We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. New spence difference sets

    James A. Davis, John Polhill, ... Jordan Webster in Designs, Codes and Cryptography
    Article Open access 10 July 2024
  2. Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph

    Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....

    Peng Su, **gyuan Hu in Multimedia Systems
    Article 10 July 2024
  3. Survey-based analysis of cybersecurity awareness of Turkish seafarers

    In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...

    Ivar Moen, Aybars Oruc, ... Georgios Kavallieratos in International Journal of Information Security
    Article Open access 10 July 2024
  4. Adaptive context-aware access control for IoT environments leveraging fog computing

    The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...

    Rudri Kalaria, A. S. M. Kayes, ... Ahmad Salehi Shahraki in International Journal of Information Security
    Article Open access 08 July 2024
  5. Using the ACE framework to enforce access and usage control with notifications of revoked access rights

    The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...

    Marco Rasori, Andrea Saracino, ... Marco Tiloca in International Journal of Information Security
    Article Open access 08 July 2024
  6. A three-stage quality evaluation method for experience products: taking animation as an example

    The diversity and dynamics of quality index information bring challenges to quality assessment of experience products. This paper proposes a...

    Qianqian Chen, Zhongjun Tang, ... **g Wang in Multimedia Systems
    Article 08 July 2024
  7. Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system

    Software can be vulnerable to various types of interference. The production of cyber threat intelligence for closed source software requires...

    Süleyman Muhammed Arıkan, Aynur Koçak, Mustafa Alkan in International Journal of Information Security
    Article Open access 08 July 2024
  8. Accurate entropy modeling in learned image compression with joint enchanced SwinT and CNN

    Recently, learned image compression (LIC) has shown significant research potential. Most existing LIC methods are CNN-based or transformer-based or...

    Dongjian Yang, **aopeng Fan, ... Debin Zhao in Multimedia Systems
    Article 07 July 2024
  9. A multi-scale no-reference video quality assessment method based on transformer

    Video quality assessment is essential for optimizing user experience, enhancing network efficiency, supporting video production and editing,...

    Yingan Cui, Zonghua Yu, ... Junhuai Li in Multimedia Systems
    Article 06 July 2024
  10. ViCLEVR: a visual reasoning dataset and hybrid multimodal fusion model for visual question answering in Vietnamese

    In recent years, visual question answering (VQA) has gained significant attention for its diverse applications, including intelligent car assistance,...

    Khiem Vinh Tran, Hao Phu Phan, ... Ngan Luu Thuy Nguyen in Multimedia Systems
    Article 06 July 2024
  11. Deep learning based features extraction for facial gender classification using ensemble of machine learning technique

    Accurate and efficient gender recognition is an essential for many applications such as surveillance, security, and biometrics. Recently, deep...

    Fazal Waris, Feipeng Da, Shanghuan Liu in Multimedia Systems
    Article 06 July 2024
  12. Around LCD group codes

    Javier de la Cruz, Wolfgang Willems in Designs, Codes and Cryptography
    Article 05 July 2024
  13. Vectorial negabent concepts: similarities, differences, and generalizations

    In Pasalic et al. (IEEE Trans Inf Theory 69:2702–2712, 2023), and in Anbar and Meidl (Cryptogr Commun 10:235–249, 2018), two different vectorial...

    Nurdagül Anbar, Sadmir Kudin, ... Alexandr Polujan in Designs, Codes and Cryptography
    Article Open access 05 July 2024
  14. Trust management in the internet of vehicles: a systematic literature review of blockchain integration

    The Internet of Vehicles (IoV) promises to revolutionize transportation in smart cities, but its interconnectedness raises critical security and...

    Shirin Abbasi, Navid Khaledian, Amir Masoud Rahmani in International Journal of Information Security
    Article 05 July 2024
  15. Blind quality evaluator for multi-exposure fusion image via joint sparse features and complex-wavelet statistical characteristics

    Multi-Exposure Fusion (MEF) technique aims to fuse multiple images taken from the same scene at different exposure levels into an image with more...

    Benquan Yang, Yueli Cui, ... Junhao Lin in Multimedia Systems
    Article 05 July 2024
  16. Context-aware adaptive network for UDA semantic segmentation

    Unsupervised Domain Adaptation (UDA) plays a pivotal role in enhancing the segmentation performance of models in the target domain by mitigating the...

    Yu Yuan, **long Shi, ... Yunhan Sun in Multimedia Systems
    Article 05 July 2024
  17. Deep contrastive multi-view clustering with doubly enhanced commonality

    Recently, deep multi-view clustering leveraging autoencoders has garnered significant attention due to its ability to simultaneously enhance feature...

    Zhiyuan Yang, Changming Zhu, Zishi Li in Multimedia Systems
    Article 04 July 2024
  18. Expediting the design and development of secure cloud-based mobile apps

    The adoption and popularity of mobile devices by end-users is partially driven by the increasing development and availability of mobile applications...

    Francisco T. Chimuco, Joāo B. F. Sequeiros, ... Pedro R. M. Inácio in International Journal of Information Security
    Article Open access 04 July 2024
  19. Quality evaluation methods of handwritten Chinese characters: a comprehensive survey

    Quality evaluation of handwritten Chinese characters aims to automatically quantify and assess handwritten Chinese characters through computer vision...

    Weiran Chen, Jiaqi Su, ... Chun** Liu in Multimedia Systems
    Article 04 July 2024
Did you find what you were looking for? Share feedback.