Skip to main content

previous disabled Page of 72
and
Your search also matched 10,544 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Crowd Intelligence Driven Design Framework Based on Perception-Retrieval Cognitive Mechanism

Include preview-only content
  1. Chapter and Conference Paper

    Correction to: Flashproofs: Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transparent Setup

    Nan Wang, Sid Chi-Kin Chau in Advances in Cryptology – ASIACRYPT 2022 (2022)

  2. Chapter and Conference Paper

    Correction to: Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security

    In an older version of this paper, there was an erroneous insertion of an equation on page 315. This has been removed.

    Yuyu Wang, Jiaxin Pan in Advances in Cryptology – EUROCRYPT 2022 (2022)

  3. Chapter and Conference Paper

    Correction to: Weakly Supervised Whole Cardiac Segmentation via Attentional CNN

    In the originally published version of chapter 9, by error, the author **ye Peng had been assigned affiliation no. “3” instead of “2”. This has been corrected.

    Erlei Zhang, Minghui Sima, Jun Wang, **ye Peng, **glei Li in Intelligence Science IV (2022)

  4. Chapter

    Accessible Privacy

    End-user privacy mechanisms have proliferated in various types of devices and application domains. However, these mechanisms were often designed without adequately considering a wide range of underserved users...

    Yang Wang, Charlotte Emily Price in Modern Socio-Technical Perspectives on Privacy (2022)

  5. Chapter and Conference Paper

    Tree-Based Models for Pain Detection from Biomedical Signals

    For medical treatments, pain is often measured by self-report. However, the current subjective pain assessment highly depends on the patient’s response and is therefore unreliable. In this paper, we propose a ...

    Heng Shi, Belkacem Chikhaoui, Shengrui Wang in Participative Urban Health and Healthy Agi… (2022)

  6. Chapter and Conference Paper

    Correction to: Anonymizing Global Edge Weighted Social Network Graphs

    In the originally published chapter 9 some of the paragraphs were presented in their unfinished version, which affected the readability of the paper. The sections Introduction, Preliminary and References have ...

    Jiaru Wang, Ziyi Wan, Jiankang Song in Security and Privacy in Social Networks an… (2021)

  7. Chapter and Conference Paper

    Correction to: Federated Learning for Non-IID Data: From Theory to Algorithm

    In the originally published version of chapter 3 the second affiliation of the author Bojian Wei was incorrect. The second affiliation of the author Bojian Wei has been corrected as “School of Cyber Security, ...

    Bojian Wei, Jian Li, Yong Liu, Wei** Wang in PRICAI 2021: Trends in Artificial Intellig… (2021)

  8. Chapter and Conference Paper

    Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties

    In this work, we show negative results on the tamper-resilience of a wide class of cryptographic primitives with uniqueness properties, such as unique signatures, verifiable random functions, signatures with u...

    Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka in Public-Key Cryptography – PKC 2021 (2021)

  9. Chapter and Conference Paper

    Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages

    Efficient Reed-Solomon code reconstruction algorithms, for example, by Guruswami and Wootters (STOC–2016), translate into local leakage attacks on Shamir secret-sharing schemes over characteristic-2 fields. Ho...

    Hemanta K. Maji, Hai H. Nguyen in Advances in Cryptology – EUROCRYPT 2021 (2021)

  10. Chapter and Conference Paper

    New Lattice Two-Stage Sampling Technique and Its Applications to Functional Encryption – Stronger Security and Smaller Ciphertexts

    This work proposes a new lattice two-stage sampling technique, generalizing the prior two-stage sampling method of Gentry, Peikert, and Vaikuntanathan (STOC ’08). By using our new technique as a key building b...

    Qiqi Lai, Feng-Hao Liu, Zhedong Wang in Advances in Cryptology – EUROCRYPT 2021 (2021)

  11. Chapter and Conference Paper

    Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks

    In this work, we first present general methods to construct information rate-1 PKE that is \(\mathsf {KDM}^{(n)}\) ...

    Qiqi Lai, Feng-Hao Liu, Zhedong Wang in Public-Key Cryptography – PKC 2021 (2021)

  12. Chapter and Conference Paper

    QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model

    Xagawa and Yamakawa (PQCrypto 2019) proved the transformation \(\mathsf {SXY}\) SXY ...

    Xu Liu, Mingqiang Wang in Public-Key Cryptography – PKC 2021 (2021)

  13. Chapter and Conference Paper

    Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing

    The Meet-in-the-Middle (MITM) preimage attack is highly effective in breaking the preimage resistance of many hash functions, including but not limited to the full MD5, HAVAL, and Tiger, and reduced SHA-0/1/2. It...

    Zhenzhen Bao, **aoyang Dong, Jian Guo, Zheng Li in Advances in Cryptology – EUROCRYPT 2021 (2021)

  14. Chapter and Conference Paper

    Correction to: Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays

    In the version of this paper that was originally published, the affiliation of Muqian Chen, Xuebin Wang, Yue Gao, and Can Zhao has been changed to: ‘School of Cyber Security, University of Chinese Academy of S...

    Muqian Chen, Xuebin Wang, **qiao Shi, Yue Gao in Information and Communications Security (2020)

  15. Chapter and Conference Paper

    How Interaction Paradigms Affect User Experience and Perceived Interactivity in Virtual Reality Environment

    Interactivity is one of the major features of virtual reality (VR) comparing with traditional digital devices. Many virtual reality devices and applications provide more than one input instruments for users t...

    Duo Wang, **wei Wang, Qingxiao Zheng in Virtual, Augmented and Mixed Reality. Desi… (2020)

  16. Chapter and Conference Paper

    CHESTNUT: Improve Serendipity in Movie Recommendation by an Information Theory-Based Collaborative Filtering Approach

    The term “serendipity” has been understood narrowly in the Recommender System. Applying a user-centered approach, user-friendly serendipitous recommender systems are expected to be developed based on a good u...

    **angjun Peng, Hongzhi Zhang, **aosong Zhou in Human Interface and the Management of Info… (2020)

  17. Chapter and Conference Paper

    An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums

    Since it was proposed in 2015 as a generalization of integral properties, the division property has evolved into a powerful tool for probing the structures of Boolean functions whose algebraic normal forms are...

    Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang in Advances in Cryptology – ASIACRYPT 2020 (2020)

  18. Chapter and Conference Paper

    Integration Framework of MES Toward Data Security Interoperation

    The core problem of the application of MES (Manufacturing Execution System) in intelligent manufacturing systems is integration, which solves the problem of the data interoperation between the distributed manu...

    Shuangyu Wei, Yuewei Bai, Lai Xu, Hua Mu in Advanced Information Systems Engineering W… (2020)

  19. Chapter and Conference Paper

    Study on User-Centered Usability Elements of User Interface Designs in an Augmented Reality Environment

    In order to complete the augmented reality (AR) user interface (UI) design simply and quickly, the usable factors were studied in this work. The main focus of interface design is to increase usability. Various...

    Un Kim, Yaxi Wang, Wenhao Yuan in Virtual, Augmented and Mixed Reality. Desi… (2020)

  20. Chapter and Conference Paper

    Embedded Security-Critical Device Resource Isolation

    At present, embedded devices have been widely used in people’s daily life, which makes more convenience for the public. However, embedded devices still have security problems, such as automatic driving accide...

    Xuguo Wang, Shengzhe Kan, Yeli Xu in Cyber Security (2020)

previous disabled Page of 72