1 | -- | 17 | Qian Liu, Maoyin Chen, Donghua Zhou. Single image haze removal via depth-based contrast stretching transform |
1 | -- | 13 | Yi Zhang, Kai Lu, Yinghui Gao. QSobel: A novel quantum image edge extraction algorithm |
1 | -- | 16 | Jung Yeon Hwang, Ku-Young Chang, Hyun-Sook Cho, Boyeon Song, Willy Susilo. Collusion-resistant convertible ring signature schemes |
1 | -- | 38 | Peng Wang, Baowen Xu, Yurong Wu, Xiaoyu Zhou. Link prediction in social networks: the state-of-the-art |
1 | -- | 14 | Angsheng Li, Xuechen Li, Yicheng Pan, Wei Zhang. Strategies for network security |
1 | -- | 11 | Wei Zhang. Decidable subsets of open logic and an algorithm for R-calculus |
1 | -- | 21 | Huang Huang, Zhao Zhang. ∞ robust adaptive control during the re-entry of hypersonic cruise vehicles |
1 | -- | 15 | Chunming Tang, MaoZhi Xu, Yanfeng Qi. Cryptography on twisted Edwards curves over local fields |
1 | -- | 10 | Zesong Fei, Chengwen Xing, Na Li. QoE-driven resource allocation for mobile IP services in wireless network |
1 | -- | 15 | Hui Wang, Rui Wang 0014, Zhongzhi Luan, Xuehai Qian, Depei Qian. Improving multiprocessor performance with fine-grain coherence bypass |
1 | -- | 14 | Yuqing Zhang, Qixu Liu, Qihan Luo, Xiali Wang. XAS: Cross-API scripting attacks in social ecosystems |
1 | -- | 8 | Mei Chen, Lu Zhang, Jin Xu. Rational construction of a cellular memory inverter |
1 | -- | 13 | Zhenwei Liu, Huaguang Zhang, Qiuye Sun. Static output feedback stabilization for systems with time-varying delay based on a matrix transformation method |
1 | -- | 10 | Li Kuang, Bojin Zheng, Deyi Li, Yuanxiang Li, Yu Sun. A fractal and scale-free model of complex networks with hub attraction behaviors |
1 | -- | 13 | Shaoquan Jiang. On τ-time secure key agreement |