![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessFeature selection strategies: a comparative analysis of SHAP-value and importance-based methods
In the context of high-dimensional credit card fraud data, researchers and practitioners commonly utilize feature selection techniques to enhance the performance of fraud detection models. This study presents ...
-
Article
Open AccessAmplitude-modulated EM side-channel attack on provably secure masked AES
Recently a new type of side channels was discovered, called amplitude-modulated electromagnetic (EM) emanations from mixed-signal circuits. Unlike power analysis or near field EM analysis, attacks based on amp...
-
Article
Open AccessHarmfulness metrics in digital twins of social network rumors detection in cloud computing environment
Social network rumor harm metric is a task to score the harm caused by a rumor by analyzing the spreading range of the rumor, the users affected, the repercussions caused, etc., and then the harm caused by the...
-
Article
Open AccessData reduction techniques for highly imbalanced medicare Big Data
In the domain of Medicare insurance fraud detection, handling imbalanced Big Data and high dimensionality remains a significant challenge. This study assesses the combined efficacy of two data reduction techni...
-
Article
Open AccessExplainable machine learning models for Medicare fraud detection
As a means of building explainable machine learning models for Big Data, we apply a novel ensemble supervised feature selection technique. The technique is applied to publicly available insurance claims data f...
-
Article
Examining the applications of intelligent tutoring systems in real educational contexts: A systematic literature review from the social experiment perspective
Intelligent Tutoring Systems (ITSs) have a great potential to effectively transform teaching and learning. As more efforts have been put on designing and develo** ITSs and integrating them within learning an...
-
Article
Open AccessTandem Deep Learning Side-Channel Attack on FPGA Implementation of AES
Side-channel attacks have become a realistic threat to implementations of cryptographic algorithms, especially with the help of deep-learning techniques. The majority of recently demonstrated deep-learning sid...
-
Article
Open AccessInvestigating feedback implemented by instructors to support online competency-based learning (CBL): a multiple case study
Instructional feedback has the power to enhance learning. However, learners do not always feel satisfied with their feedback experience. Simultaneously, little attention has been paid on investigating how feed...
-
Chapter and Conference Paper
Study on Restoration-Oriented Digital Visualization for Architectural Trim-Work of Guanlan Hall in Yuanming Yuan
Today computing techniques and sophisticated digital tools are changing architectural heritage, conservation and restoration. In this paper, we study the historical architecture of the Yuanming Yuan imperial G...
-
Chapter and Conference Paper
Urban Interaction Design Supports Modular Design Practice for Urban Public Space
Multiple-dimensional structured urban space directs to an inter-disciplinary considers on public space utilization. The people-users are consciously and unconsciously in the communicative activities with the c...
-
Chapter and Conference Paper
Automated Segmentation of Intervertebral Disc Using Fully Dilated Separable Deep Neural Networks
Accurate segmentation of intervertebral discs is a critical task in clinical diagnosis and treatment. Despite recent progress in applying deep learning to the segmentation of multiple natural image scenarios, ...
-
Chapter and Conference Paper
Bridge the Physical and Virtual Design for Hutongs - Creative Design Supports Hutongs Community Participation
In the context of the urban renovation process, hutong community has become the focus of creative design in Bei**g, and there have been practical cases of hutongs that can improve public participation and acc...
-
Chapter and Conference Paper
Erratum to: Speech Authentication and Recovery Scheme in Encrypted Domain
-
Article
Open AccessC2MP: Chebyshev chaotic map-based authentication protocol for RFID applications
Radio frequency identification (RFID) is a promising wireless sensor technology in the Internet of Things and can be applied for object identification. However, the security issues are still open challenges an...
-
Chapter and Conference Paper
Retraction Note to: A Situation-Aware Method Based on Ontology Analysis of the Semantic Social Network
The authors have retracted this chapter [1] because the method described in the chapter is based on the wrong data set, which means that the experimental results cannot be reproduced. All authors agree with th...
-
Chapter and Conference Paper
Road Detection Based on Image Boundary Prior
As for vision based road detection, most of color based methods use a center-lower region as a “safe” road region to model road appearance. However, this region heavily relies on the pose of ego-vehicle. Color...
-
Chapter and Conference Paper
An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation
An extended multi-secret images scheme based on Boolean operation is proposed, which is used to encrypt secret images with different dimensions to generate share images with the same dimension. The proposed sc...
-
Chapter and Conference Paper
A Hidden Pattern Discovery and Meta-synthesis of Preference Adjustment in Group Decision-Making
Two aspects of group decision-making (GDM) have received much attention since its appearance, one is the organizing process of GDM which emphasizes in particular on behavioral science and qualitative analysis,...