Search
Search Results
-
Information flow control for comparative privacy analyses
The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...
-
Trust attack prevention based on Spark-blockchain in social IoT: a survey
Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects...
-
Explicit constructions of NMDS self-dual codes
Near maximum distance separable (NMDS) codes are important in finite geometry and coding theory. Self-dual codes are closely related to...
-
Learning to sculpt neural cityscapes
We introduce a system that learns to sculpt 3D models of massive urban environments. The majority of humans live their lives in urban environments,...
-
M2AST:MLP-mixer-based adaptive spatial-temporal graph learning for human motion prediction
Human motion prediction is a challenging task in human-centric computer vision, involving forecasting future poses based on historical sequences....
-
A full-detection association tracker with confidence optimization for real-time multi-object tracking
Multi-object tracking (MOT) aims to obtain trajectories with unique identifiers for multiple objects in a video stream. In current approaches,...
-
ACL-SAR: model agnostic adversarial contrastive learning for robust skeleton-based action recognition
Human skeleton data have been widely explored in action recognition and the human–computer interface recently, thanks to off-the-shelf motion sensors...
-
Global adaptive histogram feature network for automatic segmentation of infection regions in CT images
Accurate and timely diagnosis of COVID-like virus is of paramount importance for lifesaving. In this work, deep learning techniques are applied to...
-
Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph
Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....
-
Real-time and secure identity authentication transmission mechanism for artificial intelligence generated image content
The rapid development of generative artificial intelligence technology and large-scale pre-training models has led to the emergence of artificial...
-
-
Intersecting realms: a cross-disciplinary examination of VR quality of experience research
The advent of virtual reality (VR) technology has necessitated a reevaluation of quality of experience (QoE) models. While numerous recent efforts...
-
Survey-based analysis of cybersecurity awareness of Turkish seafarers
In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...
-
Continual few-shot patch-based learning for anime-style colorization
The automatic colorization of anime line drawings is a challenging problem in production pipelines. Recent advances in deep neural networks have...
-
Autocleandeepfood: auto-cleaning and data balancing transfer learning for regional gastronomy food computing
Food computing has emerged as a promising research field, employing artificial intelligence, deep learning, and data science methodologies to enhance...
-
A novel single kernel parallel image encryption scheme based on a chaotic map
The development of communication technologies has increased concerns about data security, increasing the prominence of cryptography. Images are one...
-
Usability of visualizing position and orientation deviations for manual precise manipulation of objects in augmented reality
Manual precise manipulation of objects is an essential skill in everyday life, and Augmented Reality (AR) is increasingly being used to support such...
-
The impact of virtual and augmented reality on presence, user experience and performance of Information Visualisation
The fast growth of virtual reality (VR) and augmented reality (AR) head-mounted displays provides a new medium for interactive visualisations and...
-
Real-time water surface target detection based on improved YOLOv7 for Chengdu Sand River
It has been a challenge to obtain accurate detection results in a timely manner when faced with complex and changing surface target detection....
-
Adaptive context-aware access control for IoT environments leveraging fog computing
The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...