Search
Search Results
-
Search on dual-space: discretization accuracy-based architecture search for person re-identification
Network architectures automatically generated for person re-identification (re-ID) using neural architecture search (NAS) algorithms exhibit unique...
-
Vector Commitments with Proofs of Smallness: Short Range Proofs and More
Vector commitment schemes are compressing commitments to vectors that make it possible to succinctly open a commitment for individual vector... -
Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
Attribute-based encryption (ABE) cryptographically implements fine-grained access control on data. As such, data can be stored by an entity that is...
-
Style-Hallucinated Dual Consistency Learning: A Unified Framework for Visual Domain Generalization
Domain shift widely exists in the visual world, while modern deep neural networks commonly suffer from severe performance degradation under domain...
-
-
Efficient constrained large-scale multi-objective optimization based on reference vector-guided evolutionary algorithm
The large-scale multi-objective optimization problem exist widely in reality while they have complex constraints. The simultaneous effect of the...
-
Learning from crowds with robust support vector machines
Crowdsourcing system provides an easy way to obtain labeled training data. However, the labels provided by non-expert labelers often appear low...
-
Gradient Vector Fields of Discrete Morse Functions and Watershed-Cuts
In this paper, we study a class of discrete Morse functions, coming from Discrete Morse Theory, that are equivalent to a class of simplicial stacks,... -
Research on Depth-Adaptive Dual-Arm Collaborative Gras** Method
Among the existing dual-arm cooperative gras** methods, the dual-arm cooperative gras** method based on RGB camera is the mainstream intelligent... -
Don’t Tamper with Dual System Encryption
In related-key attacks (RKA), an attacker modifies a secret key stored in a device by tampering or fault injection and observes the evaluation output... -
DualMatch: Robust Semi-supervised Learning with Dual-Level Interaction
Semi-supervised learning provides an expressive framework for exploiting unlabeled data when labels are insufficient. Previous semi-supervised... -
Stochastic Pairing for Contrastive Anomaly Detection on Time Series
Anomaly detection for predictive maintenance is a significant concern for industry. Unanticipated failures cause high costs for experts involved in... -
DBT: multimodal emotion recognition based on dual-branch transformer
There are very few labeled datasets in speech emotion recognition. The reason is that emotion is subjective and requires much time for labeling...
-
Semi-supervised bi-orthogonal constraints dual-graph regularized NMF for subspace clustering
Non-negative matrix factorization (NMF), as an explanatory feature extraction technology, has powerful dimensionality reduction and semantic...
-
Style-Hallucinated Dual Consistency Learning for Domain Generalized Semantic Segmentation
In this paper, we study the task of synthetic-to-real domain generalized semantic segmentation, which aims to learn a model that is robust to unseen... -
Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption
In 1993, Benaloh and De Mare introduced cryptographic accumulator, a primitive that allows the representation of a set of values by a short object... -
Security scheduling and transaction mechanism of virtual power plants based on dual blockchains
Aiming at the data authenticity and storage problems in the current coordinated scheduling of virtual power plants, as well as the opaque information...
-
Attribute-Based Signatures with Advanced Delegation, and Tracing
Attribute-based cryptography allows fine-grained control on the use of the private key. In particular, attribute-based signature (ABS) specifies the... -
Identity-Based Matchmaking Encryption from Standard Assumptions
In this work, we propose the first identity-based matchmaking encryption (IB-ME) scheme under the standard assumptions in the standard model. This... -
Registered ABE via Predicate Encodings
This paper presents the first generic black-box construction of registered attribute-based encryption (Reg-ABE) via predicate encoding [TCC’14]. The...