Advanced Research on Computer Science and Information Engineering
International Conference, CSIE 2011, Zhengzhou, China, May 21-22, 2011, Proceedings, Part II
Chapter and Conference Paper
Functional encryption is a novel form of public key encryption that has captured significant attention since its inception, with researchers proposing a series of theoretical constructions. Functional encrypti...
Article
The Part-Of-Speech tagging is widely used in the natural language process. There are many statistical approaches in this area. The most popular one is Hidden Markov Model. In this paper, an alternative approac...
Chapter and Conference Paper
Federated learning has received widespread attention in recent years, since it trains a model by only sharing gradients without accessing training sets. In this paper, we consider two security issues in the tr...
Chapter and Conference Paper
Due to poor imaging conditions, large-scale underwater images need the consistency enhancement. According to the subset-guided consistency enhancement evaluation criterion, the existing subset selection method...
Article
Random grid (RG) is an alternative approach to realize a visual secret sharing (VSS) scheme. RG-based VSS has merits such as no pixel expansion and no tailor-made matrix requirement. Recently, many investigati...
Article
The Quick Response (QR) code is designed for information storage recognizable by machine vision. With the popularity of QR code applications, the security of QR codes becomes hot issues concerned by many schol...
Article
Two visual models of image secret sharing have been studied: visual cryptography schemes (VCS), introduced by Naor and Shamir, and visual cryptograms of random grids (VCRG), introduced by Kafri and Keren. VCRG...
Article
The most essential advantage of applying linear algebra to construct visual cryptography scheme (VCS) lies in that it only requires solving linear equations in the construction of initial basis matrices, which...
Article
A visual cryptography scheme (VCS) can be realized by Boolean operations OR and XOR, respectively. The monotone property of OR operation reduces the visual quality of recovered image. To overcome this problem,...
Article
The multi-secret visual cryptography scheme (MVCS) allows for the encryption of multiple secret images into a given image area. The previous works on MVCS with probabilistic contrast can not guarantee that eve...
Article
The conventional straightforward relaying scheme named decode-and-forward (DF) protocol is used at relay to decode the data received from source and forward the decoded data to the destination to improve the s...
Chapter and Conference Paper
In This paper, we present a generative model to measure the graph similarity, assuming that an observed graph is generated from a template by a Markov random field. The potentials of this random process are ch...
Book and Conference Proceedings
International Conference, CSIE 2011, Zhengzhou, China, May 21-22, 2011, Proceedings, Part II
Book and Conference Proceedings
International Conference, CSIE 2011, Zhengzhou, China, May 21-22, 2011. Proceedings, Part I
Chapter and Conference Paper
Minimizing computing energy consumption has many benefits, such as environment protection, cost savings, etc. An important research problem is the energy aware task scheduling for cloud computing. For many div...
Article
In this paper, we develop a new joint carrier frequency offset (CFO) and channel estimation algorithm for Amplify-and-Forward (AF) cooperative (CO)-OFDM systems. An expanded Basis Expansion Model (E-BEM) is pr...