We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Information flow control for comparative privacy analyses

    The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...

    Zubair Ahmad, Stefano Calzavara, ... Ben Stock in International Journal of Information Security
    Article 14 July 2024
  2. Trust attack prevention based on Spark-blockchain in social IoT: a survey

    Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects...

    Mariam Masmoudi, Ikram Amous, ... Florence Sèdes in International Journal of Information Security
    Article 13 July 2024
  3. Explicit constructions of NMDS self-dual codes

    Near maximum distance separable (NMDS) codes are important in finite geometry and coding theory. Self-dual codes are closely related to...

    Dongchun Han, Hanbin Zhang in Designs, Codes and Cryptography
    Article 12 July 2024
  4. Learning to sculpt neural cityscapes

    We introduce a system that learns to sculpt 3D models of massive urban environments. The majority of humans live their lives in urban environments,...

    Jialin Zhu, He Wang, ... Tom Kelly in The Visual Computer
    Article Open access 12 July 2024
  5. M2AST:MLP-mixer-based adaptive spatial-temporal graph learning for human motion prediction

    Human motion prediction is a challenging task in human-centric computer vision, involving forecasting future poses based on historical sequences....

    Junyi Tang, Simin An, ... ** Chen in Multimedia Systems
    Article 12 July 2024
  6. A full-detection association tracker with confidence optimization for real-time multi-object tracking

    Multi-object tracking (MOT) aims to obtain trajectories with unique identifiers for multiple objects in a video stream. In current approaches,...

    Youyu Liu, **angxiang Zhou, ... Wanbao Tao in Journal of Real-Time Image Processing
    Article 11 July 2024
  7. ACL-SAR: model agnostic adversarial contrastive learning for robust skeleton-based action recognition

    Human skeleton data have been widely explored in action recognition and the human–computer interface recently, thanks to off-the-shelf motion sensors...

    Jiaxuan Zhu, Ming Shao, ... Siyu **a in The Visual Computer
    Article 11 July 2024
  8. Global adaptive histogram feature network for automatic segmentation of infection regions in CT images

    Accurate and timely diagnosis of COVID-like virus is of paramount importance for lifesaving. In this work, deep learning techniques are applied to...

    **nren Min, Yang Liu, ... Mingyang Zhong in Multimedia Systems
    Article 11 July 2024
  9. Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph

    Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....

    Peng Su, **gyuan Hu in Multimedia Systems
    Article 10 July 2024
  10. Real-time and secure identity authentication transmission mechanism for artificial intelligence generated image content

    The rapid development of generative artificial intelligence technology and large-scale pre-training models has led to the emergence of artificial...

    **ao Feng, Zheng Yuan in Journal of Real-Time Image Processing
    Article 10 July 2024
  11. New spence difference sets

    James A. Davis, John Polhill, ... Jordan Webster in Designs, Codes and Cryptography
    Article Open access 10 July 2024
  12. Intersecting realms: a cross-disciplinary examination of VR quality of experience research

    The advent of virtual reality (VR) technology has necessitated a reevaluation of quality of experience (QoE) models. While numerous recent efforts...

    Aleksandra Zheleva, Lieven De Marez, ... Klaas Bombeke in Virtual Reality
    Article Open access 10 July 2024
  13. Survey-based analysis of cybersecurity awareness of Turkish seafarers

    In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...

    Ivar Moen, Aybars Oruc, ... Georgios Kavallieratos in International Journal of Information Security
    Article Open access 10 July 2024
  14. Continual few-shot patch-based learning for anime-style colorization

    The automatic colorization of anime line drawings is a challenging problem in production pipelines. Recent advances in deep neural networks have...

    Akinobu Maejima, Seitaro Shinagawa, ... Yasuhiro Mukaigawa in Computational Visual Media
    Article Open access 09 July 2024
  15. Autocleandeepfood: auto-cleaning and data balancing transfer learning for regional gastronomy food computing

    Food computing has emerged as a promising research field, employing artificial intelligence, deep learning, and data science methodologies to enhance...

    Nauman Ullah Gilal, Marwa Qaraqe, ... Marco Agus in The Visual Computer
    Article Open access 09 July 2024
  16. A novel single kernel parallel image encryption scheme based on a chaotic map

    The development of communication technologies has increased concerns about data security, increasing the prominence of cryptography. Images are one...

    Joao Inacio Moreira Bezerra, Alexandre Molter, ... Vinícius Valduga de Almeida Camargo in Journal of Real-Time Image Processing
    Article 09 July 2024
  17. Usability of visualizing position and orientation deviations for manual precise manipulation of objects in augmented reality

    Manual precise manipulation of objects is an essential skill in everyday life, and Augmented Reality (AR) is increasingly being used to support such...

    ** He, ... Zenglei Wang in Virtual Reality
    Article Open access 09 July 2024
  18. The impact of virtual and augmented reality on presence, user experience and performance of Information Visualisation

    The fast growth of virtual reality (VR) and augmented reality (AR) head-mounted displays provides a new medium for interactive visualisations and...

    Ashlee Gronowski, David Caelum Arness, ... Quang Vinh Nguyen in Virtual Reality
    Article Open access 09 July 2024
  19. Real-time water surface target detection based on improved YOLOv7 for Chengdu Sand River

    It has been a challenge to obtain accurate detection results in a timely manner when faced with complex and changing surface target detection....

    Mei Yang, Huajun Wang in Journal of Real-Time Image Processing
    Article 08 July 2024
  20. Adaptive context-aware access control for IoT environments leveraging fog computing

    The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...

    Rudri Kalaria, A. S. M. Kayes, ... Ahmad Salehi Shahraki in International Journal of Information Security
    Article Open access 08 July 2024
Did you find what you were looking for? Share feedback.