We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 10,000 results
  1. Robust T-Loss for Medical Image Segmentation

    This paper presents a new robust loss function, the T-Loss, for medical image segmentation. The proposed loss is based on the negative log-likelihood...
    Alvaro Gonzalez-Jimenez, Simone Lionetti, ... Alexander A. Navarini in Medical Image Computing and Computer Assisted Intervention – MICCAI 2023
    Conference paper 2023
  2. Adaptive Prototype Triplet Loss for Cross-Resolution Face Recognition

    Although face recognition has achieved great success in many areas, cross-resolution face recognition (CRFR) still remains a challenging task due to...
    Yongru Chen, Wenxian Zheng, ... Qingmin Liao in Intelligent Information Processing XII
    Conference paper 2024
  3. Ethical Reflection on Identity of AI Digital Avatars

    This article explores the impact of artificial intelligence (AI) on human identity and raises ethical concerns regarding using biometric data for...
    Conference paper 2024
  4. INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain

    Despite the rapid growth of the cyber insurance market in recent years, insurance companies in this area face several challenges, such as a lack of...

    Aristeidis Farao, Georgios Paparis, ... Christos Xenakis in International Journal of Information Security
    Article Open access 25 August 2023
  5. Identity and Access Management (IAM)

    Identity and Access Management (IAM) stands as a cornerstone in cybersecurity, orchestrating the intricate dance of user identities, permissions, and...
    Mohamed Aly Bouke in CISSP Exam Certification Companion
    Chapter 2023
  6. Whole constraint and partial triplet-center loss for infrared-visible re-identification

    In this paper, we propose a hybrid cross-dual-path feature learning network (HCDFL) to learn local discriminative characteristics and exploit a novel...

    Zhihan Lv, Songhao Zhu, ... Zhiwei Liang in Neural Computing and Applications
    Article 28 April 2022
  7. Deep Face Recognition with Cosine Boundary Softmax Loss

    To improve the accuracy of face recognition when there are wrong-labeled samples, a new deep face recognition model with cosine boundary loss is...
    Chen Zheng, Yuncheng Chen, ... Leiguang Wang in Pattern Recognition and Computer Vision
    Conference paper 2024
  8. When blockchain meets IoT: a comparison of the performance of communication protocols in a decentralized identity solution for IoT using blockchain

    Internet of Things (IoT) is a rapidly expanding technology composed of devices embedded with sensors, specialized hardware, and software to connect...

    Prakhar Sharma, W. Wilfred Godfrey, Aditya Trivedi in Cluster Computing
    Article 29 December 2022
  9. Brain Intervention Therapy Dilemma: Functional Recovery versus Identity

    Neuroethics addresses the issue of transformations in personal identity induced by brain intervention therapy. The advent of Brain-Machine Interfaces...
    Kenta Kitamura, Mhd Irvan, Rie Shigetomi Yamaguchi in Brain Informatics
    Conference paper 2023
  10. Adv-Triplet Loss for Sparse Attack on Facial Expression Recognition

    The susceptibility of current Deep Neural Networks (DNNs) to adversarial examples has been a significant concern in deep learning methods. In...
    Weitao Li, Shijun Li, Lin Shang in PRICAI 2023: Trends in Artificial Intelligence
    Conference paper 2024
  11. A Bitcoin-Based Digital Identity Model for the Internet of Things

    Cybersecurity in the Internet of Things (IoT), at its heart, relies on the digital identity concept to build security mechanisms such as...
    Youakim Badr, **aoyang Zhu, ... Soumya Banerjee in Information Security Theory and Practice
    Conference paper 2024
  12. The role of students’ relational identity and autotelic experience for their innovative and continuous use of e-learning

    Over the last decades, using e-learning systems as an alternative format of education for traditional classroom has been growing in higher education...

    Morteza Akbari, Mozhgan Danesh, ... Omid Noroozi in Education and Information Technologies
    Article 10 August 2022
  13. An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking

    Named data networking (NDN) has been viewed as a promising future Internet architecture due to its data-centric design. It requires a new security...

    Article Open access 17 November 2022
  14. Boosting facial recognition capability for faces wearing masks using attention augmented residual model with quadruplet loss

    Masked face recognition gained importance after the outbreak of COVID-19 when people started wearing facial masks to protect themselves against...

    Muhammad Aasharib Nawshad, Ahsan Saadat, Muhammad Moazam Fraz in Machine Vision and Applications
    Article 20 September 2023
  15. Single image dehazing via cycle-consistent adversarial networks with a multi-scale hybrid encoder-decoder and global correlation loss

    Deep learning technologies have been resha** the research of image dehazing in recent years with superior performance. Due to the difficulty to...

    Tingting Yao, Yue Liang, ... Qing Hu in Multimedia Tools and Applications
    Article 22 September 2022
  16. Receiver selective opening security for identity-based encryption in the multi-challenge setting

    Receiver selective opening (RSO) security requires that in a situation where there are one sender and multiple receivers, even if an adversary has...

    Zhengan Huang, Junzuo Lai, ... **n Mu in Designs, Codes and Cryptography
    Article 17 November 2022
  17. Identity-Preserved Face Beauty Transformation with Conditional Generative Adversarial Networks

    Abstract

    Identity-preserved face beauty transformation aims to change the beauty scale of a face image while preserving the identity of the original...

    Zhitong Huang, Ching Yee Suen in Pattern Recognition and Image Analysis
    Article 01 July 2021
  18. A Tightly Secure Identity-Based Signature Scheme from Isogenies

    We present a tightly secure identity-based signature (IBS) scheme based on the supersingular isogeny problems. Although Shaw and Dutta proposed an...
    Jiawei Chen, Hyungrok Jo, ... Junji Shikata in Post-Quantum Cryptography
    Conference paper 2023
  19. Disruption, technology and the question of (artificial) identity

    The current state of human–machine interaction has set forth a process of hybridization of human identity. Technology—and most notably AI—is used as...

    Dina Babushkina, Athanasios Votsis in AI and Ethics
    Article Open access 25 October 2021
  20. Training Parameterized Quantum Circuits with Triplet Loss

    Training parameterized quantum circuits (PQCs) is a growing research area that has received a boost from the emergence of new hybrid quantum...
    Christof Wendenius, Eileen Kuehn, Achim Streit in Machine Learning and Knowledge Discovery in Databases
    Conference paper 2023
Did you find what you were looking for? Share feedback.