-Hao Long, Yan-Cheng Chen, Xiang-Ping Chen, Xiao-Hong Shi, Fan Zhou
2022, 37(2): 389-404. DOI: 10.1007/s11390-022-0673-4
Abstract
ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference
Gen Zhang, Peng-Fei Wang, Tai Yue, Xiang-Dong Kong, Xu Zhou, Kai Lu
2022, 37(2): 405-422. DOI: 10.1007/s11390-021-1600-9
Abstract
Byte Frequency Based Indicators for Crypto-Ransomware Detection from Empirical Analysis
Geun Yong Kim, Joon-Young Paik, Yeongcheol Kim, Eun-Sun Cho
2022, 37(2): 423-442. DOI: 10.1007/s11390-021-0263-x
Abstract
Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results
Louis Cianciullo, Hossein Ghodosi
2022, 37(2): 443-458. DOI: 10.1007/s11390-022-0878-6
Abstract
Generalized Goldwasser and Micali's Type Cryptosystem
Ying Guo, Zhen-Fu Cao, Xiao-Lei Dong
2022, 37(2): 459-467. DOI: 10.1007/s11390-021-0806-1
Abstract
Unified Enclave Abstraction and Secure Enclave Migration on Heterogeneous Security Architectures
Jin-Yu Gu, Hao Li, Yu-Bin Xia, Hai-Bo Chen, Cheng-Gang Qin, Zheng-Yu He
2022, 37(2): 468-486. DOI: 10.1007/s11390-021-1083-8
Abstract
Conjugate-Gradient Progressive-Iterative Approximation for Loop and Catmull-Clark Subdivision Surface Interpolation
Yusuf Fatihu Hamza, Hong-Wei Lin
2022, 37(2): 487-504. DOI: 10.1007/s11390-020-0183-1
Abstract