![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Correction to: Generating BlobCell Label from Weak Annotations for Precise Cell Segmentation
In the original version of this paper some errors occurred. This was corrected.
-
Chapter and Conference Paper
Generating BlobCell Label from Weak Annotations for Precise Cell Segmentation
Cell segmentation in histopathological image analysis is critical for identifying cancer cells and predicting disease severity. However, manual cell labeling is time-consuming. Many experiments speed up the ge...
-
Chapter and Conference Paper
Intrusion Detection System for Industrial Network
Various information and communication technologies are used to control industrial infrastructure. A programmable logic controller (PLC) manages and controls the detailed areas of each facility
-
Chapter and Conference Paper
Forensic Analysis of Apple CarPlay: A Case Study
Apple CarPlay is a system that puts some features of your iPhone or iPad onto the infotainment screen of a CarPlay-equipped vehicle, allowing drivers to use those features when driving. Using Apple CarPlay, dr...
-
Chapter and Conference Paper
Consumers’ Perceived Benefits and Costs for Amazon Go Based on Social Media Data Using Text Mining
This study aims to identify the perceived benefits and costs of Amazon Go, the first unmanned store with advanced technology, based on the value-based adoption model using a text-mining technique. We collected...
-
Chapter and Conference Paper
Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks
Performance prediction in wireless mobile networks is essential for diverse purposes in network management and operation. Particularly, the position of mobile devices is crucial to estimating the performance i...
-
Chapter and Conference Paper
A Blockchain-Based Retribution Mechanism for Collaborative Intrusion Detection
Collaborative intrusion detection approach uses the shared detection signature between the collaborative participants to facilitate coordinated defense. In the context of collaborative intrusion detection syst...
-
Chapter and Conference Paper
Metaverse-Driven Interactive Performing Arts Content Development
The ongoing COVID-19 pandemic necessitated platform diversification and the revitalization of interactive performance (the metaverse), a new paradigm for the performing arts. In 2019, the authors implemented a...
-
Chapter and Conference Paper
A Privacy Preserving E-Voting System Based on Blockchain
An electronic voting system can enable greater democracy by allowing virtual and remote voting and facilitating greater participation. However, the e-voting systems have experienced allegations due to corrupti...
-
Chapter and Conference Paper
Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity
Network intrusion detection systems (IDS) has efficiently identified the profiles of normal network activities, extracted intrusion patterns, and constructed generalized models to evaluate (un)known attacks us...
-
Chapter and Conference Paper
An Intelligence Criminal Tracker for Industrial Espionage
The investigation of industrial espionage basically requires significant levels of expertise and a full data recovery on an entire device. In practice, an investigator cannot conduct an in-depth examination of...
-
Chapter and Conference Paper
Security Problems of 5G Voice Communication
In April 2019, the world’s first 5G mobile communication was commercialized in South Korea. 5G mobile communication aims to provide 20 Gbps transmission speed which is 20 times faster than 4G mobile communicat...
-
Chapter and Conference Paper
Unsupervised Sentence Embedding Using Document Structure-Based Context
We present a new unsupervised method for learning general-purpose sentence embeddings. Unlike existing methods which rely on local contexts, such as words inside the sentence or immediately neighboring sentenc...
-
Chapter and Conference Paper
Multi-site Evaluation of a Study-Level Classifier for Mammography Using Deep Learning
We present a computer-aided diagnosis algorithm for mammography trained and validated on studies acquired from six clinical sites. We hold out the full dataset from a seventh hospital for testing to assess the...
-
Chapter and Conference Paper
An Efficient NTRU-Based Authentication Protocol in IoT Environment
Recently, to ensure privacy of user, the numerous elliptic curve cryptosystem based key distribution and authentication protocols for IoT environments have been proposed. However, most used public key based cr...
-
Chapter and Conference Paper
UAV Set Covering Problem for Emergency Network
Recent technology allows UAVs to be implemented not only in fields of military, videography, or logistics but also in a social security area, especially for disaster management. UAVs can mount a router and pro...
-
Chapter and Conference Paper
Resilient SDN-Based Communication in Vehicular Network
Vehicular ad-hoc network (VANET) is the key component of intelligent transportation system (ITS) for various services like road safety and traffic efficiency. However, current VANET architectures provide less ...
-
Chapter and Conference Paper
Repair Crew Scheduling Considering Variable Disaster Aspects
Human beings have suffered from disasters continuously, therefore, the post-disaster efforts to reduce additional damages have been widely conducted. In this study, we focused on the repair crew scheduling to ...
-
Chapter and Conference Paper
Cognitive-Task-Based Information Aid Design for Clinical Diagnosis
Clinical diagnosis systems are increasingly supported by advanced information technology but enhancing human diagnosis performance with intelligent aiding has not been found guaranteed. Diagnosis is an intense...
-
Chapter and Conference Paper
Predicting Multiple Pregras** Poses by Combining Deep Convolutional Neural Networks with Mixture Density Networks
In this paper, we propose a deep neural network to predict the pregrasp poses of a three-dimensional (3D) object. Specifically, a single RGB-D image is used to determine multiple pregrasp position of three fin...