Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 636 matches
- 2024
- Juntao Li, Meijuan Zhao, Zhenbo Qin, Ruiping Yuan, Anqiang Huang, Mengtao Li:
Detection and recognition of multiple QR codes based on YOLO_CBAM algorithm. Int. J. Bio Inspired Comput. 23(3): 179-188 (2024) - Hao Dong, Haibin Liu, Mingfei Li, Fujie Ren, Feng Xie:
An Algorithm for the Recognition of Motion-Blurred QR Codes Based on Generative Adversarial Networks and Attention Mechanisms. Int. J. Comput. Intell. Syst. 17(1): 83 (2024) - Wencheng Gu, Kexue Sun, Zhipeng Jiang, Li Sun:
Gs-DeblurGANv2: a QR code deblurring algorithm based on lightweight network structure. Multim. Syst. 30(2): 87 (2024) - Hai-Sheng Li, Jingyin Chen, Huafeng Huang:
QR code arbitrary style transfer algorithm based on style matching layer. Multim. Tools Appl. 83(13): 38505-38522 (2024) - Gerard Goggin, Rowan Wilken:
QR codes and automated decision-making in the COVID-19 pandemic. New Media Soc. 26(3): 1268-1289 (2024) - Anastasios Papathanasiou, George Liontos, Georgios Paparis, Vasiliki Liagkou, Euripides Glavas:
BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks. Sensors 24(5): 1676 (2024) - Hong Zheng, Zhongyuan Guo, Chang Liu, Xi Li, Tianyu Wang, Changhui You:
Blind deblurring of QR code using intensity and gradient prior of positioning patterns. Vis. Comput. 40(1): 441-455 (2024) - Richard Wu, Nicole Liu, Grace Peng, Adarsha Bhattarai, Dongming Peng:
An Innovative Method for Securing QR Codes against Counterfeits in Supply Chain Management. CCWC 2024: 589-596 - Kazutake Uehira, Hiroshi Unno:
Study on removing superimposed QR code on object image using an autoencoder. ICMLSC 2024: 178-185 - Katarzyna Koptyra, Marek R. Ogiela:
Information Hiding in QR Codes using Segment Manipulation. PerCom Workshops 2024: 397-400 - Nathaniel Moore Glaser, Rajashree Ravi, Zsolt Kira:
N-QR: Natural Quick Response Codes for Multi-Robot Instance Correspondence. CoRR abs/2403.05815 (2024) - Guangyang Wu, Xiaohong Liu, Jun Jia, Xuehao Cui, Guangtao Zhai:
Text2QR: Harmonizing Aesthetic Customization and Scanning Robustness for Text-Guided QR Code Generation. CoRR abs/2403.06452 (2024) - Jia-Wei Liao, Winston Wang, Tzu-Sian Wang, Li-Xuan Peng, Cheng-Fu Chou, Jun-Cheng Chen:
Diffusion-based Aesthetic QR Code Generation via Scanning-Robust Perceptual Guidance. CoRR abs/2403.15878 (2024) - 2023
- Yusuf Alaca:
Graf ve karekod yöntemleriyle dönüştürülmüş log kayıtları üzerinde derin öğrenme tabanlı siber saldırı tespiti (Deep learning-based cyber attack dedection on encoded log by graph and qr code methods). Karabük University, Turkey, 2023 - Sy-Hung Bach, Phan Bui Khoi, Soo-Yeong Yi:
Application of QR Code for Localization and Navigation of Indoor Mobile Robot. IEEE Access 11: 28384-28390 (2023) - Ahmad Sahban Rafsanjani, Norshaliza Binti Kamaruddin, Hazlifah Mohd Rusli, Mohammad Dabbagh:
QsecR: Secure QR Code Scanner According to a Novel Malicious URL Detection Framework. IEEE Access 11: 92523-92539 (2023) - Min-Jen Tsai, Ya-Chu Lee, Te-Ming Chen:
Implementing Deep Convolutional Neural Networks for QR Code-Based Printed Source Identification. Algorithms 16(3): 160 (2023) - Rubén Hernando, José A. Macías:
Development of usable applications featuring QR codes for enhancing interaction and acceptance: a case study. Behav. Inf. Technol. 42(4): 360-378 (2023) - Vinton G. Cerf:
On QR Codes and Safety. Commun. ACM 66(2): 7 (2023) - Yusuf Alaca, Yüksel Çelik:
Cyber attack detection with QR code images using lightweight deep learning models. Comput. Secur. 126: 103065 (2023) - Min-Jen Tsai, Shao-Lun Peng:
QR code beautification by instance segmentation (IS-QR). Digit. Signal Process. 133: 103887 (2023) - Jeng-Shyang Pan, Tao Liu, Bin Yan, Hong-Mei Yang, Shu-Chuan Chu:
A Lossless-Recovery Secret Distribution Scheme Based on QR Codes. Entropy 25(4): 653 (2023) - Haroon Rashid Hammood Al Dallal, Wijdan Noaman Marzoog Al Mukhtar:
A QR Code Used for Personal Information Based On Multi-Layer Encryption System. Int. J. Interact. Mob. Technol. 17(9): 44-56 (2023) - Tingda Shen, Feng Guo, Chuankun Wu, Changqiang Jing, Lijiao Ding:
An information transmission scheme based on secure QR code in IoT. Int. J. Wirel. Mob. Comput. 25(1): 47-57 (2023) - Aya Abdulhussein Alyousif, Ali Adil Yassin:
Locality Improvement Scheme Based on QR Code Technique within Inverted Index. Informatica (Slovenia) 47(6) (2023) - Rongjun Chen, Hongxing Huang, Yongxing Yu, Jinchang Ren, Peixian Wang, Huimin Zhao, Xu Lu:
Rapid Detection of Multi-QR Codes Based on Multistage Stepwise Discrimination and a Compressed MobileNet. IEEE Internet Things J. 10(18): 15966-15979 (2023) - Jiannan Liu, Jing Han, Kang Fu, Jun Jia, Dandan Zhu, Guangtao Zhai:
Application of QR Code Watermarking and Encryption in the Protection of Data Privacy of Intelligent Mouth-Opening Trainer. IEEE Internet Things J. 10(12): 10510-10518 (2023) - Yixiang Fang, Kai Tu, Kai Wu, Yi Peng, Yunqing Shi:
PROMISE: A QR Code PROjection Matrix Based Framework for Information Hiding Using Image SEgmentation. KSII Trans. Internet Inf. Syst. 17(2): 471-485 (2023) - Min-Jen Tsai, Hung-Yu Wu, Di-Ting Lin:
Auto ROI & mask R-CNN model for QR code beautification (ARM-QR). Multim. Syst. 29(3): 1245-1276 (2023) - Wenying Wen, Yunpeng Jian, Yuming Fang, Yushu Zhang, Baolin Qiu:
Authenticable medical image-sharing scheme based on embedded small shadow QR code and blockchain framework. Multim. Syst. 29(2): 831-845 (2023)
skipping 606 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-12 09:30 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint