Results 51 to 60 of about 156,809 (179)
Interest-Based Access Control for Content Centric Networks (extended version)
Content-Centric Networking (CCN) is an emerging network architecture designed to overcome limitations of the current IP-based Internet. One of the fundamental tenets of CCN is that data, or content, is a named and addressable entity in the network ...
Ghali, Cesar +3 more
core +1 more source
An Ordered Universal Accumulator Based on a Hash Chain
Cryptographic accumulators are now fundamental for secure applications across blockchain, IoT, and big data, powering anonymous credentials, streamlining key management, and enabling efficient data filtering.
Wenbao Jiang +3 more
doaj +1 more source
Local Descriptors Optimized for Average Precision
Extraction of local feature descriptors is a vital stage in the solution pipelines for numerous computer vision tasks. Learning-based approaches improve performance in certain tasks, but still cannot replace handcrafted features in general. In this paper,
He, Kun, Lu, Yan, Sclaroff, Stan
core +1 more source
A Revocable Certificateless Sanitizable Signature Scheme With Batch Verification
In medical and healthcare application scenarios, data integrity and user privacy are often concerned the most. A sanitizable signature scheme is a common adopted approach since it admits an authorized person to sanitize partial sensitive information of ...
Han-Yu Lin, Tung-Tso Tsai, Hsu-Lun Wu
doaj +1 more source
Objective To verificate the performance of enzyme-linked immunosorbent assay (ELISA) in blood screening laboratory. Methods The repeatability, precision, sensitivity, specificity, compliance, detection limit and anti-interference of ELISA items in the ...
Humin LIU +4 more
doaj +1 more source
Exponential Discriminative Metric Embedding in Deep Learning
With the remarkable success achieved by the Convolutional Neural Networks (CNNs) in object recognition recently, deep learning is being widely used in the computer vision community.
Chen, Zhangling +3 more
core +1 more source
With the development of cloud computing and internet of things technology, verifiable computing has been widely used as a new computing technology. While verifiable computing brings convenience to users, there are also security challenges: data privacy ...
Tianpeng ZHANG, Zhiyu REN, Xuehui DU, Haichao WANG
doaj +5 more sources
CNN-Cert: An Efficient Framework for Certifying Robustness of Convolutional Neural Networks
Verifying robustness of neural network classifiers has attracted great interests and attention due to the success of deep neural networks and their unexpected vulnerability to adversarial perturbations.
Boopathy, Akhilan +4 more
core +1 more source
Offline Signature Verification (OSV) is a challenging pattern recognition task, especially when it is expected to generalize well on the skilled forgeries that are not available during the training.
Araabi, Babak N. +3 more
core +1 more source
Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures
The internet-of-things (also known as IoT) connects a large number of information-sensing devices to the Internet to collect all kinds of information needed in real time.
Xiuhua Lu +5 more
doaj +1 more source

