![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Adaptive multi-object tracking algorithm based on split trajectory
Multi-object tracking (MOT) has wide-ranging applications in unmanned vehicles, military reconnaissance, and video surveillance. However, real-world scenes present significant challenges to the tracking proces...
-
Article
Exert Diversity and Mitigate Bias: Domain Generalizable Person Re-identification with a Comprehensive Benchmark
Person re-identification (ReID), aiming at retrieving persons of the same identity across non-overlap** cameras, holds immense practical significance for security and surveillance applications. In pursuit of...
-
Article
Open AccessMental imagery scaffolding: The effects of detail richness and text load on geography learning
The growing importance of 3D animations in current teaching approaches becomes increasingly apparent, offering an effective way to visualize complex spatial concepts and processes in geography learning through...
-
Chapter and Conference Paper
Fill the K-Space and Refine the Image: Prompting for Dynamic and Multi-Contrast MRI Reconstruction
The key to dynamic or multi-contrast magnetic resonance imaging (MRI) reconstruction lies in exploring inter-frame or inter-contrast information. Currently, the unrolled model, an approach combining iterative ...
-
Chapter and Conference Paper
IKE: Threshold Key Escrow Service with Intermediary Encryption
Blockchain has gained significant attention for its potential to revolutionize various fields. The security of the blockchain system heavily relies on private key management, and traditional key management sch...
-
Chapter and Conference Paper
A Moderated Mediation Analysis of Meaningfulness and Positive Intergroup Outcomes Through Prosocial Gameplay
This study examines how the meaningfulness of a story influences empathy and attitudes towards racial or ethnic outgroups through a prosocial video game that features meaningful dialogic encounters with a fict...
-
Chapter and Conference Paper
Cross-Camera Prototype Learning for Intra-camera Supervised Person Re-identification
Person Re-Identification (ReID) aims at retrieving images of the specific pedestrian across disjoint cameras. However, the annotations are extremely costly as the number of cameras increases, which derives a n...
-
Article
Small-signal stability and robustness analysis for microgrids under time-constrained DoS attacks and a mitigation adaptive secondary control method
With the close integration of cyber and power systems, the consensus-based secondary frequency control in a microgrid is increasingly vulnerable to communication failures such as transmission delays and denial...
-
Chapter and Conference Paper
Continuous Weighted Neural Cognitive Diagnosis Method for Online Education
With the rapid development of online education, extensive data records from online education are accumulated in large quantities, therefore the educational evaluation industry is of great potential. Cognitive ...
-
Chapter and Conference Paper
Tracking Multi-objects with Anchor-Free Siamese Network
Single object tracker based on siamese neural network have become one of the most popular frameworks in this field for its strong discrimination ability and high efficiency. However, when the task switch to mu...
-
Chapter and Conference Paper
PEPEC: Precomputed ECC Points Embedded in Certificates and Verified by CT Log Servers
Elliptic curve cryptography (ECC) is respected in public key infrastructures (PKIs) due to its high performance and small key size. However, for some client devices with limited computing resources, signature ...
-
Chapter and Conference Paper
X-FTPC: A Fine-Grained Trust Propagation Control Scheme for Cross-Certification Utilizing Certificate Transparency
Cross-certification plays a fundamental role in facilitating the interconnection between different root stores in public key infrastructure (PKI). However, the existing trust management schemes (e.g., certificate...
-
Article
Open AccessPrivacy preserving divisible double auction with a hybridized TEE-blockchain system
Double auction mechanisms have been designed to trade a variety of divisible resources (e.g., electricity, mobile data, and cloud resources) among distributed agents. In such divisible double auction, all the ...
-
Article
Deep representation-based packetized predictive compensation for networked nonlinear systems
The design of networked nonlinear control system is a very challenging problem due to the coupling of the system uncertainties (e.g., model accuracy, noise, nonlinearity) and network effects (e.g., packet drop...
-
Chapter and Conference Paper
Multi Beam Forming Algorithms of LEO Constellation Satellite
Since the 21st century, the development of mobile Internet and Internet of things technology has introduced new development opportunities for the field of communication satellites. A large number of researcher...
-
Chapter and Conference Paper
Massive Flights Real-Time Rerouting Planning Based on Parallel Discrete Potential Field Method
Severe weather is an important reason that threatens the safety of air transportation. As the flights grow, path planning for massive aircraft is becoming an important problem for rerouting. This paper propose...
-
Chapter and Conference Paper
PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitor
Certificate Transparency (CT) is proposed to detect maliciously or mistakenly issued certificates by recording all certificates in publicly-visible logs. CT assumes that any individual can undertake the role o...
-
Chapter and Conference Paper
Efficient and Private Divisible Double Auction in Trusted Execution Environment
Auction mechanisms for exchanging divisible resources (e.g., electricity, cloud resources, and network bandwidth) among distributed agents have been extensively studied. In particular, divisible double auction...
-
Article
Fine-grained management of I/O optimizations based on workload characteristics
With the advent of new computing paradigms, parallel file systems serve not only traditional scientific computing applications but also non-scientific computing applications, such as financial computing, busin...
-
Chapter and Conference Paper
Elaphurus: Ensemble Defense Against Fraudulent Certificates in TLS
Recent security incidents indicate that certificate authorities (CAs) might be compromised to sign certificates with fraudulent information. The fraudulent certificates are exploited to launch successful TLS m...