![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Invisible backdoor learning in regional transform domain
The rapid develo** deep learning is highly required by resources and computing resources, which easily leads to backdoor learnings. It is difficult for existing schemes to strike a balance among trigger conc...
-
Article
Removable Edges in Claw-Free Bricks
An edge e in a matching covered graph G is removable if \(G-e\) G
-
Article
Effective Detection of Cu(II) Ions Based on Carbon Dots@Exfoliated Layered Double Hydroxides Composites Fluorescence Probe
A series of carbon dots@exfoliated layered double hydroxides (CDs@LDH) composites were hydrothermally fabricated by Mg/Al LDH and formamide. The results of FTIR, UV-vis, and XPS spectra in company with HRTEM i...
-
Chapter and Conference Paper
Backdoor Learning on Siamese Networks Using Physical Triggers: FaceNet as a Case Study
Deep learning models play an important role in many real-world applications, for example, in face recognition systems, Siamese networks have been widely used. Their security issues have attracted increasing at...
-
Article
Open AccessDomestic Violence among LGBT + People in China: Results from a national court rulings review
Domestic violence has been an emerging area of study in recent decades for lesbians, gay men, bisexuals, and transgender people (LGBT +). While some research discussed domestic violence among LGBT + couples in...
-
Article
Two Completely Independent Spanning Trees of \(P_4\) -Free Graphs
A graph without induced subgraphs isomorphic to a path of length 3 is \(P_4\) P ...
-
Article
Pedicled Omental Transposition for Recurrent Skin Erosion Following Deep Brain Stimulation Without Hardware Removal
Skin erosion is a common skin-related complication in patients underwent deep brain stimulation. Traditionally, treatment of these skin-related complications has required removal of the entire deep brain stimu...
-
Article
Preparation of Eu(III) Complexes Containing Maleopimaric Acid Anhydride with Ultra-narrow and Efficient Fluorescence Emission for High Determination on Gallic Acid in Acetonitrile Solution
Two novel Eu(III) complexes constructed by maleopimaric acid anhydride (MPA) and 2,2'-bipyridyl (Bpy) / 1, 10-phenanthroline (Phen), named as MPA-Bpy-Eu / MPA-Phen-Eu, have been synthesized by a one-step preci...
-
Article
Open AccessThe epidemiological characteristic and trends of burns globally
Burns is a type of injury, caused by unintentional exposure to substances of high temperature, including hot liquid, solid, and objects radiating heat energy, placing a high burden not only on patients’ famili...
-
Article
Open AccessA Heuristic Local-sensitive Program-Wide Diffing Method for IoT Binary Files
Code reuse brings vulnerabilities in third-party library to many Internet of Things (IoT) devices, opening them to attacks such as distributed denial of service. Program-wide binary diffing technology can help...
-
Article
Open AccessVulnerability-oriented directed fuzzing for binary programs
Directed greybox fuzzing (DGF) is an effective method to detect vulnerabilities of the specified target code. Nevertheless, there are three main issues in the existing DGFs. First, the target vulnerable code o...
-
Chapter and Conference Paper
Generative Text Steganography via Multiple Social Network Channels Based on Transformers
Generative text steganography uses the conditional probability to encode the candidate words when generating tokens by language model, and then selects the corresponding word to output according to the secret ...
-
Article
Influence of Loading Conditions on the Residual Flexural Capacity of Reinforced Concrete T-beams after Fire Exposure
To explore the influence of the loading conditions and fire exposure time on the residual mechanical properties of concrete T-beams, 10 concrete T-shaped beams were designed and manufactured. Three levels of l...
-
Article
BAT: real-time inaudible sound capture with smartphones
People tend to store important information on air-gapped devices and believe that the information is safe. But in recent years, more and more methods have been proposed to exfiltrate information from an air-ga...
-
Article
Open AccessConstruction and validation of nomogram to predict distant metastasis in osteosarcoma: a retrospective study
Osteosarcoma is most common malignant bone tumors. OS patients with metastasis have a poor prognosis. There are few tools to assess metastasis; we want to establish a nomogram to evaluate metastasis of osteosa...
-
Article
Open AccessImage quality of automatic coronary CT angiography reconstruction for patients with HR ≥ 75 bpm using an AI-assisted 16-cm z-coverage CT scanner
Coronary CT angiography (CCTA) is a complicated CT exam in comparison to other CT protocols. Exam success highly depends on image assessment of experienced radiologist and the procedure is often time-consuming...
-
Article
Migrated hybrid turbidite-contourite channel-lobe complex of the late Eocene Rovuma Basin, East Africa
Analysis of 3D seismic data and well log data from the Rovuma Basin in East Africa reveals the presence of a late Eocene channel-lobe complex on its slope. The first two channels, denoted as channel-1 and chan...
-
Article
A buried submarine canyon in the northwestern South China Sea: architecture, development processes and implications for hydrocarbon exploration
High-resolution multichannel seismic data enables the discovery of a previous, undocumented submarine canyon (Huaguang Canyon) in the Qiongdongnan Basin, northwestern South China Sea. The Huaguang Canyon with ...
-
Chapter
Tissue Repair and Regeneration Disorders: Repair and Regeneration of Chronic Refractory Wounds
Chronic refractory wounds (commonly known as ulcers) can be formed by many reasons. The International Society for Wound Healing defines it as a wound that fails to achieve anatomical and functional integrity a...
-
Chapter and Conference Paper
Construction-Based Secret Image Sharing
Most secret image sharing (SIS) schemes output noise-like shadows and are fragile to any noise due to their restoring methods are based on mathematical operations. A noise-like shadow increases the suspicion o...