Skip to main content

previous disabled Page of 5
and
  1. No Access

    Chapter and Conference Paper

    Compact Encryption Based on Module-NTRU Problems

    The Module-NTRU problem, introduced by Cheon, Kim, Kim, Son (IACR ePrint 2019/1468), and Chuengsatiansup, Prest, Stehlé, Wallet, Xagawa (ASIACCS ’20), generalizes the versatile NTRU assumption. One of its main...

    Shi Bai, Hansraj Jangir, Hao Lin, Tran Ngo, Weiqiang Wen in Post-Quantum Cryptography (2024)

  2. No Access

    Chapter

    Metabolomics of Tea Plants

    Tea beverages have gained immense popularity globally as highly desirable non-alcoholic drinks, owing to their distinct flavor, enticing aroma, and wide range of health advantages. These desirable traits are p...

    **ao-Liang Zhang, **n-**n Jia, Yu-Jia Ren, Da-Wei Gao, Wei-Wei Wen in The Tea Plant Genome (2024)

  3. No Access

    Chapter

    Women Leadership in the Transcontinental Country: A Study in Turkey

    Today’s professional environment is more diverse in terms of social, cultural, and ethnic dimensions than that in recent decades. The existing research has revealed that an organization’s innovation and proble...

    Ummugulsum Gunes, Wei-Wen Chang in Women's Empowerment for a Sustainable Future (2023)

  4. No Access

    Chapter and Conference Paper

    A Novel Natural Language Processing Strategy to Improve Digital Accounting Classification Approach for Supplier Invoices ERP Transaction Process

    Natural language processing (NLP) is a develo** field that offers increasing potential to simplify accounting-related tasks. This research studies a novel NLP approach to classify invoice categories based on...

    Wei Wen Chi, Tiong Yew Tang in Computational Science and Its Applications… (2023)

  5. No Access

    Chapter and Conference Paper

    Investment Optimization and Auxiliary Decision Support System of Power Grid Construction Project Under Double Carbon Target

    Due to China’s novel coronavirus pneumonia and the deepening of the reform of the power grid market, the implementation and implementation of China’s dual carbon policy and the current international related qu...

    Wei Wen, **bin Zhao in Proceedings of the 2nd International Confe… (2023)

  6. No Access

    Chapter and Conference Paper

    A Generic Transform from Multi-round Interactive Proof to NIZK

    We present a new generic transform that takes a multi-round interactive proof for the membership of a language \(\mathcal {L}\) ...

    Pierre-Alain Fouque, Adela Georgescu, Chen Qian in Public-Key Cryptography – PKC 2023 (2023)

  7. No Access

    Chapter and Conference Paper

    Finding Missing Security Operation Bugs via Program Slicing and Differential Check

    The detection of missing security operations is a complex task in software engineering, mainly due to the semantic and contextual understanding required. Prior research efforts have employed similar path diffe...

    Yeqi Fu, Yongzhi Liu, Qian Zhang, Zhou Yang in Information and Communications Security (2023)

  8. No Access

    Chapter

    Characterization of Semi Amorphous Phase of Rice Husk Silica Reinforced AA7075 Aluminium Chips Based Matrix

    Direct conversion process of recycling aluminium chip has recently been applied without the melting process to avoid the disadvantages of present method. Excellent recycling processes need to be focused to exp...

    Hoo Wei Wen, Noradila Abdul Latif in Structural Integrity and Monitoring for Co… (2023)

  9. No Access

    Chapter and Conference Paper

    Method of Conjugate Vectors for the Analysis of Single-Phase-to-Ground-Faulted Grid

    With the wide application of power electronic devices (PED), the characteristics of the grid fault vary greatly. The grid voltage/current exhibits the time-varying amplitude/frequency characteristics under asy...

    **ng Liu, Jiabing Hu, Yingbiao Li in Proceedings of the 7th PURPLE MOUNTAIN FOR… (2023)

  10. No Access

    Chapter and Conference Paper

    See Finer, See More: Implicit Modality Alignment for Text-Based Person Retrieval

    Text-based person retrieval aims to find the query person based on a textual description. The key is to learn a common latent space map** between visual-textual modalities. To achieve this goal, existing wor...

    **ujun Shu, Wei Wen, Haoqian Wu, Keyu Chen in Computer Vision – ECCV 2022 Workshops (2023)

  11. Chapter and Conference Paper

    Considerations on Evaluation of Practical Cloud Data Protection

    With the continuous growth of enterprises’ digital transformation, business-driven cloud computing has seen tremendous growth. The security community has proposed a large body of technical mechanisms, operatio...

    Rui Mei, Han-Bing Yan, Yongqiang He, Qinqin Wang, Shengqiang Zhu in Cyber Security (2022)

  12. No Access

    Chapter

    Peri-operative Management

    Endoscopic sinus surgery (ESS) is accepted as the surgical management of the choice for chronic sinusitis or polyps. Recently the instruments and techniques have improved. The quality of the ESS has developed ...

    Jian Li, Wei** Wen in Chronic Rhinosinusitis (2022)

  13. No Access

    Chapter and Conference Paper

    Entropic Hardness of Module-LWE from Module-NTRU

    The Module Learning With Errors problem ( ) has gained popularity in recent years for its security-efficiency balance,and its hardness has been established for a number of variants....

    Katharina Boudgoust, Corentin Jeudy in Progress in Cryptology – INDOCRYPT 2022 (2022)

  14. No Access

    Chapter and Conference Paper

    Partial Key Exposure Attacks on BIKE, Rainbow and NTRU

    In a so-called partial key exposure attack one obtains some information about the secret key, e.g. via some side-channel leakage. This information might be a  fraction of the secret key bits (erasure mo...

    Andre Esser, Alexander May, Javier Verbel in Advances in Cryptology – CRYPTO 2022 (2022)

  15. No Access

    Chapter and Conference Paper

    The Impact of Artificial Intelligence on Work and Human Value: Views from Social Researchers

    The rise of artificial intelligence (AI) and related new technologies have been widely discussed in recent years, especially on its benefits and threats to society. This study aims to explore the impact of AI ...

    Chu-Chen Rosa Yeh, Wei-Wen Chang, Cze Chiun Wong in Knowledge Management in Organizations (2021)

  16. No Access

    Chapter and Conference Paper

    A Hybrid Convolutional Neural Network Based-Method for Brain Tumor Classification Using mMRI and WSI

    In this paper, we propose a hybrid deep learning-based method for brain tumor classification using whole slide images (WSIs) and multimodal magnetic resonance image (mMRI). It comprises two methods: a WSI-bas...

    Linmin Pei, Wei-Wen Hsu, Ling-An Chiang in Brainlesion: Glioma, Multiple Sclerosis, S… (2021)

  17. No Access

    Chapter and Conference Paper

    Basic Model Design of Online Monitoring System for Mixed Radiation Field

    With the wide application of nuclear technology, the radiation field shows more and more characteristics of hybrid, complexity and versatility. In order to ensure the safety and data transparency of radiation ...

    **-**ng Cheng, Wen-Kai Zhu, Qing-Bo Wang in Nuclear Power Plants: Innovative Technolog… (2021)

  18. No Access

    Chapter and Conference Paper

    Multi-ray Intelligent Monitoring System for Mixed Radiation Field Measurements

    In certain special scenarios, there will be a mixed radiation field formed by a variety of nuclides or rays. The monitoring system for such radiation fields requires the capacity of comprehensive and automatic...

    **-**ng Cheng, You-Peng Wu, Qing-Bo Wang in Nuclear Power Plants: Innovative Technolog… (2021)

  19. No Access

    Chapter and Conference Paper

    Research on Integrated Management Technology for Physical Protection System of Nuclear Facilities

    In this work, the functional requirements of the integrated management of physical protection system has been studied, by analyzing the composition of the physical protection system, as well as the development...

    Wei-Wei Wen, **-**ng Cheng, You-Peng Wu in Nuclear Power Plants: Innovative Technolog… (2021)

  20. No Access

    Chapter and Conference Paper

    The Teaching Reform of Information Security Specialty Driven by Innovative Practice Project Under the Background of Big Data

    In the era of big data, the rapid development of information society and the application of Internet of Things, cloud computing and artificial intelligence have brought about changes in people’s lives. As we a...

    Weiqi Shi, Qing Lu, Weijiang Wen in 2021 International Conference on Applicati… (2021)

previous disabled Page of 5