We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 650 results
  1. Performance of Different Methods

    In this chapter, we will conduct comparative experimental demonstrations of all the proposed methods. It consists of four parts: experimental setup,...
    Hu Zhu, Yushan Pan, ... Guoxia Xu in Infrared Small Target Detection
    Chapter 2024
  2. Learning the external and internal priors for multispectral and hyperspectral image fusion

    Recently, multispectral image (MSI) and hyperspectral image (HSI) fusion has been a popular topic in high-resolution HSI acquisition. This fusion...

    Shutao Li, Renwei Dian, Haibo Liu in Science China Information Sciences
    Article 27 March 2023
  3. Quality Assessment of Light-Field Image

    Light-field (LF) imaging technology is widely applied to the fields like 3D reconstruction, virtual reality and image rendering, and has attracted...
    Ke Gu, Hongyan Liu, Chengxu Zhou in Quality Assessment of Visual Content
    Chapter 2022
  4. On Gaussian Sampling, Smoothing Parameter and Application to Signatures

    We present a general framework for polynomial-time lattice Gaussian sampling. It revolves around a systematic study of the discrete Gaussian measure...
    Thomas Espitau, Alexandre Wallet, Yang Yu in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  5. LGHAE: Local and Global Hyper-relation Aggregation Embedding for Link Prediction

    The Knowledge Graph (KGs) have profoundly impacted many research fields. However, there is a problem of low data integrity in KGs. The...
    Peikai Yuan, Zhenheng Qi, ... Chao Liu in Data Science
    Conference paper 2023
  6. Batch Bootstrap** I:

    In this series of work, we aim at improving the bootstrap** paradigm for fully homomorphic encryption (FHE). Our main goal is to show that the...
    Feng-Hao Liu, Han Wang in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  7. Efficient low-rank multi-component fusion with component-specific factors in image-recipe retrieval

    Image-Recipe retrieval is the task of retrieving closely related recipes from a collection given a food image and vice versa. The modality gap...

    Wenyu Zhao, Dong Zhou, ... **jun Chen in Multimedia Tools and Applications
    Article 18 May 2023
  8. Numerical Simulation Model Construction of Swept Frequency Dielectric Logging Response Based on Wireless Communication

    The current method is faced with the interference of logging signals caused by mud invasion, which cannot meet the real-time requirements. In order...
    Conference paper 2024
  9. An autonomous and intelligent hybrid CNN-RNN-LSTM based approach for the detection and classification of abnormalities in brain

    This article shows the identification and classification of abnormalities present in the brain. MRI test is typically conducted to detect...

    Priyanka Datta, Rajesh Rohilla in Multimedia Tools and Applications
    Article 02 January 2024
  10. Dynamic relation learning for link prediction in knowledge hypergraphs

    Link prediction for knowledge graphs (KGs), which aims to predict missing facts, has been broadly studied in binary relational KGs. However, real...

    Xue Zhou, Bei Hui, ... Ling Tian in Applied Intelligence
    Article 25 August 2023
  11. Generating One-Hot Maps Under Encryption

    One-hot maps are commonly used in the AI domain. Unsurprisingly, they can also bring great benefits to ML-based algorithms such as decision trees...
    Ehud Aharoni, Nir Drucker, ... Hayim Shaul in Cyber Security, Cryptology, and Machine Learning
    Conference paper 2023
  12. Multi-hop Multi-key Homomorphic Encryption with Less Noise Under CRS Model

    The application of information technologies such as big data, artificial intelligence, and cloud computing in the Internet environment makes...
    Hui Li, Xuelian Li, ... Runsong Wang in Cyberspace Safety and Security
    Conference paper 2022
  13. Batch Bootstrap** II:

    This work continues the exploration of the batch framework proposed in Batch Bootstrap** I (Liu and Wang, Eurocrypt 2023). By further designing...
    Feng-Hao Liu, Han Wang in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  14. Generalized Visual Information Analysis Via Tensorial Algebra

    High-order data are modeled using matrices whose entries are numerical arrays of a fixed size. These arrays, called t-scalars, form a commutative...

    Liang Liao, Stephen John Maybank in Journal of Mathematical Imaging and Vision
    Article Open access 12 February 2020
  15. Partial Shape Similarity by Multi-metric Hamiltonian Spectra Matching

    Estimating the similarity of non-rigid shapes and parts thereof plays an important role in numerous geometry analysis applications. We propose a...
    David Bensaïd, Amit Bracha, Ron Kimmel in Scale Space and Variational Methods in Computer Vision
    Conference paper 2023
  16. Full Domain Functional Bootstrap** with Least Significant Bit Encoding

    Functional bootstrap** (FBS) is a powerful technique that evaluates a look-up table (LUT) while refreshing an LWE ciphertext in FHEW and TFHE...
    Zhihao Li, Benqiang Wei, ... Kunpeng Wang in Information Security and Cryptology
    Conference paper 2024
  17. A review of hashing based image authentication techniques

    In the recent digitization era, image hashing is a key technology, including image recognition, authentication and manipulation detection, among many...

    Abdul Subhani Shaik, Ram Kumar Karsh, ... Rabul Hussain Laskar in Multimedia Tools and Applications
    Article 29 October 2021
  18. Efficient Visual Recognition: A Survey on Recent Advances and Brain-inspired Methodologies

    Visual recognition is currently one of the most important and active research areas in computer vision, pattern recognition, and even the general...

    Yang Wu, Ding-Heng Wang, ... Guo-Qi Li in Machine Intelligence Research
    Article Open access 18 August 2022
  19. Towards Practical Multi-key TFHE: Parallelizable, Key-Compatible, Quasi-linear Complexity

    Multi-key homomorphic encryption is a generalized notion of homomorphic encryption supporting arbitrary computation on ciphertexts, possibly...
    Hyesun Kwak, Seonhong Min, Yongsoo Song in Public-Key Cryptography – PKC 2024
    Conference paper 2024
Did you find what you were looking for? Share feedback.