Search
Search Results
-
Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm
A novel quantum-safe key encapsulation algorithm, called Multivariate Polynomial Public Key (MPPK), was recently proposed by Kuang, Perepechaenko,...
-
Extract Implicit Semantic Friends and Their Influences from Bipartite Network for Social Recommendation
Social recommendation often incorporates trusted social links with user-item interactions to enhance rating prediction. Although methods that...
-
Errorless robust JPEG steganography using steganographic polar codes
Recently, a robust steganographic algorithm that achieves errorless robustness against JPEG recompression has been proposed. The method employs a...
-
Mining digital identity insights: patent analysis using NLP
The field of digital identity innovation has grown significantly over the last 30 years, with over 6000 technology patents registered worldwide....
-
The risk of negative feedback loops in some weighted measures of crime harm
Analyses of crime based upon aggregate counts of different crime types have restricted value, because they count all crime types equally irrespective...
-
Technology is key to green coal mining
Greening of coal through sustainable mining in India requires extensive deployment of technology. This article briefly highlights the role of...
-
Multi-view Heterogeneous Graph Neural Networks for Node Classification
Recently, with graph neural networks (GNNs) becoming a powerful technique for graph representation, many excellent GNN-based models have been...
-
Graph-Enhanced Prompt Learning for Personalized Review Generation
Personalized review generation is significant for e-commerce applications, such as providing explainable recommendation and assisting the composition...
-
The fight against disinformation and its consequences: measuring the impact of “Russia state-affiliated media” on Twitter
On February 28th, shortly after the Russian invasion of Ukraine on February 24th, Twitter announced the expansion of its labelling policy for “Russia...
-
Channel-Enhanced Contrastive Cross-Domain Sequential Recommendation
Sequential recommendation help users find interesting items by modeling the dynamic user-item interaction sequences. Due to the data sparseness...
-
Conti Inc.: understanding the internal discussions of a large ransomware-as-a-service operator with machine learning
Ransomware-as-a-service (RaaS) is increasing the scale and complexity of ransomware attacks. Understanding the internal operations behind RaaS has...
-
Erdos: A Novel Blockchain Consensus Algorithm with Equitable Node Selection and Deterministic Block Finalization
The introduction of blockchain technology has brought about significant transformation in the realm of digital transactions, providing a secure and...
-
Understanding the impact of urban heat islands on crime: insights from temperature, population density, and green canopy cover
Emergent literature suggests that micro- and macro-climates influence criminal behaviour; a complex phenomenon that is still incipient in theory...
-
Positive behaviour interventions in online gaming: a systematic review of strategies applied in other environments
BackgroundDisruptive behaviours are a recurrent concern in online gaming and are usually dealt with through reactive and punitive strategies....
-
Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection
The orientation of emerging technologies on the Internet is moving toward decentralisation. Botnets have always been one of the biggest threats to...
-
AutoDetect: Novel Autoencoding Architecture for Counterfeit IC Detection
The global electronic supply chain industry is a complex and interconnected network of companies, organizations, and individuals that collaborate to...
-
Contribution to the harm assessment of darknet markets: topic modelling drug reviews on Dark0de Reborn
Amid the global opioid crisis, the volume of drug trade via darknet markets has risen to an all-time high. The steady increase can be explained by...
-
Exploring police attitudes on victims’ delayed reporting and victim blame in technology-facilitated IPV
Background settingCyberstalking, now conceptualised as one of the forms of technology-facilitated intimate partner violence (TFIPV), has seen an...
-
ViSE: Digital Twin Exploration for Automotive Functional Safety and Cybersecurity
The automotive industry relies on modern automobile systems, which are complex distributed embedded systems. These systems consist of numerous...
-
An empirical assessment of seaports as facilitators of FOC-flagged transshipment landings
Transshipment is one of the most common activities occurring between carriers and fishing vessels to exchange fish, as well as fuel, crew, and gear...