We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. A Boolean circuit-based revocable ciphertext policy attribute-based encryption scheme

    Attribute-based encryption is a new cryptographic primitive that supports fine-grained access control of cloud data, and its access control function...

    Chao Ma, Haiying Gao, Bin Hu in The Journal of Supercomputing
    Article 02 February 2024
  2. Tri-level attribute reduction based on neighborhood rough sets

    Tri-level attribute reduction is an interesting topic that aims to reduce the data dimensionality from different levels and granularity perspectives....

    Lianhui Luo, Jilin Yang, ... Junfang Luo in Applied Intelligence
    Article 08 March 2024
  3. Graph-based dynamic attribute clip** for conversational recommendation

    Conversational recommender systems (CRS) enable traditional recommender systems to interact with users by asking questions about their preferences...

    Li Zhang, Yiwen Zhang, ... Shuying Liu in Discover Computing
    Article Open access 10 May 2024
  4. Scattering-based hybrid network for facial attribute classification

    Face attribute classification (FAC) is a high-profile problem in biometric verification and face retrieval. Although recent research has been devoted...

    Na Liu, Fan Zhang, ... Fuqing Duan in Frontiers of Computer Science
    Article 25 November 2023
  5. Attribute-based document image retrieval

    This paper explores the use of attributes for document image querying and retrieval. Existing document image retrieval techniques present several...

    Article 17 July 2023
  6. An improved decision tree algorithm based on boundary mixed attribute dependency

    As an effective extension of rough set theory, the variable precision neighborhood rough set model has been applied to the attribute dependency-based...

    Bowen Lin, Caihui Liu, Duoqian Miao in Applied Intelligence
    Article 30 January 2024
  7. WalkNAR: A neighborhood rough sets-based attribute reduction approach using random walk

    Neighborhood rough sets, as an effective tool for processing numerical data, is widely used in many fields, such as data mining, machine learning and...

    Haibo Li, Wuyang **ong, ... **aojun **e in Applied Intelligence
    Article 03 June 2024
  8. Registered Attribute-Based Signature

    This paper introduces the notion of registered attribute-based signature (registered ABS). Distinctly different from classical attribute-based...
    Yijian Zhang, Jun Zhao, ... Jie Chen in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  9. Community anomaly detection in attribute networks based on refining context

    With the widespread use of attribute networks, anomalous node detection on attribute networks has received increasing attention. By utilizing...

    Yonghui Lin, Li Xu, ... Jiayin Li in Computing
    Article 04 April 2024
  10. Cluster-based two-branch framework for point cloud attribute compression

    Owing to the irregular distribution of point clouds in 3D space, effectively compressing the point cloud is still challenging. Recently, numerous...

    Longhua Sun, ** Wang, ... Jiawen Yu in The Visual Computer
    Article 25 November 2023
  11. Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system

    Electronic healthcare systems can offer convenience but face the risk of data forgery and information leakage. To solve these issues, we propose an...

    Article 23 March 2024
  12. Designing quantum-secure attribute-based encryption

    In the last couple of decades, Attribute-Based Encryption (ABE) has been a promising encryption technique to realize fine-grained access control over...

    Y. Sreenivasa Rao, Vikas Srivastava, ... Sumit Kumar Debnath in Cluster Computing
    Article 22 June 2024
  13. Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding

    In this work, we present two generic frameworks for leakage-resilient attribute-based encryption (ABE), which is an improved version of ABE that can...
    Yijian Zhang, Yunhao Ling, ... Lu** Wang in Information Security and Cryptology – ICISC 2023
    Conference paper 2024
  14. Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing

    Verifiable outsourced attribute-based encryption (VO-ABE) enables one-to-many data sharing and fine-grained access control under lower trust, making...

    **aolong Zhao, Zhenjie Huang in Cluster Computing
    Article 06 May 2024
  15. Attribute augmentation-based label integration for crowdsourcing

    Crowdsourcing provides an effective and low-cost way to collect labels from crowd workers. Due to the lack of professional knowledge, the quality of...

    Yao Zhang, Liangxiao Jiang, Chaoqun Li in Frontiers of Computer Science
    Article 24 December 2022
  16. BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud

    Cloud computing technology offers flexible and expedient services that carry a variety of profits for both societies as well as individuals....

    M. Pavithra, M. Prakash, V. Vennila in Journal of Cloud Computing
    Article Open access 05 January 2024
  17. Metapath and attribute-based academic collaborator recommendation in heterogeneous academic networks

    Academic collaboration is fundamental to the advancement of scientific research. However, with the growing number of publications and researchers, it...

    Hui Li, Yaohua Hu in Scientometrics
    Article 27 May 2024
  18. DiffuseRoll: multi-track multi-attribute music generation based on diffusion model

    Recent advances in generative models have shown remarkable progress in music generation. However, since most existing methods focus on generating...

    Hongfei Wang, Yi Zou, ... Long Ye in Multimedia Systems
    Article 17 January 2024
  19. Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

    With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot....

    Liang Yan, Lina Ge, ... Zheng Hu in Journal of Cloud Computing
    Article Open access 18 April 2023
  20. Improving fashion captioning via attribute-based alignment and multi-level language model

    Fashion captioning aims to generate detailed and captivating descriptions based on a group of item images. It requires the model to precisely...

    Yuhao Tang, Liyan Zhang, ... Zhixian Chen in Applied Intelligence
    Article 25 November 2023
Did you find what you were looking for? Share feedback.