Digital Library
Vol. 18, No. 4, April 30, 2024
[Regular Papers]
Artificial Intelligence & Big Data
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Artificial intelligence
- data processing
- Computations
- Bioinformatics
- Machine Learning
- breast cancer
- image processing
IoT & Application
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Smart City
- Cyber-Physical-Social Systems
- Smart Patrol Platform
- Drone Trajectory Planning
- Ant colony optimization algorithm
Mobile Communication
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Multimedia & Computer Vision
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Unsupervised video object segmentation
- Dual-stream Co-enhanced
- Motion refinement
- Feature aggregation
- Dual-stream neural network
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
EDMFEN: Edge detection-based multi-scale feature enhancement Network for low-light image enhancement
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Low-Light Image Enhancement
- Deep Learning
- Edge detection
- multi-scale feature enhancement
- spatial attention mechanism.
Security & Privacy
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Mobile Cloud Computing
- cloud data sharing
- Outsourcing Decryption
- Encrypted data
- Verifiable Transformed Ciphertext
Lejun Zhang,
Bo Zhang,
Ran Guo,
Zhujun Wang,
Guopeng Wang,
Jing Qiu,
Shen Su,
Yuan Liu,
Guangxia Xu,
Zhihong Tian,
Sergey Gataullin
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Blockchain
- Covert communication
- Matrix decomposition
- transaction amount
- embedding rate
- detection resistance
Wireless Communication
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Intention to Use
- Mobile Banking
- Risk
- Security and Privacy
- Technology Acceptance Model (TAM)
- Theory of Planned Behavior (TPB)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Cooperative molecular communication
- Cylindrical anomalous-diffusive channel
- Optimizations
- Conjugate gradient algorithm
Papers on APIC-IST 2023
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Archives