-
Chapter and Conference Paper
Practical and Theoretical Cryptanalysis of VOX
VOX is a UOV-like hash-and-sign signature scheme from the Multivariate Quadratic (MQ) family, which has been submitted to NIST Post-Quantum Cryptography Project, in response to NIST’s Call for Additional Digit...
-
Chapter and Conference Paper
Iterative Deep Graph Learning with Local Feature Augmentation for Network Alignment
Networks are structures that naturally capture relations between entities in different data sources and information systems. To establish the connections among different networks, the task of network alignment...
-
Chapter and Conference Paper
Design of Automatic Control System for Indoor Lighting
With the development of science and technology, the waste of indoor power is relatively serious, ...
-
Chapter and Conference Paper
Infrared Object Detection Algorithm Based on Spatial Feature Enhancement
Focusing on the problems of CenterNet in infrared images, such as feature loss and insufficient information utilization, an improved algorithm based on spatial feature enhancement is proposed. Firstly, a frequ...
-
Chapter and Conference Paper
Link-Efficiency Multi-channel Transmission Protocol for Data Collection in UASNs
With the burgeoning of underwater Internet of things, the amount of data generated by sensor nodes increases dramatically in UASNs, requiring efficient data collection schemes. The data collection process main...
-
Chapter and Conference Paper
AreaTransfer: A Cross-City Crowd Flow Prediction Framework Based on Transfer Learning
Urban transfer learning transfers knowledge from the data-rich city to the data-scarce city, effectively solving the cold-start crowd flow prediction problem. In urban transfer learning, the selection of sourc...
-
Article
Two-Level Community-Based Routing in Delay Tolerant Networks
Delay tolerant networks can not maintain end-to-end connectivity. Thus the routing is one of the critical issues. As we known, the two-level community model including the small community and the big community ...
-
Chapter and Conference Paper
A Mutation Approach of Detecting SQL Injection Vulnerabilities
As Internet is increasingly prosperous, Web services become more common in our social life. As users can access pages on the Web directly, Web application plays a vital role in various domains such as e-financ...
-
Chapter and Conference Paper
AALRSMF: An Adaptive Learning Rate Schedule for Matrix Factorization
Stochastic gradient descent (SGD) is an effective algorithm to solve matrix factorization problem. However, the performance of SGD depends critically on how learning rates are tuned over time. In this paper, w...
-
Chapter and Conference Paper
CoSoLoRec: Joint Factor Model with Content, Social, Location for Heterogeneous Point-of-Interest Recommendation
The pervasive use of Location-based Social Networks calls for more precise Point-of-Interest recommendation. The probability of a user’s visit to a target place is influenced by multiple factors. Though there ...
-
Chapter and Conference Paper
Social Relation Based Long-Term Vaccine Distribution Planning to Suppress Pandemic
This paper introduces a new optimization problem which aims to develop a distribution plan of vaccines which will be supplied over time such that an epidemic can be best suppressed until a complete cure for it...
-
Chapter and Conference Paper
The Worm Propagation Model with Dual Dynamic Quarantine Strategy
Internet worms are becoming more and more harmful with the rapid development of the Internet. Due to the extremely fast spread and great destructive power of network worms, strong dynamic quarantine strategies...