Attention based data hiding with generative adversarial networks

C Yu - Proceedings of the AAAI conference on artificial …, 2020 - ojs.aaai.org
Recently, the generative adversarial network is the hotspot in research and industrial areas.
Its application on data generation is the most common usage. In this paper, we propose the …

[HTML][HTML] 基于半监督生成对抗网络的三维重建云工作室

余翀 - 智能科学与技术学报, 2019 - infocomm-journal.com
摘要由于固有的问题复杂性和计算复杂度, 三维重建是计算机视觉研究和应用领域非常重要且
富有挑战性的课题. 目前已有的三维重建算法往往会导致重建的三维模型上存在着明显的空洞 …

Analysis of electronic bill authentication and security storage performance utilising machine learning algorithm

J Tian, L Yang, Y Zhang… - International Journal of …, 2022 - inderscienceonline.com
The study aims to ensure the security and authentication efficiency of the bill image, and the
encryption and decryption methods and security protection of the electronic bill are studied …

[PDF][PDF] Contemporary Art and Its IP Safeguard in Digital Era-A Critical Review

R Aggarwal, LP Vinjamuri - The book is a compilation of the concepts … - researchgate.net
The realm of contemporary art is a nascent domain that amalgamates the facets of modern
art and conventional art portrayed in the contemporary era. The contemporary epoch's …