Da, Qingan
27  Ergebnisse:
Personensuche X
?
1

Adversarial Training Based on Latent Distribution Calibrati..:

, In: Computational and Experimental Simulations in Engineering; Mechanisms and Machine Science,
Da, Qingan ; Zhang, Guoyin ; Wang, Wenshan. - p. 443-452 , 2024
 
?
2

Path Planning with Improved Dueling DQN Algorithm for UAVs ..:

, In: Computational and Experimental Simulations in Engineering; Mechanisms and Machine Science,
Wang, Wenshan ; Zhang, Guoyin ; Da, Qingan. - p. 453-465 , 2024
 
?
6

Adaptive Weight Adjustment and Searching Perception Strateg..:

Wang, Wenshan ; Sun, Jianguo ; Li, Sizhao...
Wireless Communications and Mobile Computing.  2022 (2022)  - p. 1-12 , 2022
 
?
7

Project Gradient Descent Adversarial Attack against Multiso..:

Jiang, Yan ; Yin, Guisheng ; Yuan, Ye..
Security and Communication Networks.  2021 (2021)  - p. 1-13 , 2021
 
?
8

A Novel Hybrid Information Security Scheme for 2D Vector Ma:

Da, Qingan ; Sun, Jianguo ; Zhang, Liguo...
Mobile Networks and Applications.  23 (2018)  4 - p. 734-742 , 2018
 
?
9

A multi-focus image fusion algorithm in 5G communications:

Sun, Jianguo ; Wang, Wenshan ; Zhang, Kejia...
Multimedia Tools and Applications.  78 (2018)  20 - p. 28537-28556 , 2018
 
?
10

A New Digital Watermarking Method for Data Integrity Protec..:

Zhang, Guoyin ; Kou, Liang ; Zhang, Liguo...
Security and Communication Networks.  2017 (2017)  - p. 1-12 , 2017
 
?
11

An intelligent method of cancer prediction based on mobile ..:

Zhang, Guoyin ; Kou, Liang ; Yuan, Ye...
Cluster Computing.  22 (2017)  S5 - p. 11527-11535 , 2017
 
?
12

A data authentication scheme for UAV ad hoc network communi..:

Sun, Jianguo ; Wang, Wenshan ; Kou, Liang...
The Journal of Supercomputing.  76 (2017)  6 - p. 4041-4056 , 2017
 
?
13

Adversarial Defense Method Based on Latent Representation G..:

Da, Qingan ; Zhang, Guoyin ; Wang, Wenshan...
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10529764/.  , 2023
 
1-15