Skip to main content

previous disabled Page of 34
and
Your search also matched 4,817 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Crowd Intelligence Driven Design Framework Based on Perception-Retrieval Cognitive Mechanism

Include preview-only content
  1. Chapter and Conference Paper

    Correction to: Flashproofs: Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transparent Setup

    Nan Wang, Sid Chi-Kin Chau in Advances in Cryptology – ASIACRYPT 2022 (2022)

  2. Chapter and Conference Paper

    Correction to: Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security

    In an older version of this paper, there was an erroneous insertion of an equation on page 315. This has been removed.

    Yuyu Wang, Jiaxin Pan in Advances in Cryptology – EUROCRYPT 2022 (2022)

  3. Chapter and Conference Paper

    Tree-Based Models for Pain Detection from Biomedical Signals

    For medical treatments, pain is often measured by self-report. However, the current subjective pain assessment highly depends on the patient’s response and is therefore unreliable. In this paper, we propose a ...

    Heng Shi, Belkacem Chikhaoui, Shengrui Wang in Participative Urban Health and Healthy Agi… (2022)

  4. Chapter and Conference Paper

    Correction to: Anonymizing Global Edge Weighted Social Network Graphs

    In the originally published chapter 9 some of the paragraphs were presented in their unfinished version, which affected the readability of the paper. The sections Introduction, Preliminary and References have ...

    Jiaru Wang, Ziyi Wan, Jiankang Song in Security and Privacy in Social Networks an… (2021)

  5. Chapter and Conference Paper

    Correction to: Federated Learning for Non-IID Data: From Theory to Algorithm

    In the originally published version of chapter 3 the second affiliation of the author Bojian Wei was incorrect. The second affiliation of the author Bojian Wei has been corrected as “School of Cyber Security, ...

    Bojian Wei, Jian Li, Yong Liu, Wei** Wang in PRICAI 2021: Trends in Artificial Intellig… (2021)

  6. Chapter and Conference Paper

    Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages

    Efficient Reed-Solomon code reconstruction algorithms, for example, by Guruswami and Wootters (STOC–2016), translate into local leakage attacks on Shamir secret-sharing schemes over characteristic-2 fields. Ho...

    Hemanta K. Maji, Hai H. Nguyen in Advances in Cryptology – EUROCRYPT 2021 (2021)

  7. Chapter and Conference Paper

    Correction to: Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays

    In the version of this paper that was originally published, the affiliation of Muqian Chen, Xuebin Wang, Yue Gao, and Can Zhao has been changed to: ‘School of Cyber Security, University of Chinese Academy of S...

    Muqian Chen, Xuebin Wang, **qiao Shi, Yue Gao in Information and Communications Security (2020)

  8. Chapter and Conference Paper

    CHESTNUT: Improve Serendipity in Movie Recommendation by an Information Theory-Based Collaborative Filtering Approach

    The term “serendipity” has been understood narrowly in the Recommender System. Applying a user-centered approach, user-friendly serendipitous recommender systems are expected to be developed based on a good u...

    **angjun Peng, Hongzhi Zhang, **aosong Zhou in Human Interface and the Management of Info… (2020)

  9. Chapter and Conference Paper

    An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums

    Since it was proposed in 2015 as a generalization of integral properties, the division property has evolved into a powerful tool for probing the structures of Boolean functions whose algebraic normal forms are...

    Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang in Advances in Cryptology – ASIACRYPT 2020 (2020)

  10. Chapter and Conference Paper

    Embedded Security-Critical Device Resource Isolation

    At present, embedded devices have been widely used in people’s daily life, which makes more convenience for the public. However, embedded devices still have security problems, such as automatic driving accide...

    Xuguo Wang, Shengzhe Kan, Yeli Xu in Cyber Security (2020)

  11. Chapter and Conference Paper

    Research on Design of Tai-Chong and Yong-Quan Acupoints Physiotherapy Apparatus Based on Traditional Chinese Medicine Theory

    This research is to inherit and carry forward China’s extensive and profound traditional Chinese medicine (TCM) theory, combining TCM massage with novel technology and design methods to develop a newly foot ac...

    Huabin Wang, Bao** Xu, Yu-Chi Lee in Human Interface and the Management of Info… (2020)

  12. Chapter and Conference Paper

    Non-invasive Sleep Assistance System Design Based on IoT

    With the accelerated pace of life in modern society, various sleep problems have become increasingly prominent and spread to younger groups. Meanwhile, people are beginning to accept the use of IoT products t...

    Dong Wang, Shiyao Qin, Zhenyu Gu in Distributed, Ambient and Pervasive Interactions (2020)

  13. Chapter and Conference Paper

    A Detailed Examination of User Interactions with Two Different Data Interfaces

    We present results of a detailed analysis of ten screen capture videos documenting how participants in a laboratory user study used two different interfaces to complete data exploration tasks. Findings present...

    Rui Wang, Tamara Babaian in Human Interface and the Management of Info… (2020)

  14. Chapter and Conference Paper

    The Influence of Human-Computer Sagittal Interaction in Peripersonal Space on Affective Valence Appraisals

    This dissertation argues, from an embodied perspective, that people’s emotional connection with space is based on their physical structure and their experience of interacting with the environment. Accordingly,...

    **nyan Wang, Yen Hsu in Human Interface and the Management of Info… (2020)

  15. Chapter and Conference Paper

    Research Status and Prospect of Blockchain Technology in Agriculture Field

    Agriculture 4.0 is the era of integrating intelligent technologies in agriculture. Problems such as low informatization, food safety, high management cost and imbalance between supply and demand in agriculture...

    Dawei Xu, Weiqi Wang, Liehuang Zhu, Ruiguang Li in Cyber Security (2020)

  16. Chapter and Conference Paper

    A Label Propagation Based User Locations Prediction Algorithm in Social Network

    Network community detection is an important service provided by social networks, and social network user location can greatly improve the quality of community detection. Label propagation is one of the main me...

    Huan Ma, Wei Wang in Cyber Security (2020)

  17. Chapter and Conference Paper

    Research on the Remote Deployment Design of OTN Electrical Racks

    The rapid development of 4G and multimedia services drives the exponential increase of the demand for transmission bandwidth. The OTN technology therefore emerges. In recent years, the number of OTN devices in...

    Tianpu Yang, Junshi Gao, Haitao Wang, Guangchong Dai, Rui Zhai in Cyber Security (2020)

  18. Chapter and Conference Paper

    Develo** an AR Remote Collaboration System with Semantic Virtual Labels and a 3D Pointer

    Referential communication is common in physical remote collaboration. To successfully transfer instructions, remote instructors have to refer objects in the local worker’s environment. However, it is known tha...

    Tzu-Yang Wang, Yuji Sato, Mai Otsuki in Human Interface and the Management of Info… (2020)

  19. Chapter and Conference Paper

    Brief Introduction of Network Security Asset Management for Banks

    During the digital development process, enterprises have accumulated a lot of network asset including hardware, software and websites. Effective management of network asset can reduce the internet risk. Netwo...

    Yumo Wang, Qinghua Zhang in Cyber Security (2020)

  20. Chapter and Conference Paper

    Experimental Study on Improvement of Sign Language Motion Classification Performance Using Pre-trained Network Models

    Sign language is a major means of communication for people with hearing disabilities. However, there are very few hearing people who have learned sign language, and this is a great barrier to communication bet...

    Kaito Kawaguchi, Zhizhong Wang in Human Interface and the Management of Info… (2020)

previous disabled Page of 34