Search
Search Results
-
DUTD: A Deeper Understanding of Trajectory Data for User Identity Linkage
The widespread adoption of mobile devices and sensing technologies has significantly boosted the availability of trajectory data, thereby... -
Fine-Grained Truck Re-identification: A Challenge
In intelligent transportation and smart city, truck re-identification (Re-ID) is a crucial task in controlling traffic violations of laws and...
-
Case Study: Global Urban Computing AI Challenge
This chapter will use a question in the 2019 Tianchi Competition (namely “Global Urban Computing AI Challenge: Metro Passenger Flow Forecast”, as... -
Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
Provable data possession (PDP) protocol is a mechanism that guarantees the integrity of user’s cloud data, and many efficient protocols have been...
-
Unique-Path Identity Based Encryption with Applications to Strongly Secure Messaging
Hierarchical Identity Based Encryption (HIBE) is a well studied, versatile tool used in many cryptographic protocols. Yet, since the performance of... -
MIPI 2022 Challenge on RGBW Sensor Re-mosaic: Dataset and Report
Develo** and integrating advanced image sensors with novel algorithms in camera systems is prevalent with the increasing demand for computational... -
The identity-level angular triplet loss for cross-age face recognition
Despite promising progress has been achieved on face recognition problems, cross-age face recognition remains a challenging task due to its age...
-
Identity-based public data integrity verification scheme in cloud storage system via blockchain
Almost all existing data integrity verification schemes upload outsourced files and tags set to the CSP simultaneously. Thus, in this paper, we...
-
Identity Platforms and Anti-LGBTQ+ Legislation: Implications for Safeguarding Personal Data
Little is known about how digital identity platforms can be managed and operated in countries where governments have introduced... -
Identity-Based Encryption from LWE with More Compact Master Public Key
This paper presents an adaptively secure identity-based encryption (IBE) scheme from Learning With Errors (LWE) in the standard model. Compared to... -
Facial-sketch Synthesis: A New Challenge
This paper aims to conduct a comprehensive study on facial-sketch synthesis (FSS). However, due to the high cost of obtaining hand-drawn sketch...
-
On the Identity and Group Problems for Complex Heisenberg Matrices
We study the Identity Problem, the problem of determining if a finitely generated semigroup of matrices contains the identity matrix; see Problem 3... -
MIPI 2022 Challenge on Quad-Bayer Re-mosaic: Dataset and Report
Develo** and integrating advanced image sensors with novel algorithms in camera systems is prevalent with the increasing demand for computational... -
Efficient identity-based encryption with Hierarchical key-insulation from HIBE
Hierarchical key-insulated identity-based encryption (HKIBE) is identity-based encryption (IBE) that allows users to update their secret keys to...
-
Making the Identity-Based Diffie–Hellman Key Exchange Efficiently Revocable
We propose an efficient identity-based authenticated-key exchange (IB-AKE) protocol that is equipped with scalable key revocation. Our protocol... -
Attack and improvement of the recent identity-based encryption with authorized equivalence test in cluster computing
Recently, Elhabob et al. proposed an identity-based encryption with authorized equivalence test (IBE-AET), which allows authorized testers to check...
-
Hierarchical Identity-Based Inner Product Functional Encryption for Unbounded Hierarchical Depth
Cloud computing is becoming popular with emerging applications in big data analysis, online storage, e-commerce, social network, accounting, and... -
A comprehensive survey on object detection in Visual Art: taxonomy and challenge
Cultural heritage data plays a key role in the understanding of past human history and culture, enriches the present and prepares the future. A...
-
Blockchain-Based Self-Sovereign Identity System with Attribute-Based Issuance
With the rapid development of blockchain applications, digital identity management systems have started being deployed on decentralized networks.... -
EnergyCIDN: Enhanced Energy-Aware Challenge-Based Collaborative Intrusion Detection in Internet of Things
With cyber attacks becoming more complex and advanced, a separate intrusion detection system (IDS) is believed to be insufficient for protecting the...