Skip to main content

previous disabled Page of 16
and
  1. No Access

    Chapter and Conference Paper

    Bookending ARFIS: The Development, Final Results, and Current State of the Academic Reading Format International Study

    The Academic Reading Format International Study (ARFIS) is the largest study conducted to date on tertiary students’ reading format preferences and behaviors

    Diane Mizrachi, Alicia M. Salaz in Information Literacy in a Post-Truth Era (2022)

  2. No Access

    Chapter and Conference Paper

    Voice-Assisted Food Recall Using Voice Assistants

    In this paper, we design a voice-assisted food recall tool that can be implemented on voice assistants of smart speakers and smartphones, enabling frequent, quick, and real-time self-administered food recall. ...

    **aohui Liang, John A. Batsis, **g Yuan in HCI International 2022 – Late Breaking Pap… (2022)

  3. No Access

    Chapter and Conference Paper

    Don’t Tamper with Dual System Encryption

    In related-key attacks (RKA), an attacker modifies a secret key stored in a device by tampering or fault injection and observes the evaluation output of the cryptographic algorithm based on this related key. I...

    Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow in Applied Cryptography and Network Security (2022)

  4. No Access

    Chapter and Conference Paper

    The Use of Structuration Theory in Empirical Information Systems Research: A Systematic Literature Review

    Structuration Theory (ST) is increasingly used in the field of Information Systems (IS) and has been widely cited by IS researchers

    Khando Khando, M. Sirajul Islam, Shang Gao in The Role of Digital Technologies in Shapin… (2022)

  5. No Access

    Chapter and Conference Paper

    Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection

    Securing communication networks has become increasingly important due to the growth in cybersecurity attacks, such as ransomware and denial of service attacks. In order to better observe, detect and track atta...

    Siqi **a, Sutharshan Rajasegarar, Christopher Leckie in Network and System Security (2022)

  6. No Access

    Chapter and Conference Paper

    Reducing Intrusion Alert Trees to Aid Visualization

    Cyber defense tools, such as intrusion detection systems, often produce huge amounts of alerts which must be parsed for defensive purposes, particularly cyber triage. In this paper, we utilize the notion of alert...

    Eric Ficke, Raymond M. Bateman, Shouhuai Xu in Network and System Security (2022)

  7. No Access

    Chapter and Conference Paper

    Deep Learning for Accurate Corner Detection in Computer Vision-Based Inspection

    This paper describes application of deep learning for accurate detection of corner points in images and its application for an inspection system developed for the worker training and assessment. In our local b...

    M. Fikret Ercan, Ricky Ben Wang in Computational Science and Its Applications – ICCSA 2021 (2021)

  8. No Access

    Chapter and Conference Paper

    Access Control Encryption from Group Encryption

    Access control encryption (ACE) enforces both read and write permissions. It kills off any unpermitted subliminal message channel via the help of a sanitizer who knows neither of the plaintext, its sender and ...

    **uhua Wang, Harry W. H. Wong in Applied Cryptography and Network Security (2021)

  9. No Access

    Chapter and Conference Paper

    Usability Assessment of the **aoAi Touch Screen Speaker

    With the development of modern economy and technology, people's living standards are constantly improving, and more intelligent products have come into people's vision. People's requirements for product availa...

    Naixin Liu, Shuyue Li, Wang **ang, Yue Xu in Design, User Experience, and Usability: D… (2021)

  10. No Access

    Chapter and Conference Paper

    A Review on Visualization of Educational Data in Online Learning

    Higher educational institutions capture huge amounts of educational data, especially in online learning. Data mining techniques have shown promises to interpret these data using different patterns . However, u...

    M. Ali Akber Dewan, Walter Moreno Pachon, Fuhua Lin in Learning Technologies and Systems (2021)

  11. No Access

    Chapter and Conference Paper

    Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps

    Severe consequences in volume leakage (subject to the conditions required by specific attacks) stimulate a new research direction (Eurocrypt 2019) of volume-hiding structured encryption (

    Jiafan Wang, Sherman S. M. Chow in Data and Applications Security and Privacy XXXV (2021)

  12. No Access

    Chapter and Conference Paper

    Education 4.0: Gaps Research Between School Formation and Technological Development

    Industry constantly changes following technological developments and innovation, resulting in changes in productivity, the labor market and education. As a result of this new industrial revolution, developed t...

    José S. da Motta Reis, Ana C. Ferreira Costa in 17th International Conference on Informati… (2020)

  13. Chapter and Conference Paper

    Multi-client Oblivious RAM with Poly-logarithmic Communication

    Oblivious RAM enables oblivious access to memory in the single-client setting, which may not be the best fit in the network setting. Multi-client oblivious RAM (MCORAM) considers a collaborative but untrusted ...

    Sherman S. M. Chow, Katharina Fech in Advances in Cryptology – ASIACRYPT 2020 (2020)

  14. No Access

    Chapter and Conference Paper

    VisDrone-MOT2020: The Vision Meets Drone Multiple Object Tracking Challenge Results

    The Vision Meets Drone (VisDrone2020) Multiple Object Tracking (MOT) is the third annual UAV MOT tracking evaluation activity organized by the VisDrone team, in conjunction with European Conference on Computer...

    Heng Fan, Dawei Du, Longyin Wen, Pengfei Zhu in Computer Vision – ECCV 2020 Workshops (2020)

  15. No Access

    Chapter and Conference Paper

    Stargazing in the Dark: Secure Skyline Queries with SGX

    Skylining for multi-criteria decision making is widely applicable and often involves sensitive data that should be encrypted, especially when the database and query engine are outsourced to an untrusted cloud ...

    Jiafan Wang, Minxin Du, Sherman S. M. Chow in Database Systems for Advanced Applications (2020)

  16. Chapter and Conference Paper

    Estimating Quantum Speedups for Lattice Sieves

    Quantum variants of lattice sieve algorithms are routinely used to assess the security of lattice based cryptographic constructions. In this work we provide a heuristic, non-asymptotic, analysis of the cost of...

    Martin R. Albrecht, Vlad Gheorghiu in Advances in Cryptology – ASIACRYPT 2020 (2020)

  17. No Access

    Chapter and Conference Paper

    Follow the Blue Bird: A Study on Threat Data Published on Twitter

    Open Source Intelligence (OSINT) has taken the interest of cybersecurity practitioners due to its completeness and timeliness. In particular, Twitter has proven to be a discussion hub regarding the latest vuln...

    Fernando Alves, Ambrose Andongabo, Ilir Gashi in Computer Security – ESORICS 2020 (2020)

  18. No Access

    Chapter and Conference Paper

    Bot Log Mining: Using Logs from Robotic Process Automation for Process Mining

    Robotic Process Automation (RPA) is an emerging technology for automating tasks using bots that can mimic human actions on computer systems. Most existing research focuses on the earlier phases of RPA implemen...

    Andreas Egger, Arthur H. M. ter Hofstede, Wolfgang Kratsch in Conceptual Modeling (2020)

  19. No Access

    Chapter and Conference Paper

    Increasing the Efficiency of GPU Bitmap Index Query Processing

    Once exotic, computational accelerators are now commonly available in many computing systems. Graphics processing units (GPUs) are perhaps the most frequently encountered computational accelerators. Recent wor...

    Brandon Tran, Brennan Schaffner, Jason Sawin in Database Systems for Advanced Applications (2020)

  20. No Access

    Chapter and Conference Paper

    Position: GDPR Compliance by Construction

    New laws such as the European Union’s General Data Protection Regulation (GDPR) grant users unprecedented control over personal data stored and processed by businesses. Compliance can require expensive manual...

    Malte Schwarzkopf, Eddie Kohler in Heterogeneous Data Management, Polystores,… (2019)

previous disabled Page of 16