We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,299 results
  1. Search on dual-space: discretization accuracy-based architecture search for person re-identification

    Network architectures automatically generated for person re-identification (re-ID) using neural architecture search (NAS) algorithms exhibit unique...

    **anbao Wang, Pengfei Liu, ... Minghai Yao in The Visual Computer
    Article 28 March 2024
  2. Vector Commitments with Proofs of Smallness: Short Range Proofs and More

    Vector commitment schemes are compressing commitments to vectors that make it possible to succinctly open a commitment for individual vector...
    Conference paper 2024
  3. Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice

    Attribute-based encryption (ABE) cryptographically implements fine-grained access control on data. As such, data can be stored by an entity that is...

    Marloes Venema, Greg Alpár, Jaap-Henk Hoepman in Designs, Codes and Cryptography
    Article Open access 06 September 2022
  4. Style-Hallucinated Dual Consistency Learning: A Unified Framework for Visual Domain Generalization

    Domain shift widely exists in the visual world, while modern deep neural networks commonly suffer from severe performance degradation under domain...

    Yuyang Zhao, Zhun Zhong, ... Gim Hee Lee in International Journal of Computer Vision
    Article 18 October 2023
  5. Efficient constrained large-scale multi-objective optimization based on reference vector-guided evolutionary algorithm

    The large-scale multi-objective optimization problem exist widely in reality while they have complex constraints. The simultaneous effect of the...

    Chaodong Fan, Jiawei Wang, ... Zhaoyang Ai in Applied Intelligence
    Article 09 May 2023
  6. Learning from crowds with robust support vector machines

    Crowdsourcing system provides an easy way to obtain labeled training data. However, the labels provided by non-expert labelers often appear low...

    Wenjun Yang, Chaoqun Li, Liangxiao Jiang in Science China Information Sciences
    Article 08 December 2022
  7. Gradient Vector Fields of Discrete Morse Functions and Watershed-Cuts

    In this paper, we study a class of discrete Morse functions, coming from Discrete Morse Theory, that are equivalent to a class of simplicial stacks,...
    Nicolas Boutry, Gilles Bertrand, Laurent Najman in Discrete Geometry and Mathematical Morphology
    Conference paper 2022
  8. Research on Depth-Adaptive Dual-Arm Collaborative Gras** Method

    Among the existing dual-arm cooperative gras** methods, the dual-arm cooperative gras** method based on RGB camera is the mainstream intelligent...
    Hao Zhang, Pengfei Yi, ... Dongsheng Zhou in Collaborative Computing: Networking, Applications and Worksharing
    Conference paper 2022
  9. Don’t Tamper with Dual System Encryption

    In related-key attacks (RKA), an attacker modifies a secret key stored in a device by tampering or fault injection and observes the evaluation output...
    Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow in Applied Cryptography and Network Security
    Conference paper 2022
  10. DualMatch: Robust Semi-supervised Learning with Dual-Level Interaction

    Semi-supervised learning provides an expressive framework for exploiting unlabeled data when labels are insufficient. Previous semi-supervised...
    Cong Wang, **aofeng Cao, ... Zenglin Shi in Machine Learning and Knowledge Discovery in Databases: Research Track
    Conference paper 2023
  11. Stochastic Pairing for Contrastive Anomaly Detection on Time Series

    Anomaly detection for predictive maintenance is a significant concern for industry. Unanticipated failures cause high costs for experts involved in...
    Guillaume Chambaret, Laure Berti-Equille, ... Fabien Chaillan in Pattern Recognition and Artificial Intelligence
    Conference paper 2022
  12. DBT: multimodal emotion recognition based on dual-branch transformer

    There are very few labeled datasets in speech emotion recognition. The reason is that emotion is subjective and requires much time for labeling...

    Yufan Yi, Yan Tian, ... Yi** Xu in The Journal of Supercomputing
    Article 21 December 2022
  13. Semi-supervised bi-orthogonal constraints dual-graph regularized NMF for subspace clustering

    Non-negative matrix factorization (NMF), as an explanatory feature extraction technology, has powerful dimensionality reduction and semantic...

    SongTao Li, WeiGang Li, ... Yang Li in Applied Intelligence
    Article 01 July 2021
  14. Style-Hallucinated Dual Consistency Learning for Domain Generalized Semantic Segmentation

    In this paper, we study the task of synthetic-to-real domain generalized semantic segmentation, which aims to learn a model that is robust to unseen...
    Yuyang Zhao, Zhun Zhong, ... Gim Hee Lee in Computer Vision – ECCV 2022
    Conference paper 2022
  15. Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption

    In 1993, Benaloh and De Mare introduced cryptographic accumulator, a primitive that allows the representation of a set of values by a short object...
    Anaïs Barthoulot, Olivier Blazy, Sébastien Canard in Cryptology and Network Security
    Conference paper 2023
  16. Security scheduling and transaction mechanism of virtual power plants based on dual blockchains

    Aiming at the data authenticity and storage problems in the current coordinated scheduling of virtual power plants, as well as the opaque information...

    **aohong Zhang, Zilong Song, Ata Jahangir Moshayedi in Journal of Cloud Computing
    Article Open access 28 January 2022
  17. Attribute-Based Signatures with Advanced Delegation, and Tracing

    Attribute-based cryptography allows fine-grained control on the use of the private key. In particular, attribute-based signature (ABS) specifies the...
    Cécile Delerablée, Lénaïck Gouriou, David Pointcheval in Topics in Cryptology – CT-RSA 2024
    Conference paper 2024
  18. Identity-Based Matchmaking Encryption from Standard Assumptions

    In this work, we propose the first identity-based matchmaking encryption (IB-ME) scheme under the standard assumptions in the standard model. This...
    Jie Chen, Yu Li, ... Jian Weng in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  19. Registered ABE via Predicate Encodings

    This paper presents the first generic black-box construction of registered attribute-based encryption (Reg-ABE) via predicate encoding [TCC’14]. The...
    Ziqi Zhu, Kai Zhang, ... Haifeng Qian in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
Did you find what you were looking for? Share feedback.