1,096 Result(s)
-
Chapter and Conference Paper
An Ancient Murals Inpainting Method Based on Bidirectional Feature Adaptation and Adversarial Generative Networks
To address the issue of varying degrees of damage in ancient Chinese murals due to their age and human-induced destruction, we propose a mural image restoration method based on bidirectional feature adaptation...
-
Chapter and Conference Paper
Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem)
Secret sharing schemes are used as a tool in many cryptographic protocols including revocable electronic cash, electronic voting, cloud computing and key management in sensor networks. But the existing post-qu...
-
Chapter and Conference Paper
Improvement of an Identity-Based Aggregate Signature Protocol from Lattice
In 2022, Li et al. [1] proposed a quantum secure and non-interactive identity-based aggregate signature protocol from lattices. In the end of their paper, they claimed that their scheme has key escrow problem. Ba...
-
Chapter and Conference Paper
End-to-End Optical Music Recognition with Attention Mechanism and Memory Units Optimization
Optical Music Recognition (OMR) is a research field aimed at exploring how computers can read sheet music in music documents. In this paper, we propose an end-to-end OMR model based on memory units optimizatio...
-
Chapter and Conference Paper
Power of Randomness Recovery: Tighter CCA-Secure KEM in the QROM
We propose a novel, efficient and secure Key Encapsulation Mechanism (KEM) transformation in the random oracle model. Furthermore, we demonstrate its security in the Quantum Random Oracle Model (QROM) as intro...
-
Chapter and Conference Paper
A Research on the Manchu-Chinese Bilingual Comparative Characteristics of the Yu Zhi Zeng Ding Qing Wen Jian Dictionary
Yu Zhi Zeng Ding Qing Wen Jian was the first official Manchu-Chinese bilingual dictionary of the Qing Dynasty. It added Chinese translation to the entries, employed Chinese characters to indicate the pronunciatio...
-
Chapter and Conference Paper
Performance Analysis of Maximum-Likelihood Decoding of Polar Codes
In space communication, effective channel coding schemes and decoding algorithms are essential for reliable communication. As the standard coding scheme for 5G enhanced Mobile Broadband (eMBB) control channels...
-
Chapter and Conference Paper
College Student Mental Health Analysis Based on Machine Learning Algorithm
The role of mental health in college students is very important, but there is a problem of low accuracy. In the past, psychological evaluation methods could not solve the problem of mental health evaluation am...
-
Chapter and Conference Paper
A Multi-modality Driven Promptable Transformer for Automated Parapneumonic Effusion Staging
Pneumonia is a prevalent disease, and some pneumonia patients develop parapneumonic effusion. Among patients with pneumonia, the mortality rate of patients with parapneumonic effusion is higher than that of pa...
-
Chapter and Conference Paper
LATrans-Unet: Improving CNN-Transformer with Location Adaptive for Medical Image Segmentation
Convolutional Neural Networks (CNNs) and Vision Transformers (ViTs) have been widely employed in medical image segmentation. While CNNs excel in local feature encoding, their ability to capture long-range depe...
-
Chapter and Conference Paper
Multi-scale Contrastive Learning for Building Change Detection in Remote Sensing Images
Self-supervised contrastive learning (CL) methods can utilize large-scale label-free data to mine discriminative feature representations for vision tasks. However, most existing CL-based approaches focus on im...
-
Chapter and Conference Paper
Dynamic GNNs for Precise Seizure Detection and Classification from EEG Data
Diagnosing epilepsy requires accurate seizure detection and classification, but traditional manual EEG signal analysis is resource-intensive. Meanwhile, automated algorithms often overlook EEG’s geometric and ...
-
Chapter and Conference Paper
Pseudorandom Isometries
We introduce a new notion called \({\mathcal {Q}}\) Q -secure pseudorandom i...
-
Chapter and Conference Paper
Camouflaged Object Detection via Global-Edge Context and Mixed-Scale Refinement
Camouflage object detection (COD), trying to segment objects that blend perfectly with the surrounding environment, is challenging and complex in real-world scenarios. However, existing deep learning methods o...
-
Chapter and Conference Paper
Research on Fabric Defect Detection Technology Based on RDN-LTE and Improved DINO
In order to solve the problem of detecting various types of complex fabric defects such as different scale sizes, high fusion with the background and extreme aspect ratios generated in actual production enviro...
-
Chapter and Conference Paper
Multi-GPU Parallel Pipeline Rendering with Splitting Frame
In order to achieve real-time rendering of cloud gaming, a large amount of computing resources of graphics processing units (GPU) are required. In this paper, we propose a multi-GPU parallel pipeline rendering...
-
Chapter and Conference Paper
Neural HD Map Generation from Multiple Vectorized Tiles Locally Produced by Autonomous Vehicles
High-definition (HD) map is a fundamental component of autonomous driving systems, as it can provide precise environmental information about driving scenes. Recent work on vectorized map generation could produ...
-
Chapter and Conference Paper
Research of Virtual Try-On Technology Based on Two-Dimensional Image
Virtual try-on based on two-dimensional image refers to trying on the target clothing on a human image to generate the final fitting image. In order to solve the problems of blurred human images, body parts mi...
-
Chapter and Conference Paper
Relation-Guided Multi-stage Feature Aggregation Network for Video Object Detection
Video object detection task has received extensive research attention and various methods have been proposed. The quality of single frame in the original video is usually deteriorated by motion blur and object...
-
Chapter and Conference Paper
Comments on a Blockchain-Based Dynamic and Traceable Data Integrity Verification Scheme
Recently, Chen et al. designed a new data structure called linear probing Merkle hash tree (LP-MHT). They adopted LP-MHT and RSA-based homomorphic verifiable tags to propose a blockchain-based dynamic and trac...