Search
Search Results
-
Canonical polyadic decomposition (CPD) of big tensors with low multilinear rank
Tensor decomposition methods have been widely applied to big data analysis as they bring multiple modes and aspects of data to a unified framework,...
-
SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition
Tensor decomposition is a popular tool for multi-dimensional data analysis. In particular, High-Order Singular Value Decomposition (HOSVD) is one of... -
Algebraic Reductions of Knowledge
We introduce reductions of knowledge, a generalization of arguments of knowledge, which reduce checking knowledge of a witness in one relation to... -
Fast LSTM by dynamic decomposition on cloud and distributed systems
Long short-term memory (LSTM) is a powerful deep learning technique that has been widely used in many real-world data-mining applications such as...
-
Concatenated Tensor Networks for Deep Multi-Task Learning
Deep Multi-Task Learning has achieved great success in a number of domains. However, the enormous number of parameters results in extremely large... -
Wilson’s disease classification using higher-order Gabor tensors and various classifiers on a small and imbalanced brain MRI dataset
Wilson’s Disease (WD) is a rare, autosomal recessive disorder caused by excessive accumulation of Copper (Cu) in various human organs such as the...
-
Construction of LCD and new quantum codes from cyclic codes over a finite non-chain ring
For an odd prime p and q = p r , this paper deals with LCD codes obtained from cyclic codes of length n over a finite commutative non-chain ring
... -
Quasi-Brain-Death EEG Diagnosis Based on Tensor Train Decomposition
The quasi-brain-death diagnosis based on electroencephalogram (EEG) signal analysis is of great significance for early detection of quasi-brain-death... -
SMILE: Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential Transactions
In a set membership proof, the public information consists of a set of elements and a commitment. The prover then produces a zero-knowledge proof... -
A note on a standard model for Galois rings
In this work we present a standard model for Galois rings based on the standard model of their residual fields, that is, a a sequence of Galois rings...
-
Algebraically Structured LWE, Revisited
In recent years, there has been a proliferation of algebraically structured Learning With Errors (LWE) variants, including Ring-LWE, Module-LWE,...
-
Efficient Pseudorandom Correlation Generators from Ring-LPN
Secure multiparty computation can often utilize a trusted source of correlated randomness to achieve better efficiency. A recent line of work,... -
Perceptual image hashing based on structural fractal features of image coding and ring partition
Perceptual image hashing finds increasing attention in several multimedia security applications. However, reaching the trade-off balance between the...
-
Lossiness and Entropic Hardness for Ring-LWE
The hardness of the Ring Learning with Errors problem (RLWE) is a central building block for efficiency-oriented lattice-based cryptography. Many... -
A survey of model compression strategies for object detection
Deep neural networks (DNNs) have achieved great success in many object detection tasks. However, such DNNS-based large object detection models are...
-
Summary and Outlook of Research on Infrared Small Target Detection
In this chapter, we will provide a thorough overview of the research conducted on infrared small target detection, as discussed throughout this book.... -
Efficient multivariate low-degree tests via interactive oracle proofs of proximity for polynomial codes
We consider the proximity testing problem for error-correcting codes which consist in evaluations of multivariate polynomials either of bounded...
-
Introduction
In this chapter, we introduce the basic information of infrared imaging and the research status of infrared small target detection. At the same time,... -
F-IVM: analytics over relational databases under updates
This article describes F-IVM, a unified approach for maintaining analytics over changing relational data. We exemplify its versatility in four...
-
3D Mesh Steganalysis
In this chapter, we introduce triangle mesh steganalysis and its two categories: universal steganalysis and specific steganalysis. Universal...