共 16 条
- [1] Dai J., Li Y., He K., Et al., R-FCN:object detection via regionbased fully convolutionalnetworks, Proceedings of the 30th International Conference on Neural Information Processing Systems, pp. 379-387, (2016)
- [2] Deng Z.P., Sun H., Lei L., Et al., Object detection in remote sensing imagery with multi-scale deformable convolutionalnetworks, Acta Geodaetica et Cartographica Sinica, 47, 9, pp. 1216-1227, (2018)
- [3] Homer C., Dewitz J., Yang L., Et al., Completion of the 2011 national land cover database for the conterminous united states-representing a decade of land cover change information, Photogrammetric Engineering and Remote Sensing, 81, 5, pp. 345-354, (2015)
- [4] Krizhevsky A., Sutskever I., Hinton G.E., ImageNet classification with deep convolutional neuralnetwork, Proceedings of the 25th International Conference on Neural Information Processing Systems, pp. 1097-1105, (2012)
- [5] Li X.J., Zhang D., Li H., Efficient revocable attribute-based encryption scheme, Journal on Communications, 40, 6, pp. 32-39, (2019)
- [6] Pang X., Wang Y., Chen W., Jiang P., Gao Y., Fair and verifiable multi-keyword ranked search over encrypted data based on blockchain, Journal of Computer Applications, 43, 1, pp. 130-139, (2023)
- [7] Shabbir M., Shabbir A., Iwendi C., Et al., Enhancing security of health information using modular encryption standard in mobile cloud computing, IEEE Access, 9, 36, pp. 8820-8834, (2021)
- [8] Song M.F., Jia D.Z., Guo J.W., Et al., A point cloud compression algorithm based on K-neighborhood cuboid, Science of Surveying and Mapping, 44, 10, pp. 93-100, (2019)
- [9] Sun J., Zhu J., Tian Z., Shi G., Guan C., Attribute based encryption scheme based on elliptic curve cryptography and supporting revocation, Journal of Computer Applications, 42, 7, pp. 2094-2103, (2022)
- [10] Wang C., Han Y., Duan X., Et al., NTRU type proxy re encryption scheme based on RLWE difficulty hypothesis, Journal of Cryptography, 8, 5, pp. 909-920, (2021)