We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 650 results
  1. Canonical polyadic decomposition (CPD) of big tensors with low multilinear rank

    Tensor decomposition methods have been widely applied to big data analysis as they bring multiple modes and aspects of data to a unified framework,...

    Yichun Qiu, Guoxu Zhou, ... Andrzej Cichocki in Multimedia Tools and Applications
    Article 23 April 2020
  2. SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition

    Tensor decomposition is a popular tool for multi-dimensional data analysis. In particular, High-Order Singular Value Decomposition (HOSVD) is one of...
    **rong Chen, Lin Liu, ... Wei Peng in Information Security and Privacy
    Conference paper 2020
  3. Algebraic Reductions of Knowledge

    We introduce reductions of knowledge, a generalization of arguments of knowledge, which reduce checking knowledge of a witness in one relation to...
    Abhiram Kothapalli, Bryan Parno in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  4. Fast LSTM by dynamic decomposition on cloud and distributed systems

    Long short-term memory (LSTM) is a powerful deep learning technique that has been widely used in many real-world data-mining applications such as...

    Yang You, Yuxiong He, ... James Demmel in Knowledge and Information Systems
    Article 19 July 2020
  5. Concatenated Tensor Networks for Deep Multi-Task Learning

    Deep Multi-Task Learning has achieved great success in a number of domains. However, the enormous number of parameters results in extremely large...
    Maolin Wang, Zeyong Su, ... Zenglin Xu in Neural Information Processing
    Conference paper 2020
  6. Wilson’s disease classification using higher-order Gabor tensors and various classifiers on a small and imbalanced brain MRI dataset

    Wilson’s Disease (WD) is a rare, autosomal recessive disorder caused by excessive accumulation of Copper (Cu) in various human organs such as the...

    Article 09 March 2023
  7. Construction of LCD and new quantum codes from cyclic codes over a finite non-chain ring

    For an odd prime p and q = p r , this paper deals with LCD codes obtained from cyclic codes of length n over a finite commutative non-chain ring ...

    Habibul Islam, Om Prakash in Cryptography and Communications
    Article 02 August 2021
  8. Quasi-Brain-Death EEG Diagnosis Based on Tensor Train Decomposition

    The quasi-brain-death diagnosis based on electroencephalogram (EEG) signal analysis is of great significance for early detection of quasi-brain-death...
    Qipeng Chen, Longhao Yuan, ... Jianting Cao in Advances in Neural Networks – ISNN 2019
    Conference paper 2019
  9. SMILE: Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential Transactions

    In a set membership proof, the public information consists of a set of elements and a commitment. The prover then produces a zero-knowledge proof...
    Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler in Advances in Cryptology – CRYPTO 2021
    Conference paper 2021
  10. A note on a standard model for Galois rings

    In this work we present a standard model for Galois rings based on the standard model of their residual fields, that is, a a sequence of Galois rings...

    E. Martínez-Moro, A. Piñera-Nicolás, I. F. Rúa in Applicable Algebra in Engineering, Communication and Computing
    Article 22 June 2023
  11. Algebraically Structured LWE, Revisited

    In recent years, there has been a proliferation of algebraically structured Learning With Errors (LWE) variants, including Ring-LWE, Module-LWE,...

    Chris Peikert, Zachary Pepin in Journal of Cryptology
    Article 13 June 2024
  12. Efficient Pseudorandom Correlation Generators from Ring-LPN

    Secure multiparty computation can often utilize a trusted source of correlated randomness to achieve better efficiency. A recent line of work,...
    Elette Boyle, Geoffroy Couteau, ... Peter Scholl in Advances in Cryptology – CRYPTO 2020
    Conference paper 2020
  13. Perceptual image hashing based on structural fractal features of image coding and ring partition

    Perceptual image hashing finds increasing attention in several multimedia security applications. However, reaching the trade-off balance between the...

    Fares Khelaifi, HongJie He in Multimedia Tools and Applications
    Article 16 March 2020
  14. Lossiness and Entropic Hardness for Ring-LWE

    The hardness of the Ring Learning with Errors problem (RLWE) is a central building block for efficiency-oriented lattice-based cryptography. Many...
    Zvika Brakerski, Nico Döttling in Theory of Cryptography
    Conference paper 2020
  15. A survey of model compression strategies for object detection

    Deep neural networks (DNNs) have achieved great success in many object detection tasks. However, such DNNS-based large object detection models are...

    Zonglei Lyu, Tong Yu, ... Guangyao Li in Multimedia Tools and Applications
    Article Open access 02 November 2023
  16. Summary and Outlook of Research on Infrared Small Target Detection

    In this chapter, we will provide a thorough overview of the research conducted on infrared small target detection, as discussed throughout this book....
    Hu Zhu, Yushan Pan, ... Guoxia Xu in Infrared Small Target Detection
    Chapter 2024
  17. Efficient multivariate low-degree tests via interactive oracle proofs of proximity for polynomial codes

    We consider the proximity testing problem for error-correcting codes which consist in evaluations of multivariate polynomials either of bounded...

    Daniel Augot, Sarah Bordage, Jade Nardi in Designs, Codes and Cryptography
    Article 13 November 2022
  18. Introduction

    In this chapter, we introduce the basic information of infrared imaging and the research status of infrared small target detection. At the same time,...
    Hu Zhu, Yushan Pan, ... Guoxia Xu in Infrared Small Target Detection
    Chapter 2024
  19. F-IVM: analytics over relational databases under updates

    This article describes F-IVM, a unified approach for maintaining analytics over changing relational data. We exemplify its versatility in four...

    Ahmet Kara, Milos Nikolic, ... Haozhe Zhang in The VLDB Journal
    Article Open access 14 November 2023
  20. 3D Mesh Steganalysis

    In this chapter, we introduce triangle mesh steganalysis and its two categories: universal steganalysis and specific steganalysis. Universal...
    Hang Zhou, Kejiang Chen, ... Weiming Zhang in Triangle Mesh Watermarking and Steganography
    Chapter 2023
Did you find what you were looking for? Share feedback.