![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Image-Enhanced Multi-Modal Representation for Local Topic Detection from Social Media
Detecting local topics from social media is an important task for many applications, ranging from event tracking to emergency warning. Recent years have witnessed growing interest in leveraging multi-modal soc...
-
Chapter and Conference Paper
PLVCG: A Pretraining Based Model for Live Video Comment Generation
Live video comment generating task aims to automatically generate real-time viewer comments on videos like real viewers do. Like providing search suggestions by search engines, this task can help viewers find ...
-
Chapter and Conference Paper
Leveraging Knowledge Context Information to Enhance Personalized Recommendation
Knowledge graphs (KGs) have proven to be effective to improve the performance of recommendation. However, with the tremendous increase of users and items, existing methods still face several challenging proble...
-
Chapter and Conference Paper
SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks
In recent years, cache attacks against micro architectures have posed a daunting threat to modern processors such as x86 and ARM. Of the attacks, flush-based cache attacks have attracted increasing attention f...
-
Chapter and Conference Paper
Multiple Demographic Attributes Prediction in Mobile and Sensor Devices
Users’ real demographic attributes is impressively useful for intelligent marketing, automatic advertising and human-computer interaction. Traditional method on attribute prediction make great effort on the st...
-
Chapter and Conference Paper
PrivRec: User-Centric Differentially Private Collaborative Filtering Using LSH and KD
The collaborative filtering (CF)-based recommender systems provide recommendations by collecting users’ historical ratings and predicting their preferences on new items. However, this inevitably brings privacy...
-
Chapter and Conference Paper
Local Topic Detection Using Word Embedding from Spatio-Temporal Social Media
Local topic detection from spatio-temporal social media (e.g. Twitter) plays an important role in many applications, therefore, it has attracted a surge of research attention in recent years. However, most exi...
-
Chapter and Conference Paper
Knowledge Graph Embedding with Order Information of Triplets
Knowledge graphs (KGs) are large scale multi-relational directed graph, which comprise a large amount of triplets. Embedding knowledge graphs into continuous vector space is an essential problem in knowledge e...
-
Chapter and Conference Paper
Perceiving Topic Bubbles: Local Topic Detection in Spatio-Temporal Tweet Stream
Local topic detection is an important task for many applications such as local event discovery, activity recommendation and emergency warning. Recent years have witnessed growing interest in leveraging spatio-...
-
Chapter and Conference Paper
Study on the Influence of Impermeable Membrane’s Blanket Length on the Seepage of a Dam
Geotechnical membrane is often used in dam engineering to prevent the seepage. But the research of the influence of impervious membrane on the seepage of a dam is not enough. Combining the indoor model experim...
-
Chapter and Conference Paper
Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC
With the rapid development of IoT devices in the direction of multifunction and personalization, All Programmable SoC has been used more and more frequently because of its unrivaled levels of system performanc...
-
Chapter and Conference Paper
A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers
The key whitening is a technique intended to enhance the strength of a block cipher. Although some research work involves DPA attacks against the key whitening layer in the compact architecture, there are no l...
-
Chapter and Conference Paper
Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme—Presenting Four Non-profiled Attacks
Improved Rotating S-box Masking (RSM2.0 for short) is a well-known countermeasure designed and implemented by DPA Contest V4.2 committee to provide security protection for AES-128. By combining both 1st-order ...
-
Chapter and Conference Paper
Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields
In resource-constrained applications, elliptic curve cryptography (ECC) is preferable for the property of shorter key size with comparable security. Binary extension fields are usually used for area-optimized ...
-
Chapter and Conference Paper
QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations
Dual-Rail Precharge Logic (DPL) has proven to be an effective countermeasure logic style against Differential Power Analysis (DPA). All previous DPL architectures employ the precharge mechanism to achieve DPA ...
-
Chapter and Conference Paper
A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm
Side Channel Analysis (SCA), which has gained wide attentions during the past decade, has arisen as one of the most critical metrics for the cryptographic algorithm security evaluation. Typical SCA analyzes th...