![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
226 Result(s)
-
Chapter and Conference Paper
Context Reasoning Attention Network: Generating Plausible Distractors for Multi-choice Questions
Distractor generation, which aims to generate the wrong option part of multi-choice questions, has been proposed to assist educators to test the examinees’ reading comprehension and reasoning ability. Recently...
-
Chapter and Conference Paper
Reliability Evaluation of Smart DC Microgrid
Nowadays, one of the main contributors of air pollution is thermal power plant. China want to develop renewable energy to solve the problem [1]. In many areas, roof photovoltaic (PV) energy systems, wind energy s...
-
Chapter and Conference Paper
Prevention of GAN-Based Privacy Inferring Attacks Towards Federated Learning
With the increasing amount of data, data privacy has drawn great concern in machine learning among the public. Federated Learning, which is a new kind of distributed learning framework, enables data providers ...
-
Chapter and Conference Paper
Modeling Uncertainty in Neural Relation Extraction
Previous work on neural relation extraction mainly focus on point-based methods and ignores uncertainty within the bag, thus making poor predictions when there are insufficient instances of the bag. To solve t...
-
Chapter and Conference Paper
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay
Many practical secure systems have been designed to prevent real-world attacks via maximizing the attacking cost so as to reduce attack intentions. Inspired by this philosophy, we propose a new concept named d...
-
Chapter and Conference Paper
Cross-Domain Cross-Set Few-Shot Learning via Learning Compact and Aligned Representations
Few-shot learning (FSL) aims to recognize novel queries with only a few support samples through leveraging prior knowledge from a base dataset. In this paper, we consider the domain shift problem in FSL and ai...
-
Chapter and Conference Paper
A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis
GIFT-64 is a 64-bit block cipher with a 128-bit key that is more lightweight than PRESENT. This paper provides a detailed analysis of GIFT-64 against differential and linear attacks. Our work complements automati...
-
Chapter and Conference Paper
3D-Aware Semantic-Guided Generative Model for Human Synthesis
Generative Neural Radiance Field (GNeRF) models, which extract implicit 3D representations from 2D images, have recently been shown to produce realistic images representing rigid/semi-rigid objects, such as hu...
-
Chapter and Conference Paper
Research on Network Security Situation Assessment Model Based on Double AHP
Network security situation assessment is an important part of the situational awareness research process and the most important thing. Situation assessment refers to the assessment of the current security stat...
-
Chapter and Conference Paper
A Safety Helmet Detection Method Based on the Combination of SSD and HSV Color Space
Wearing safety helmet is a protective measure, operators must wear them when they entering the construction area. Safety helmet can significantly reduce the probability of brain injury of workers, it ensures t...
-
Chapter and Conference Paper
Research on Far Field Calculation of Antenna with Conductor Interference
In a two-dimensional space, the conductor outline is approximated by a triangular column, and an array antenna is simulated with a set of infinitely long line current sources. The calculation is carried out us...
-
Chapter and Conference Paper
Prediction of Excessive Cadmium in Rice Based on Weighted Bayesian Fusion Model
Soil Cd pollution directly affects the safety of agricultural products. Frequent Cd pollution incidents have repeatedly reminded that soil Cd pollution in China is not optimistic. In this paper, the linear reg...
-
Chapter and Conference Paper
Node-Image CAE: A Novel Embedding Method via Convolutional Auto-encoder and High-Order Proximities
The network embedding method, which mainly aims to generate low-dimensional embedding vectors for nodes in a network, has received great passion from researchers and provides excellent tools for application an...
-
Chapter and Conference Paper
A Comparative Study on Autism Spectrum Disorder Detection via 3D Convolutional Neural Networks
The prevalence of Autism Spectrum Disorder (ASD) in the United States has increased by 178% from 2000 to 2016. However, due to the lack of well-trained specialists and the time-consuming diagnostic process, ma...
-
Chapter and Conference Paper
An Immune Clone Particle Swarm Optimization Algorithm for Sparse Representation of Hyperspectral Images
The sparse representation of hyperspectral images can reduce the amount of data and facilitate image classification and interpretation processing. An immune clone particle swarm optimization algorithm (ICPSO) ...
-
Chapter and Conference Paper
Bestie: Very Practical Searchable Encryption with Forward and Backward Security
Dynamic searchable symmetric-key encryption (DSSE) is a promising crypto-tool that enables secure keyword searching over dynamically added or deleted ciphertexts. Currently, many works on DSSE devote their effort...
-
Chapter and Conference Paper
Designing the Security Enhancement Features in the Future Headphone Experience
In recent years, headphones are becoming a more and more essential personal electronic device to carry cutting-edge consumer technology into everyday life. Hence, it’s an urgent need to enhance security featur...
-
Chapter
Crop Information Sensing Technology
Precision agricultural practice requires getting aware of crop growth situation via sensitive, accurate, economical, and fast sensing means to improve decision-making for production management. Supported by Io...
-
Chapter and Conference Paper
Joint Scheduling of Spectrum and Storage Resources for Content Distribution in Space-Ground Integrated Information Network
Aiming at the problem of spectrum resource shortage caused by the rapid increase of multimedia data traffic in terrestrial network, a joint scheduling of storage resources and spectrum resources (JSSS) algorit...
-
Chapter and Conference Paper
Study on Steady-State Output Characteristics of Three-Level Boost Converter
The application of the three-level boost converter (TLBC) is able to reduce the voltage stress of power switches and diodes in the back-end circuit, also can reduce the volume and weight of energy storage comp...