![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
670 Result(s)
-
Chapter and Conference Paper
Correction to: Flashproofs: Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transparent Setup
-
Chapter and Conference Paper
Correction to: Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security
In an older version of this paper, there was an erroneous insertion of an equation on page 315. This has been removed.
-
Chapter and Conference Paper
Tree-Based Models for Pain Detection from Biomedical Signals
For medical treatments, pain is often measured by self-report. However, the current subjective pain assessment highly depends on the patient’s response and is therefore unreliable. In this paper, we propose a ...
-
Chapter and Conference Paper
Correction to: Anonymizing Global Edge Weighted Social Network Graphs
In the originally published chapter 9 some of the paragraphs were presented in their unfinished version, which affected the readability of the paper. The sections Introduction, Preliminary and References have ...
-
Chapter and Conference Paper
Correction to: Federated Learning for Non-IID Data: From Theory to Algorithm
In the originally published version of chapter 3 the second affiliation of the author Bojian Wei was incorrect. The second affiliation of the author Bojian Wei has been corrected as “School of Cyber Security, ...
-
Chapter and Conference Paper
Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages
Efficient Reed-Solomon code reconstruction algorithms, for example, by Guruswami and Wootters (STOC–2016), translate into local leakage attacks on Shamir secret-sharing schemes over characteristic-2 fields. Ho...
-
Chapter and Conference Paper
Correction to: Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays
In the version of this paper that was originally published, the affiliation of Muqian Chen, Xuebin Wang, Yue Gao, and Can Zhao has been changed to: ‘School of Cyber Security, University of Chinese Academy of S...
-
Chapter and Conference Paper
CHESTNUT: Improve Serendipity in Movie Recommendation by an Information Theory-Based Collaborative Filtering Approach
The term “serendipity” has been understood narrowly in the Recommender System. Applying a user-centered approach, user-friendly serendipitous recommender systems are expected to be developed based on a good u...
-
Chapter and Conference Paper
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums
Since it was proposed in 2015 as a generalization of integral properties, the division property has evolved into a powerful tool for probing the structures of Boolean functions whose algebraic normal forms are...
-
Chapter and Conference Paper
Embedded Security-Critical Device Resource Isolation
At present, embedded devices have been widely used in people’s daily life, which makes more convenience for the public. However, embedded devices still have security problems, such as automatic driving accide...
-
Chapter and Conference Paper
Research on Design of Tai-Chong and Yong-Quan Acupoints Physiotherapy Apparatus Based on Traditional Chinese Medicine Theory
This research is to inherit and carry forward China’s extensive and profound traditional Chinese medicine (TCM) theory, combining TCM massage with novel technology and design methods to develop a newly foot ac...
-
Chapter and Conference Paper
Non-invasive Sleep Assistance System Design Based on IoT
With the accelerated pace of life in modern society, various sleep problems have become increasingly prominent and spread to younger groups. Meanwhile, people are beginning to accept the use of IoT products t...
-
Chapter and Conference Paper
A Detailed Examination of User Interactions with Two Different Data Interfaces
We present results of a detailed analysis of ten screen capture videos documenting how participants in a laboratory user study used two different interfaces to complete data exploration tasks. Findings present...
-
Chapter and Conference Paper
The Influence of Human-Computer Sagittal Interaction in Peripersonal Space on Affective Valence Appraisals
This dissertation argues, from an embodied perspective, that people’s emotional connection with space is based on their physical structure and their experience of interacting with the environment. Accordingly,...
-
Chapter and Conference Paper
Research Status and Prospect of Blockchain Technology in Agriculture Field
Agriculture 4.0 is the era of integrating intelligent technologies in agriculture. Problems such as low informatization, food safety, high management cost and imbalance between supply and demand in agriculture...
-
Chapter and Conference Paper
A Label Propagation Based User Locations Prediction Algorithm in Social Network
Network community detection is an important service provided by social networks, and social network user location can greatly improve the quality of community detection. Label propagation is one of the main me...
-
Chapter and Conference Paper
Research on the Remote Deployment Design of OTN Electrical Racks
The rapid development of 4G and multimedia services drives the exponential increase of the demand for transmission bandwidth. The OTN technology therefore emerges. In recent years, the number of OTN devices in...
-
Chapter and Conference Paper
Develo** an AR Remote Collaboration System with Semantic Virtual Labels and a 3D Pointer
Referential communication is common in physical remote collaboration. To successfully transfer instructions, remote instructors have to refer objects in the local worker’s environment. However, it is known tha...
-
Chapter and Conference Paper
Brief Introduction of Network Security Asset Management for Banks
During the digital development process, enterprises have accumulated a lot of network asset including hardware, software and websites. Effective management of network asset can reduce the internet risk. Netwo...
-
Chapter and Conference Paper
Experimental Study on Improvement of Sign Language Motion Classification Performance Using Pre-trained Network Models
Sign language is a major means of communication for people with hearing disabilities. However, there are very few hearing people who have learned sign language, and this is a great barrier to communication bet...