Combination of short-term load forecasting models based on a stacking ensemble approach

J Moon, S Jung, J Rew, S Rho, E Hwang - Energy and Buildings, 2020 - Elsevier
Building electric energy consumption forecasting is essential in establishing an energy
operation strategy for building energy management systems. Because of recent …

Commutative encryption and watermarking algorithm based on feature invariants for secure vector map

N Ren, C Zhu, D Tong, W Chen, Q Zhou - IEEE Access, 2020 - ieeexplore.ieee.org
The existing commutative encryption and watermarking (CEW) methods based on feature
invariants can achieve both the robustness of the watermarking algorithm and the security of …

Computational intelligence in cryptology

W Awad, ESM El-Alfy - Improving information security practices …, 2016 - igi-global.com
Computational intelligence (CI) has attracted the attention of many researchers for its
effectiveness in solving different kinds of problems. It has been applied to solve problems in …

[PDF][PDF] 神经网络与密码学的交叉研究

葛钊成, 胡汉** - Journal of Cryptologic Research, 2021 - jcr.cacrnet.org.cn
**年来, 部分学者致力于神经网络和密码学的交叉研究, 并取得具有重要意义的研究成果.
本文首先梳理并归纳了神经网络和密码学发展历程, 探索其内在联系与神经密码学的交叉可行性 …

[NAVOD][C] Improved Distinguishes on Stream Cipher Achterbahn-v2

L Shun-Bo, W Yan, P Jia-Long - Information …, 2013 - Asian Network for Scientific …