Search
Search Results
-
Text summarization based on semantic graphs: an abstract meaning representation graph-to-text deep learning approach
Nowadays, due to the constantly growing amount of textual information, automatic text summarization constitutes an important research area in natural...
-
Information flow control for comparative privacy analyses
The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...
-
Trust attack prevention based on Spark-blockchain in social IoT: a survey
Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects...
-
Construction of all even lengths type-II Z-complementary pair with a large zero-correlation zone
This paper presents a direct construction of type-II Z-complementary pair (ZCP) of q -ary ( q is even) for all even lengths with a wide...
-
Progress on half a century of process modelling research in steelmaking: a review
Process modelling in steelmaking started from mid-sixties and witnessed rapid growth and wide spread applications during the last fifty years or so....
-
Decentralized traffic management of autonomous drones
Coordination of local and global aerial traffic has become a legal and technological bottleneck as the number of unmanned vehicles in the common...
-
Virtual home staging and relighting from a single panorama under natural illumination
Virtual staging technique can digitally showcase a variety of real-world scenes. However, relighting indoor scenes from a single image is challenging...
-
Evaluation of data augmentation techniques on subjective tasks
Data augmentation is widely applied in various computer vision problems for artificially increasing the size of a dataset by transforming the...
-
Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency
Polynomial commitments schemes are a powerful tool that enables one party to commit to a polynomial p of degree d , and prove that the committed...
-
Examining ALS: reformed PCA and random forest for effective detection of ALS
ALS (Amyotrophic Lateral Sclerosis) is a fatal neurodegenerative disease of the human motor system. It is a group of progressive diseases that...
-
Emotion AWARE: an artificial intelligence framework for adaptable, robust, explainable, and multi-granular emotion analysis
Emotions are fundamental to human behaviour. How we feel, individually and collectively, determines how humanity evolves and advances into our shared...
-
Continual learning approaches to hand–eye calibration in robots
This study addresses the problem of hand–eye calibration in robotic systems by develo** Continual Learning (CL)-based approaches. Traditionally,...
-
Survey-based analysis of cybersecurity awareness of Turkish seafarers
In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...
-
The Price of Active Security in Cryptographic Protocols
We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting,...
-
MDUNet: deep-prior unrolling network with multi-parameter data integration for low-dose computed tomography reconstruction
The goal of this study is to reconstruct a high-quality computed tomography (CT) image from low-dose acquisition using an unrolling deep...
-
An adversarial sample detection method based on heterogeneous denoising
Deep learning has been used in many computer-vision-based applications. However, deep neural networks are vulnerable to adversarial examples that...
-
A framework of specialized knowledge distillation for Siamese tracker on challenging attributes
In recent years, Siamese network-based trackers have achieved significant improvements in real-time tracking. Despite their success, performance...
-
Using the ACE framework to enforce access and usage control with notifications of revoked access rights
The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...
-
End-to-End No-wait Scheduling for Time-Triggered Streams in Mixed Wired-Wireless Networks
Proprietary communication technologies for time-critical communication in industrial environments are being gradually replaced by Time-sensitive...