Compared with traditional machine learning model, graph neural networks (GNNs) have distinct advantages in processing unstructured data. However, the vulnerability of GNNs cannot be ignored. Graph universal adversarial attack is...
The cloud computing platforms are being deployed nowadays for resource scheduling of real time data intensive applications. Cloud computing still deals with the challenge of time oriented effective scheduling for resource...
Logistics business is generally managed by logistics orders in plain text, and there is a risk of disclosure of customer privacy information in every business link. In order to solve the problem of privacy protection in...
Information technology (IT) has dramatically changed tourism industry, particularly in facilitating and improving information discovery and dissemination in tourism industry. Prior research has identified the key role that IT...
This research examines the important concept of transnational digital entrepreneurship (TDE). The paper integrates the host and home country entrepreneurial ecosystems with the digital ecosystem to the framework of the...
Cloud innovation has become increasingly important to supply chain innovation and performance. User involvement is a crucial part of cloud innovation. However, the effect of user involvement in supply chain cloud innovation has...
The realization of short-term load forecasting is the basis of system planning and decision-making, and it is an important index to evaluate the safety and economy of power grid.In order to accurately predict the power load...
As the rampant pandemic witnessed significant growth in online learning, numerous studies focused on designing attractive videos to improve the quality of teaching. For an effective instructional video, whether a teacher should...
Schema theory is one of the critical theories in cognitive linguistics. It has been applied to teaching and learning in recent years. With the question of how schema theory can be used and a benefit for practical application in...
Steganalysis technology judges whether there is secret information in the carrier by monitoring the abnormality of the carrier data, so the traditional information hiding technology has reached the bottleneck. Therefore, this...
Portable interfaced robot arms equipped with mobile user interactions are significantly being utilized in modern world. The application of teaching robotics is being used in challenging pandemic situation but it is still...