We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Information flow control for comparative privacy analyses

    The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...

    Zubair Ahmad, Stefano Calzavara, ... Ben Stock in International Journal of Information Security
    Article 14 July 2024
  2. Trust attack prevention based on Spark-blockchain in social IoT: a survey

    Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects...

    Mariam Masmoudi, Ikram Amous, ... Florence Sèdes in International Journal of Information Security
    Article 13 July 2024
  3. Sublinear Algorithms in T-Interval Dynamic Networks

    We consider standard T - interval dynamic networks , under the synchronous timing model and the broadcast CONGEST model. In a T - interval dynamic network ,...

    Irvan Jahja, Haifeng Yu in Algorithmica
    Article 12 July 2024
  4. Explicit constructions of NMDS self-dual codes

    Near maximum distance separable (NMDS) codes are important in finite geometry and coding theory. Self-dual codes are closely related to...

    Dongchun Han, Hanbin Zhang in Designs, Codes and Cryptography
    Article 12 July 2024
  5. Progress on half a century of process modelling research in steelmaking: a review

    Process modelling in steelmaking started from mid-sixties and witnessed rapid growth and wide spread applications during the last fifty years or so....

    Dipak Mazumdar in CSI Transactions on ICT
    Article 12 July 2024
  6. M2AST:MLP-mixer-based adaptive spatial-temporal graph learning for human motion prediction

    Human motion prediction is a challenging task in human-centric computer vision, involving forecasting future poses based on historical sequences....

    Junyi Tang, Simin An, ... ** Chen in Multimedia Systems
    Article 12 July 2024
  7. Correction: ChatGPT is bullshit

    Michael Townsen Hicks, James Humphries, Joe Slater in Ethics and Information Technology
    Article Open access 11 July 2024
  8. Global adaptive histogram feature network for automatic segmentation of infection regions in CT images

    Accurate and timely diagnosis of COVID-like virus is of paramount importance for lifesaving. In this work, deep learning techniques are applied to...

    **nren Min, Yang Liu, ... Mingyang Zhong in Multimedia Systems
    Article 11 July 2024
  9. Survey-based analysis of cybersecurity awareness of Turkish seafarers

    In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...

    Ivar Moen, Aybars Oruc, ... Georgios Kavallieratos in International Journal of Information Security
    Article Open access 10 July 2024
  10. Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph

    Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....

    Peng Su, **gyuan Hu in Multimedia Systems
    Article 10 July 2024
  11. New spence difference sets

    James A. Davis, John Polhill, ... Jordan Webster in Designs, Codes and Cryptography
    Article Open access 10 July 2024
  12. Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm

    A novel quantum-safe key encapsulation algorithm, called Multivariate Polynomial Public Key (MPPK), was recently proposed by Kuang, Perepechaenko,...

    Randy Kuang, Maria Perepechaenko, ... Michel Barbeau in EURASIP Journal on Information Security
    Article Open access 09 July 2024
  13. Impact of linkage level on inferences from big data analyses in health and medical research: an empirical study

    Background

    Linkage errors that occur according to linkage levels can adversely affect the accuracy and reliability of analysis results. This study...

    Bora Lee, Young-Kyun Lee, ... Jean-Kyung Bak in BMC Medical Informatics and Decision Making
    Article Open access 09 July 2024
  14. Improve the efficiency and accuracy of ophthalmologists’ clinical decision-making based on AI technology

    Background

    As global aging intensifies, the prevalence of ocular fundus diseases continues to rise. In China, the tense doctor-patient ratio poses...

    Yingxuan Guo, Changke Huang, ... Yiqi Chen in BMC Medical Informatics and Decision Making
    Article Open access 09 July 2024
  15. Extract Implicit Semantic Friends and Their Influences from Bipartite Network for Social Recommendation

    Social recommendation often incorporates trusted social links with user-item interactions to enhance rating prediction. Although methods that...

    Zhigao Zhang, Fanfei Song, ... Chuansheng Dong in Data Science and Engineering
    Article Open access 09 July 2024
  16. Adaptive context-aware access control for IoT environments leveraging fog computing

    The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...

    Rudri Kalaria, A. S. M. Kayes, ... Ahmad Salehi Shahraki in International Journal of Information Security
    Article Open access 08 July 2024
  17. Using the ACE framework to enforce access and usage control with notifications of revoked access rights

    The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...

    Marco Rasori, Andrea Saracino, ... Marco Tiloca in International Journal of Information Security
    Article Open access 08 July 2024
  18. Digital Sustainability for Energy-Efficient Behaviours: A User Representation and Touchpoint Model

    In response to climate change, nations have been tasked with reducing energy consumption and lessening their carbon footprint through targeted...

    Stephen McCarthy, Titiana Ertiö, ... Nina Kahma in Information Systems Frontiers
    Article Open access 08 July 2024
  19. A three-stage quality evaluation method for experience products: taking animation as an example

    The diversity and dynamics of quality index information bring challenges to quality assessment of experience products. This paper proposes a...

    Qianqian Chen, Zhongjun Tang, ... **g Wang in Multimedia Systems
    Article 08 July 2024
  20. Virtual Experiences, Real Memories? A Study on Information Recall and Recognition in the Metaverse

    There are high expectations towards extended reality (XR), namely the “metaverse”. However, human performance in the metaverse has been called into...

    Nannan **, Juan Chen, ... Juho Hamari in Information Systems Frontiers
    Article Open access 08 July 2024
Did you find what you were looking for? Share feedback.