Region-Focusing Data Augmentation via Salient Region Activation and Bitplane Recombination for Target Detection

As the performance of a convolutional neural network is logarithmically proportional to the amount of training data, data augmentation has attracted increasing attention in recent years.Although the current data augmentation methods are efficient because they force the network to learn multiple parts of a given training image through occlusion or r

read more


Trusted and anonymous authentication scheme for wireless networks

A trusted and anonymous wireless authentication protocol was proposed by using of temporary identities and one time secret keys, both user identity and platform were authenticated under the proposed protocol.It has demonstrated that the HEAD MISTRESS proposed scheme is security and reliability, it LEDs can provide identity anonymity and platform an

read more