![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Research on General Automatic Test Platform for Onboard Automatic Train Protection
Traditional train control systems experience problems such as low efficiency, tedious operation, high labor costs, poor visibility, and difficulty in designing and maintaining test cases during manual function...
-
Chapter and Conference Paper
Transpose and Mask: Simple and Effective Logit-Based Knowledge Distillation for Multi-attribute and Multi-label Classification
Knowledge distillation (KD) improves a student network by transferring knowledge from a teacher network. Although KD has been extensively studied in single-labeled image classification, it is not well explored...
-
Chapter and Conference Paper
Automatic Search of Linear Structure: Applications to Keccak and Ascon
The linear structure technique was developed by Guo et al. at ASIACRYPT 2016, notably boosting the preimage attacks on Keccak. This technique transforming the preimage attack into solving algebraic systems allows...
-
Chapter and Conference Paper
Frame Correlation Knowledge Distillation for Gait Recognition in the Wild
Recently, large deep models have achieved significant progress on gait recognition in the wild. However, such models come with a high cost of runtime and computational resource consumption. In this paper, we i...
-
Chapter and Conference Paper
Research on Cloud Office Resource Allocation Algorithm Based on Correction Weight PSO
With the development of science and technology, cloud computing technology has changed people's office methods. People begin to use cloud services to realize remote collaborative office, which can save costs a...
-
Chapter and Conference Paper
Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3
In this work, we focus on collision attacks against instances of SHA-3 hash family in both classical and quantum settings. Since the 5-round collision attacks on SHA3-256 and other variants proposed by Guo et al.
-
Chapter and Conference Paper
Rebound Attacks on \(\textsf{SKINNY}\) Hashing with Automatic Tools
In ToSC’20, a new approach combining Mix-Integer Linear Programming (MILP) tool and Constraint Programming (CP) tool to search for boomerang distinguishers is proposed and later used for rebound attack in ASIA...
-
Chapter and Conference Paper
Few-Shot Knowledge Graph Entity Ty**
Knowledge graph entity ty**, which is an important way to complete knowledge graphs (KGs), aims at predicting the associating type of certain given entities without any external knowledge. However, previous ...
-
Chapter and Conference Paper
IPE Transformer for Depth Completion with Input-Aware Positional Embeddings
In contrast to traditional transformer blocks using a set of pre-defined parameters as positional embeddings, we propose the input-aware positional embedding (IPE) which is dynamically generated according to t...
-
Chapter and Conference Paper
Evaluation of Relationship Quality Within Dyads Through the Performance in Dual-Player Cooperative Tasks
Human beings are influenced widely by relationship among individuals. However, there is still a lack of a systematic, objective and direct way to assess the quality of relationships within dyads. The current s...
-
Chapter and Conference Paper
A Reliable Voice Perceptual Hash Authentication Algorithm
In order to protect the authenticity and integrity of voice, this paper proposes a reliable voice perceptual hash authentication algorithm. This algorithm considers the dynamic characteristics of voice signals...
-
Chapter and Conference Paper
An Automated Aggressive Posterior Retinopathy of Prematurity Diagnosis System by Squeeze and Excitation Hierarchical Bilinear Pooling Network
Aggressive Posterior Retinopathy of Prematurity (AP-ROP) is a special type of Retinopathy of Prematurity (ROP), which is one of the most common childhood blindness that occurs in premature infants. AP-ROP is u...
-
Chapter and Conference Paper
Characterization and Linear-Time Recognition of Paired Threshold Graphs
In a paired threshold graph, each vertex has a weight, and two vertices are adjacent if and only if their weight sum is large enough and their weight difference is small enough. It generalizes threshold graphs...
-
Chapter and Conference Paper
Aggressive Posterior Retinopathy of Prematurity Automated Diagnosis via a Deep Convolutional Network
Aggressive Posterior Retinopathy of Prematurity (AP-ROP) is a retinal pathology characterized by severe vasodilation and distortion of the posterior pole of the retina. It may lead to blindness if it is not di...
-
Chapter and Conference Paper
Automated Stage Analysis of Retinopathy of Prematurity Using Joint Segmentation and Multi-instance Learning
Retinopathy of prematurity (ROP) is the primary cause of childhood blindness. Prior works have demonstrated the remarkable performances of deep learning (DL) in detecting plus disease and classification betwee...
-
Chapter and Conference Paper
Retinopathy Diagnosis Using Semi-supervised Multi-channel Generative Adversarial Network
Various kinds of retinopathy are the leading causes of blindness in human being, and with the rapid development of fundus images (FI) analysis in recent years, deep learning has became the focus while using Co...
-
Chapter and Conference Paper
SQL Injection Behavior Mining Based Deep Learning
SQL injection is a common network attack. At present, filtering methods are mainly used to prevent SQL injection, yet risks of incomplete filtering still remains. By deep learning, we detect whether the user b...
-
Chapter and Conference Paper
A Novel Image Encryption Scheme Based on Hidden Random Disturbance and Feistel RPMPFrHT Network
In this paper, we propose a novel image encryption scheme based on hidden random disturbance and Feistel RPMPFrHT network, which can improve some common defects of the transform-based methods. At first, we hid...
-
Chapter and Conference Paper
Natural Interaction in Video Image Investigation and Its Evaluation
Video image investigation has become an important way to protect the public security. Traditional paper-based investigation method lacks of natural interactive tools to organize case and clue information, lead...
-
Chapter and Conference Paper
Android Stack Machine
In this paper, we propose Android Stack Machine (ASM), a formal model to capture key mechanisms of Android multi-tasking such as activities, back stacks, launch modes, as well as task affinities. The model is ...