Search
Search Results
-
The Retracing Boomerang Attack, with Application to Reduced-Round AES
Boomerang attacks are extensions of differential attacks that make it possible to combine two unrelated differential properties of the first and...
-
Text summarization based on semantic graphs: an abstract meaning representation graph-to-text deep learning approach
Nowadays, due to the constantly growing amount of textual information, automatic text summarization constitutes an important research area in natural...
-
Information flow control for comparative privacy analyses
The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...
-
Trust attack prevention based on Spark-blockchain in social IoT: a survey
Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects...
-
Construction of all even lengths type-II Z-complementary pair with a large zero-correlation zone
This paper presents a direct construction of type-II Z-complementary pair (ZCP) of q -ary ( q is even) for all even lengths with a wide...
-
Decentralized traffic management of autonomous drones
Coordination of local and global aerial traffic has become a legal and technological bottleneck as the number of unmanned vehicles in the common...
-
Virtual home staging and relighting from a single panorama under natural illumination
Virtual staging technique can digitally showcase a variety of real-world scenes. However, relighting indoor scenes from a single image is challenging...
-
Exploring the potential of Easy Language for enhancing website sustainability
Sustainable design principles have become increasingly important in website development, mainly focusing on reducing carbon emissions and energy...
-
Evaluation of data augmentation techniques on subjective tasks
Data augmentation is widely applied in various computer vision problems for artificially increasing the size of a dataset by transforming the...
-
Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency
Polynomial commitments schemes are a powerful tool that enables one party to commit to a polynomial p of degree d , and prove that the committed...
-
Examining ALS: reformed PCA and random forest for effective detection of ALS
ALS (Amyotrophic Lateral Sclerosis) is a fatal neurodegenerative disease of the human motor system. It is a group of progressive diseases that...
-
MyBioethics: How Ed-Tech Enables Discovery-Driven Empirical Bioethics Research
Digital tools have granted new opportunities to engage people with bioethical discussion and rehearsed decision-making. The ongoing development of...
-
Emotion AWARE: an artificial intelligence framework for adaptable, robust, explainable, and multi-granular emotion analysis
Emotions are fundamental to human behaviour. How we feel, individually and collectively, determines how humanity evolves and advances into our shared...
-
Continual learning approaches to hand–eye calibration in robots
This study addresses the problem of hand–eye calibration in robotic systems by develo** Continual Learning (CL)-based approaches. Traditionally,...
-
Survey-based analysis of cybersecurity awareness of Turkish seafarers
In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...
-
The Price of Active Security in Cryptographic Protocols
We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting,...
-
MDUNet: deep-prior unrolling network with multi-parameter data integration for low-dose computed tomography reconstruction
The goal of this study is to reconstruct a high-quality computed tomography (CT) image from low-dose acquisition using an unrolling deep...
-
An adversarial sample detection method based on heterogeneous denoising
Deep learning has been used in many computer-vision-based applications. However, deep neural networks are vulnerable to adversarial examples that...