We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 10,000 results
  1. DUTD: A Deeper Understanding of Trajectory Data for User Identity Linkage

    The widespread adoption of mobile devices and sensing technologies has significantly boosted the availability of trajectory data, thereby...
    Qian Li, Qian Zhou, ... Lei Zhao in Web and Big Data
    Conference paper 2024
  2. Fine-Grained Truck Re-identification: A Challenge

    In intelligent transportation and smart city, truck re-identification (Re-ID) is a crucial task in controlling traffic violations of laws and...

    Si-Bao Chen, Zi-Han Lin, ... Bin Luo in Cognitive Computation
    Article 13 June 2023
  3. Case Study: Global Urban Computing AI Challenge

    This chapter will use a question in the 2019 Tianchi Competition (namely “Global Urban Computing AI Challenge: Metro Passenger Flow Forecast”, as...
    Wang He, Peng Liu, Qian Qian in Machine Learning Contests: A Guidebook
    Chapter 2023
  4. Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property

    Provable data possession (PDP) protocol is a mechanism that guarantees the integrity of user’s cloud data, and many efficient protocols have been...

    Yanyan Ji, Bilin Shao, ... Genqing Bian in Cluster Computing
    Article 09 September 2021
  5. Unique-Path Identity Based Encryption with Applications to Strongly Secure Messaging

    Hierarchical Identity Based Encryption (HIBE) is a well studied, versatile tool used in many cryptographic protocols. Yet, since the performance of...
    Paul Rösler, Daniel Slamanig, Christoph Striecks in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  6. MIPI 2022 Challenge on RGBW Sensor Re-mosaic: Dataset and Report

    Develo** and integrating advanced image sensors with novel algorithms in camera systems is prevalent with the increasing demand for computational...
    Qingyu Yang, Guang Yang, ... Faming Fang in Computer Vision – ECCV 2022 Workshops
    Conference paper 2023
  7. The identity-level angular triplet loss for cross-age face recognition

    Despite promising progress has been achieved on face recognition problems, cross-age face recognition remains a challenging task due to its age...

    **aoyu Chen, Henry Y. K. Lau in Applied Intelligence
    Article 07 September 2021
  8. Identity-based public data integrity verification scheme in cloud storage system via blockchain

    Almost all existing data integrity verification schemes upload outsourced files and tags set to the CSP simultaneously. Thus, in this paper, we...

    Yilin Yuan, Jianbiao Zhang, ... Zheng Li in The Journal of Supercomputing
    Article 10 January 2022
  9. Identity Platforms and Anti-LGBTQ+ Legislation: Implications for Safeguarding Personal Data

    Little is known about how digital identity platforms can be managed and operated in countries where governments have introduced...
    Katherine Wyers, Brian Nicholson, ... Silvia Masiero in After Latour: Globalisation, Inequity and Climate Change
    Conference paper 2023
  10. Identity-Based Encryption from LWE with More Compact Master Public Key

    This paper presents an adaptively secure identity-based encryption (IBE) scheme from Learning With Errors (LWE) in the standard model. Compared to...
    Conference paper 2024
  11. Facial-sketch Synthesis: A New Challenge

    This paper aims to conduct a comprehensive study on facial-sketch synthesis (FSS). However, due to the high cost of obtaining hand-drawn sketch...

    Deng-** Fan, Ziling Huang, ... Luc Van Gool in Machine Intelligence Research
    Article Open access 30 July 2022
  12. On the Identity and Group Problems for Complex Heisenberg Matrices

    We study the Identity Problem, the problem of determining if a finitely generated semigroup of matrices contains the identity matrix; see Problem 3...
    Paul C. Bell, Reino Niskanen, ... Pavel Semukhin in Reachability Problems
    Conference paper 2023
  13. MIPI 2022 Challenge on Quad-Bayer Re-mosaic: Dataset and Report

    Develo** and integrating advanced image sensors with novel algorithms in camera systems is prevalent with the increasing demand for computational...
    Qingyu Yang, Guang Yang, ... Qiaosi Yi in Computer Vision – ECCV 2022 Workshops
    Conference paper 2023
  14. Efficient identity-based encryption with Hierarchical key-insulation from HIBE

    Hierarchical key-insulated identity-based encryption (HKIBE) is identity-based encryption (IBE) that allows users to update their secret keys to...

    Keita Emura, Atsushi Takayasu, Yohei Watanabe in Designs, Codes and Cryptography
    Article Open access 03 September 2021
  15. Making the Identity-Based Diffie–Hellman Key Exchange Efficiently Revocable

    We propose an efficient identity-based authenticated-key exchange (IB-AKE) protocol that is equipped with scalable key revocation. Our protocol...
    Kohei Nakagawa, Atsushi Fujioka, ... Kan Yasuda in Progress in Cryptology – LATINCRYPT 2023
    Conference paper 2023
  16. Attack and improvement of the recent identity-based encryption with authorized equivalence test in cluster computing

    Recently, Elhabob et al. proposed an identity-based encryption with authorized equivalence test (IBE-AET), which allows authorized testers to check...

    Seongbong Choi, Hyung Tae Lee in Cluster Computing
    Article 20 October 2021
  17. Hierarchical Identity-Based Inner Product Functional Encryption for Unbounded Hierarchical Depth

    Cloud computing is becoming popular with emerging applications in big data analysis, online storage, e-commerce, social network, accounting, and...
    Anushree Belel, Ratna Dutta, Sourav Mukhopadhyay in Stabilization, Safety, and Security of Distributed Systems
    Conference paper 2023
  18. A comprehensive survey on object detection in Visual Art: taxonomy and challenge

    Cultural heritage data plays a key role in the understanding of past human history and culture, enriches the present and prepares the future. A...

    Siwar Bengamra, Olfa Mzoughi, ... Ezzeddine Zagrouba in Multimedia Tools and Applications
    Article 03 July 2023
  19. Blockchain-Based Self-Sovereign Identity System with Attribute-Based Issuance

    With the rapid development of blockchain applications, digital identity management systems have started being deployed on decentralized networks....
    Yi-Hsiu Lee, Zi-Yuan Liu, ... Yi-Fan Tseng in Information Security Practice and Experience
    Conference paper 2022
  20. EnergyCIDN: Enhanced Energy-Aware Challenge-Based Collaborative Intrusion Detection in Internet of Things

    With cyber attacks becoming more complex and advanced, a separate intrusion detection system (IDS) is believed to be insufficient for protecting the...
    Wenjuan Li, Philip Rosenberg, ... Michael Han in Algorithms and Architectures for Parallel Processing
    Conference paper 2023
Did you find what you were looking for? Share feedback.