![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
What is a Proper Face Registration for Face Recognition?
Face recognition systems have now made significant progress. In practice, we may face the important question of what is a better face registration for a typical face recognition algorithm, but this problem has...
-
Chapter and Conference Paper
Aircraft Reliability Evaluation Method Based on Multi-mission Profile
Aircraft mission reliability is an important indicator to measure its operational capability, which is of great significance to the aircraft’s ability to perform tasks. This paper establishes a mission reliabi...
-
Chapter and Conference Paper
Progressive Point Cloud Generating by Shape Decomposing and Upsampling
How to generate realistic and precise 3D point clouds of different shapes has become a hot topic for many researchers. However, due to the complexity and discreteness of point cloud data, generating high-resol...
-
Chapter and Conference Paper
Quantitative Evaluation Method for Aircraft Maintainability
Maintainability test and evaluation is of great significance to improve aircraft maintenance efficiency and support level. However, at present, maintainability evaluation involves many qualitative measurement ...
-
Chapter and Conference Paper
Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots
The honeypot technique has proved its value in system protection and attack analysis over the past 20 years. Distributed honeypot solutions emerge to solve the high cost and risk of maintaining a functional ho...
-
Chapter and Conference Paper
A Multi-feature Embedding Method for Robust Image Matching
In this paper, a feature point matching method that integrates both spatial structure and multiple descriptors is proposed. To be specific, given a set of detected keypoints on both images, multiple feature de...
-
Chapter and Conference Paper
Correction to: Science of Cyber Security
In the original version of this book, the affiliation of Feng Liu was presented incorrectly. This has been corrected to Institute of Information Engineering, Chinese Academy of Sciences, Bei**g, China.
-
Chapter and Conference Paper
Deep Semantic Edge for Cell Counting and Localization in Time-Lapse Microscopy Images
Cell counting and localization in microscopy images is one of the most important steps in Assisted Reproduction Technology (ART). This paper proposes a fully automatic method to achieve this goal, which consis...
-
Chapter and Conference Paper
Evaluation on the Security of Commercial Cloud Container Services
With the increasing adoption of the container mechanism in the industrial community, cloud vendors begin to provide cloud container services. Unfortunately, it lacks a concrete method to evaluate the security ...
-
Chapter and Conference Paper
SGX-Cube: An SGX-Enhanced Single Sign-On System Against Server-Side Credential Leakage
User authentication systems enforce the access control of critical resources over Internet services. The pair of username and password is still the most commonly used user authentication credential for online ...
-
Chapter and Conference Paper
UBER: Combating Sandbox Evasion via User Behavior Emulators
Sandbox-enabled dynamic malware analysis has been widely used by cyber security teams to handle the threat of malware. Correspondingly, malware authors have developed various anti-sandbox techniques to evade t...
-
Chapter and Conference Paper
Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts
Software-Defined Networking (SDN) enables diversified network functionalities with plentiful applications deployed on a logically-centralized controller. In order to work properly, applications are naturally ...
-
Chapter and Conference Paper
OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform
On mobile devices, security-sensitive tasks (e.g., mobile payment, one-time password) involve not only sensitive data such as cryptographic keying material, but also sensitive I/O operations such as inputting ...
-
Chapter and Conference Paper
Automated IoT Device Fingerprinting Through Encrypted Stream Classification
The explosive growth of the Internet of Things (IoT) has enabled a wide range of new applications and services. Meanwhile, the massive scale and enormous heterogeneity (e.g., in device vendors and types) of Io...
-
Chapter and Conference Paper
LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection
Android enables inter-app collaboration and function reusability by providing flexible Inter-Component Communication (ICC) across apps. Meanwhile, ICC introduces serious privacy leakage problems due to compone...
-
Chapter and Conference Paper
BluePass: A Secure Hand-Free Password Manager
With the growing number of online accounts a user possesses, managing passwords has been unprecedentedly challenging. Users are prone to sacrifice security for usability, leaving their accounts vulnerable to v...
-
Chapter and Conference Paper
Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack
The emerging Software-Defined Networking (SDN) is being adopted by data centers and cloud service providers to enable flexible control. Meanwhile, the current SDN design brings new vulnerabilities. In this pap...
-
Chapter and Conference Paper
Massively Parallel Image Index for Vocabulary Tree Based Image Retrieval
Although vocabulary tree based algorithm has high efficiency for image retrieval, it still faces a dilemma when dealing with large data. In this paper, we show that image indexing is the main bottleneck of voc...
-
Chapter and Conference Paper
GPU Accelerated Image Matching with Cascade Hashing
SIFT feature is widely used in image matching. However, matching massive images is time consuming because SIFT feature is a high dimensional vector. In this paper, we proposed a GPU accelerated image matching ...
-
Chapter and Conference Paper
Vibration Suppression of an Axially Moving System with Restrained Boundary Tension
In this paper, we concentrate on the vibration suppression of an axially moving string system subject to the restrained boundary tension. By introducing an appropriate barrier Lyapunov function, a boundary con...