We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. The Retracing Boomerang Attack, with Application to Reduced-Round AES

    Boomerang attacks are extensions of differential attacks that make it possible to combine two unrelated differential properties of the first and...

    Orr Dunkelman, Nathan Keller, ... Adi Shamir in Journal of Cryptology
    Article Open access 15 July 2024
  2. Text summarization based on semantic graphs: an abstract meaning representation graph-to-text deep learning approach

    Nowadays, due to the constantly growing amount of textual information, automatic text summarization constitutes an important research area in natural...

    Panagiotis Kouris, Georgios Alexandridis, Andreas Stafylopatis in Journal of Big Data
    Article Open access 14 July 2024
  3. Information flow control for comparative privacy analyses

    The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...

    Zubair Ahmad, Stefano Calzavara, ... Ben Stock in International Journal of Information Security
    Article 14 July 2024
  4. Trust attack prevention based on Spark-blockchain in social IoT: a survey

    Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects...

    Mariam Masmoudi, Ikram Amous, ... Florence Sèdes in International Journal of Information Security
    Article 13 July 2024
  5. Construction of all even lengths type-II Z-complementary pair with a large zero-correlation zone

    This paper presents a direct construction of type-II Z-complementary pair (ZCP) of q -ary ( q is even) for all even lengths with a wide...

    Piyush Priyanshu, Subhabrata Paul, Sudhan Majhi in Cryptography and Communications
    Article 12 July 2024
  6. Decentralized traffic management of autonomous drones

    Coordination of local and global aerial traffic has become a legal and technological bottleneck as the number of unmanned vehicles in the common...

    Boldizsár Balázs, Tamás Vicsek, ... Gábor Vásárhelyi in Swarm Intelligence
    Article Open access 11 July 2024
  7. Virtual home staging and relighting from a single panorama under natural illumination

    Virtual staging technique can digitally showcase a variety of real-world scenes. However, relighting indoor scenes from a single image is challenging...

    Guanzhou Ji, Azadeh O. Sawyer, Srinivasa G. Narasimhan in Machine Vision and Applications
    Article Open access 11 July 2024
  8. Evaluation of data augmentation techniques on subjective tasks

    Data augmentation is widely applied in various computer vision problems for artificially increasing the size of a dataset by transforming the...

    Luis Gonzalez-Naharro, M. Julia Flores, ... Jose M. Puerta in Machine Vision and Applications
    Article 11 July 2024
  9. Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency

    Polynomial commitments schemes are a powerful tool that enables one party to commit to a polynomial p of degree d , and prove that the committed...

    Giacomo Fenzi, Hossein Moghaddas, Ngoc Khanh Nguyen in Journal of Cryptology
    Article Open access 10 July 2024
  10. Examining ALS: reformed PCA and random forest for effective detection of ALS

    ALS (Amyotrophic Lateral Sclerosis) is a fatal neurodegenerative disease of the human motor system. It is a group of progressive diseases that...

    Abdullah Alqahtani, Shtwai Alsubai, ... Ashit Kumar Dutta in Journal of Big Data
    Article Open access 10 July 2024
  11. Emotion AWARE: an artificial intelligence framework for adaptable, robust, explainable, and multi-granular emotion analysis

    Emotions are fundamental to human behaviour. How we feel, individually and collectively, determines how humanity evolves and advances into our shared...

    Gihan Gamage, Daswin De Silva, ... Milos Manic in Journal of Big Data
    Article Open access 10 July 2024
  12. Continual learning approaches to hand–eye calibration in robots

    This study addresses the problem of hand–eye calibration in robotic systems by develo** Continual Learning (CL)-based approaches. Traditionally,...

    Ozan Bahadir, Jan Paul Siebert, Gerardo Aragon-Camarasa in Machine Vision and Applications
    Article Open access 10 July 2024
  13. Survey-based analysis of cybersecurity awareness of Turkish seafarers

    In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...

    Ivar Moen, Aybars Oruc, ... Georgios Kavallieratos in International Journal of Information Security
    Article Open access 10 July 2024
  14. The Price of Active Security in Cryptographic Protocols

    We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting,...

    Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss in Journal of Cryptology
    Article Open access 10 July 2024
  15. MDUNet: deep-prior unrolling network with multi-parameter data integration for low-dose computed tomography reconstruction

    The goal of this study is to reconstruct a high-quality computed tomography (CT) image from low-dose acquisition using an unrolling deep...

    Temitope Emmanuel Komolafe, Nizhuan Wang, ... Liang Zhou in Machine Vision and Applications
    Article 09 July 2024
  16. An adversarial sample detection method based on heterogeneous denoising

    Deep learning has been used in many computer-vision-based applications. However, deep neural networks are vulnerable to adversarial examples that...

    Lifang Zhu, Chao Liu, ... **ntao Ding in Machine Vision and Applications
    Article 09 July 2024
  17. A framework of specialized knowledge distillation for Siamese tracker on challenging attributes

    In recent years, Siamese network-based trackers have achieved significant improvements in real-time tracking. Despite their success, performance...

    Yiding Li, Atsushi Shimada, ... Cheng Tang in Machine Vision and Applications
    Article 09 July 2024
  18. Using the ACE framework to enforce access and usage control with notifications of revoked access rights

    The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...

    Marco Rasori, Andrea Saracino, ... Marco Tiloca in International Journal of Information Security
    Article Open access 08 July 2024
  19. End-to-End No-wait Scheduling for Time-Triggered Streams in Mixed Wired-Wireless Networks

    Proprietary communication technologies for time-critical communication in industrial environments are being gradually replaced by Time-sensitive...

    Gourav Prateek Sharma, Wouter Tavernier, ... Ingrid Moerman in Journal of Network and Systems Management
    Article Open access 08 July 2024
Did you find what you were looking for? Share feedback.