Skip to main content

Page of 34
and
  1. Chapter and Conference Paper

    PuzMap: Designing a Multi-sensory Puzzle Map for Children to Learn Geography

    Geography is a broad subject, and maps are essential tools for learning geography. It is necessary to educate children about geography and maps at an early age. Digital educational tools play an increasingly ...

    Junwu Wang, Lijuan Liu, Muling Huang in Distributed, Ambient and Pervasive Interac… (2020)

  2. Chapter and Conference Paper

    How Does Mobile Devices Usage Contribute to Individual’s Creativity in Cross-Cultural Settings?

    The prevalence of mobile device usage is changing the main domains of the current world. In light of increasing international expatriation to meet the demands of overseas success, more empirical research shoul...

    Shangui Hu, Hefu Liu, Guoyin Wang in Design, Operation and Evaluation of Mobile… (2020)

  3. Chapter and Conference Paper

    A Filed Study of External HMI for Autonomous Vehicles When Interacting with Pedestrians

    Interacting with pedestrians is an inevitable situation when vehicles are driven on the road. Drivers normally explain their driving intention with speed, headlights and vehicle horns. Especially, when the dis...

    Ya Wang, Qiang Xu in HCI in Mobility, Transport, and Automotive… (2020)

  4. Chapter and Conference Paper

    Improving Access and Mental Health for Youth Through Virtual Models of Care

    The overall objective of this research is to evaluate the use of a mobile health smartphone application (app) to improve the mental health of youth between the ages of 14–25 years, with symptoms of anxiety/dep...

    Cheryl Forchuk, Sandra Fisman in The Impact of Digital Technologies on Publ… (2020)

  5. Chapter and Conference Paper

    Mobile Game Theory with Street Gangs

    Gang violence remains a persistent public safety problem in Los Angeles. Gang interventionists and community organizers are turning to proactive peacekee**, a process of addressing the underlying structures th...

    Sarah Cooney, Wendy Gomez, Kai Wang in Machine Learning and Knowledge Discovery i… (2020)

  6. Chapter and Conference Paper

    Mind the Propagation of States

    Impossible differentials cryptanalysis and impossible polytopic cryptanalysis are the most effective approaches to estimate the security of block ciphers. However, the previous automatic search methods of thei...

    **chao Hu, Yongqiang Li, Lin Jiao, Shizhu Tian in Advances in Cryptology – ASIACRYPT 2020 (2020)

  7. Chapter and Conference Paper

    Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories

    At EUROCRYPT 2020, Hosoyamada and Sasaki proposed the first dedicated quantum attack on hash functions—a quantum version of the rebound attack exploiting differentials whose probabilities are too low to be use...

    **aoyang Dong, Siwei Sun, Dan** Shi, Fei Gao in Advances in Cryptology – ASIACRYPT 2020 (2020)

  8. Chapter and Conference Paper

    Better Concrete Security for Half-Gates Garbling (in the Multi-instance Setting)

    We study the concrete security of high-performance implementations of half-gates garbling, which all rely on (hardware-accelerated) AES. We find that current instantiations using k-bit wire labels can be complete...

    Chun Guo, Jonathan Katz, **ao Wang, Chenkai Weng in Advances in Cryptology – CRYPTO 2020 (2020)

  9. Chapter and Conference Paper

    Designing a Dashboard Visualization Tool for Urban Planners to Assess the Completeness of Streets

    This paper presents a design study for a novel interactive web-based visualization tool that utilizes a “Complete Streets” model to support urban planners and engineers to design streets in urban areas more ef...

    Greice C. Mariano, Veda Adnani in Human Interface and the Management of Info… (2020)

  10. Chapter and Conference Paper

    An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC

    Algebraically simple PRFs, ciphers, or cryptographic hash functions are becoming increasingly popular, for example due to their attractive properties for MPC and new proof systems (SNARKs, STARKs, among many o...

    Maria Eichlseder, Lorenzo Grassi in Advances in Cryptology – ASIACRYPT 2020 (2020)

  11. Chapter and Conference Paper

    The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers

    Inserting backdoors in encryption algorithms has long seemed like a very interesting, yet difficult problem. Most attempts have been unsuccessful for symmetric-key primitives so far and it remains an open prob...

    Thomas Peyrin, Haoyang Wang in Advances in Cryptology – CRYPTO 2020 (2020)

  12. Chapter and Conference Paper

    Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?

    Higher-order masking countermeasures provide strong provable security against side-channel attacks at the cost of incurring significant overheads, which largely hinders its applicability. Previous works towar...

    Weijia Wang, Chun Guo, François-Xavier Standaert in Advances in Cryptology – ASIACRYPT 2020 (2020)

  13. Chapter and Conference Paper

    Rounding in the Rings

    In this work, we conduct a comprehensive study on establishing hardness reductions for (Module) Learning with Rounding over rings (RLWR). Towards this, we present an algebraic framework of LWR, inspired by a r...

    Feng-Hao Liu, Zhedong Wang in Advances in Cryptology – CRYPTO 2020 (2020)

  14. Chapter and Conference Paper

    SOS-EW: System for Overdose Spike Early Warning Using Drug Mover’s Distance-Based Hawkes Processes

    Opioid addictions and overdoses have increased across the U.S. and internationally over the past decade. In urban environments, overdoses cluster in space and time, with 50% of overdoses occurring in less tha...

    Wen-Hao Chiang, Baichuan Yuan, Hao Li in Machine Learning and Knowledge Discovery i… (2020)

  15. Chapter and Conference Paper

    Toward Holistic Integration of Computing and Wireless Networking

    To systematically cop complex systems engineering in Internet of Things, this paper looks into a technological challenge to effectively and efficiently integrate computing and wireless networking. One aspect i...

    Kwang-Cheng Chen, Yingze Wang, Zixiang Nie in Internet of Things. A Confluence of Many D… (2020)

  16. Chapter and Conference Paper

    Black-Box Use of One-Way Functions is Useless for Optimal Fair Coin-Tossing

    A two-party fair coin-tossing protocol guarantees output delivery to the honest party even when the other party aborts during the protocol execution. Cleve (STOC–1986) demonstrated that a computationally bound...

    Hemanta K. Maji, Mingyuan Wang in Advances in Cryptology – CRYPTO 2020 (2020)

  17. Chapter and Conference Paper

    Alzette: A 64-Bit ARX-box

    S-boxes are the only source of non-linearity in many symmetric primitives. While they are often defined as being functions operating on a small space, some recent designs propose the use of much larger ones (e...

    Christof Beierle, Alex Biryukov in Advances in Cryptology – CRYPTO 2020 (2020)

  18. Chapter and Conference Paper

    Gender Difference in Preference for Apple Watch Dial Interface

    This study uses the dial interface of Apple Watch Series 5 as a research sample to explore the preferences of different genders for the visual style of the Apple Watch dial interface, and analyze the gender di...

    Jian Wang, Yen Hsu in Human Interface and the Management of Info… (2020)

  19. Chapter and Conference Paper

    VLC-Enabled Human-Aware Building Management System

    “Smart” buildings that can sense and detect people’s presence have been in use for the past few decades, mostly using technologies that trigger reactive responses such as turning on/off heating/ventilating, li...

    Yehuda E. Kalay, Haripriya Sathyanarayanan in Distributed, Ambient and Pervasive Interac… (2020)

  20. Chapter and Conference Paper

    Improving GP-UCB Algorithm by Harnessing Decomposed Feedback

    Gaussian processes (GPs) have been widely applied to machine learning and nonparametric approximation. Given existing observations, a GP allows the decision maker to update a posterior belief over the unknown...

    Kai Wang, Bryan Wilder, Sze-chuan Suen in Machine Learning and Knowledge Discovery i… (2020)

Page of 34