![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Recognition of score words in freestyle kayaking using improved DTW matching
Voice is the most natural information carrier for human beings, and is likely to become the main method of human–computer interaction in the future. This article focuses on the recognition of score words in fr...
-
Article
Driver fatigue detection and human-machine cooperative decision-making for road scenarios
Driver fatigue detection and human-machine cooperative decision-making are key issues in intelligent transportation systems. The proposed method consists of two main stages.In the first stage, we propose an im...
-
Article
Relaxed support vector based dictionary learning for image classification
Discriminative dictionary learning (DDL) has attracted significant attention in the field of image classification. To enhance the classification performance, most existing discriminative dictionary learning me...
-
Chapter and Conference Paper
Automatic Search of Linear Structure: Applications to Keccak and Ascon
The linear structure technique was developed by Guo et al. at ASIACRYPT 2016, notably boosting the preimage attacks on Keccak. This technique transforming the preimage attack into solving algebraic systems allows...
-
Chapter and Conference Paper
Spatial Feature Regularization and Label Decoupling Based Cross-Subject Motor Imagery EEG Decoding
Motor imagery (MI) serves as a vital approach to constructing brain-computer interfaces (BCIs) based on electroencephalogram (EEG) signals. However, the time-variant and label-coupling characteristics of EEG s...
-
Chapter and Conference Paper
An Erase Code Based Collaborative Storage Method in RFID Systems
Ensuring the safe and reliable storage of important data under limited storage resources is an important challenge faced by RFID systems. Cooperative storage technology based on network coding can divide the t...
-
Chapter and Conference Paper
Efficient Point-Based Single Scale 3D Object Detection from Traffic Scenes
In the field of 3D object detection, the point-based method faces significant limitations due to the need to process large-scale collections of irregular point clouds, resulting in reduced inference speed. To ...
-
Chapter and Conference Paper
A PUF Based Audio Fingerprint Based for Device Authentication and Tamper Location
As bioinformation authentication gains prominence, the significance of audio data in industries such as speech recognition intensifies, with audio storage becoming a pivotal concern for data protection. Existi...
-
Chapter and Conference Paper
3RE-Net: Joint Loss-REcovery and Super-REsolution Neural Network for REal-Time Video
Real-time video over the Internet suffers from packet loss and low network bandwidth. The receiving side may receive down-sampled video with damaged frames. In this work, we are motivated to enhance the qualit...
-
Chapter and Conference Paper
Evaluating the Security of CRYSTALS-Dilithium in the Quantum Random Oracle Model
In the wake of recent progress on quantum computing hardware, the National Institute of Standards and Technology (NIST) is standardizing cryptographic protocols that are resistant to attacks by quantum adversa...
-
Article
Faster-FIIS-GMS: a novel object detection framework for instance search
Visual sensors are widely deployed in many promising detection fields, such as precision measurement, visual object detection and search. Instance search is a special object search method based on visual senso...
-
Article
Zero-reference single underwater image enhancement
Underwater images play an essential role in acquiring and analyzing underwater information. Autonomous Underwater Vehicles (AUVs) highly rely on the quality of the captured underwater images, in order to carry...
-
Article
I2I translation model based on CondConv and spectral domain realness measurement: BCS-StarGAN
In recent years, the research on the Image-to-Image(I2I) translation based on Generative Adversarial Networks has received extensive attention from both industry and academia, and relevant research results hav...
-
Article
Reversible multi-watermarking for color images with grayscale invariance
As a special way of hiding information, reversible data hiding is mostly used to embed data into digital multimedia. The original multimedia and embedded data can be restored from the watermarked one without a...
-
Article
Feature constraint reinforcement based age estimation
As one of the critical biological characteristics of human age, the face has been widely studied for age prediction, which has broad application prospects in the fields of commerce, security, entertainment, et...
-
Article
Effective low-light image enhancement with multiscale and context learning network
Convolutional Neural Network (CNN) has been widely used in low-light image enhancement task, and has achieved good enhancement results. However, the enhancement results not only are limited by the convolution ...
-
Article
Towards a multimodal human activity dataset for healthcare
Human activity recognition (HAR) based on wearable devices has become a hot topic due to the wide adoption of smartphones and smart bands. In this paper, we propose a new dataset, MMC-PCL-Activity, for wearabl...
-
Chapter and Conference Paper
Design of Financial Modeling System Based on Decision Tree Analysis
The design of financial modeling system is based on decision tree analysis. The main objective of this analysis is to determine the best portfolio of investors and choose the best investment strategy. The proc...
-
Chapter
Incentivizing Platform-Users with Win-Win Effects
To ensure the effectiveness of crowdsensing, it is of vital importance to incentivize the interactions of participants and platforms. However, existing approaches are incapable of personalized bidding (PB), i.e.,...
-
Chapter
Data Transmission Empowered by Edge Computing
Intelligent Transportation Systems (ITSs) have been applied in a wide range to provide traffic sensing data for various smart traffic applications. However, the missing data, which is inevitable and ubiquitous...