Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleDecember 2024
On the Complexity of Cryptographic Groups and Generic Group Models
AbstractEver since the seminal work of Diffie and Hellman, cryptographic (cyclic) groups have served as a fundamental building block for constructing cryptographic schemes and protocols. The security of these constructions can often be based on the ...
- research-articleDecember 2024
Unbalanced Private Set Union with Reduced Computation and Communication
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 1434–1447https://doi.org/10.1145/3658644.3690308Private set union (PSU) is a cryptographic protocol that allows two parties to compute the union of their sets without revealing anything else. Despite some efficient PSU protocols that have been proposed, they mainly focus on the balanced setting, where ...
- research-articleDecember 2024
Secure Multiparty Computation with Lazy Sharing
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 795–809https://doi.org/10.1145/3658644.3690207Secure multiparty computation (MPC) protocols enable n parties, each with private inputs, to compute a given function without leaking information beyond the outputs. One of the main approaches to designing efficient MPC protocols is to use secret ...
- research-articleNovember 2024
Dual cross-enhancement network for highly accurate dichotomous image segmentation
Computer Vision and Image Understanding (CVIU), Volume 248, Issue Chttps://doi.org/10.1016/j.cviu.2024.104122AbstractThe existing image segmentation tasks mainly focus on segmenting objects with specific characteristics, such as salient, camouflaged, and meticulous objects, etc. However, the research of highly accurate Dichotomous Image Segmentation (DIS) ...
Highlights- We design a novel model for dichotomous image segmentation (DIS) with two main modules: cross-scaling guidance (CSG) and semantic cross-transplantation (SCT). Extensive experiments on 4 challenging tasks of the DIS5K public benchmark show ...
- research-articleDecember 2024
Predictive Modeling of Information Propagation Based on Modulated Position Coded Embedded Transformer and Graph Attention Networks
CISAI '24: Proceedings of the 2024 7th International Conference on Computer Information Science and Artificial IntelligencePages 704–711https://doi.org/10.1145/3703187.3703305With the rise of social media and online communities, information dissemination and content forwarding among users have become one of the topics of great interest in the field of social network analysis. Traditional information dissemination prediction ...
-
- research-articleJanuary 2025
Unbalanced circuit-PSI from oblivious key-value retrieval
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 360, Pages 6435–6451Circuit-based Private Set Intersection (circuit-PSI) empowers two parties, a client and a server, each with input sets X and Y, to securely compute a function f on the intersection X ∩ Y while preserving the confidentiality of X ∩ Y from both parties. ...
- research-articleJanuary 2025
Learning topological representations with bidirectional graph attention network for solving job shop scheduling problem
UAI '24: Proceedings of the Fortieth Conference on Uncertainty in Artificial IntelligenceArticle No.: 196, Pages 4192–4208Existing learning-based methods for solving job shop scheduling problems (JSSP) usually use off-the-shelf GNN models tailored to undirected graphs and neglect the rich and meaningful topological structures of disjunctive graphs (DGs). This paper proposes ...
- research-articleJuly 2024
CCNet: Collaborative Camouflaged Object Detection via decoder-induced information interaction and supervision refinement network
Engineering Applications of Artificial Intelligence (EAAI), Volume 133, Issue PDhttps://doi.org/10.1016/j.engappai.2024.108328AbstractRecently, research based on the camouflaged object detection (COD) task has achieved great progress, while the collaborative camouflaged object detection (CoCOD) task is still lacking. Our research focuses on the simultaneous detection and ...
- research-articleJuly 2024
A framework for longitudinal latent factor modelling of treatment response in clinical trials with applications to Psoriatic Arthritis and Rheumatoid Arthritis
- Fabian Falck,
- Xuan Zhu,
- Sahra Ghalebikesabi,
- Matthias Kormaksson,
- Marc Vandemeulebroecke,
- Cong Zhang,
- Ruvie Martin,
- Stephen Gardiner,
- Chun Hei Kwok,
- Dominique M. West,
- Luis Santos,
- Chengeng Tian,
- Yu Pang,
- Aimee Readie,
- Gregory Ligozio,
- Kunal K. Gandhi,
- Thomas E. Nichols,
- Ann-Marie Mallon,
- Luke Kelly,
- David Ohlssen,
- George Nicholson
Journal of Biomedical Informatics (JOBI), Volume 154, Issue Chttps://doi.org/10.1016/j.jbi.2024.104641Abstract Objective:Clinical trials involve the collection of a wealth of data, comprising multiple diverse measurements performed at baseline and follow-up visits over the course of a trial. The most common primary analysis is restricted to a single, ...
Graphical abstractDisplay Omitted
- research-articleMay 2024
COMICS: End-to-End Bi-Grained Contrastive Learning for Multi-Face Forgery Detection
IEEE Transactions on Circuits and Systems for Video Technology (IEEETCSVT), Volume 34, Issue 10_Part_2Pages 10223–10236https://doi.org/10.1109/TCSVT.2024.3405563DeepFakes have raised serious societal concerns, leading to a great surge in detection-based forensics methods in recent years. Face forgery recognition is a standard detection method that usually follows a two-phase pipeline, i.e., it extracts the face ...
- research-articleJune 2024
A lightweight smoke detection network incorporated with the edge cue
Expert Systems with Applications: An International Journal (EXWA), Volume 241, Issue Chttps://doi.org/10.1016/j.eswa.2023.122583AbstractSmoke detection is essential for disaster management and timely response to fires. However, popular deep learning-based algorithms ignore key traditional features such as color and texture, causing limitations in detection. Therefore, a ...
Highlights- Propose a lightweight edge-guided smoke detection network, termed ESmokeNet.
- Feature extraction is enhanced by a mutual context embedding module (MCE).
- An anchor-free EdgeDet head pursues an effective fusion of edge cues and ...
- research-articleApril 2024
You Only Look Once in Panorama: Object Detection for 360° Videos with MLaaS
NOSSDAV '24: Proceedings of the 34th edition of the Workshop on Network and Operating System Support for Digital Audio and VideoPages 1–7https://doi.org/10.1145/3651863.3651876360° videos are gaining popularity, but immersive analytics, particularly in object detection, confront challenges from complex scenes and high data volume. This imposes significant burdens on individual users and resource-limited edge devices. ...
- research-articleJuly 2024
Camouflaged object detection via cross-level refinement and interaction network
AbstractThe purpose of camouflaged object detection (COD) focuses on detecting objects that seamlessly blend into their surroundings. Camouflaged objects pose a substantial challenge in the realm of computer vision due to various factors, including ...
Highlights- A cross-level refinement and interaction network (CRI-Net) focuses on camouflaged object.
- We earnestly design three key components for better study of COD missions to accurately predict camouflaged objects. The Semantic Amplification ...
- research-articleJuly 2024
Local to global purification strategy to realize collaborative camouflaged object detection
Computer Vision and Image Understanding (CVIU), Volume 241, Issue Chttps://doi.org/10.1016/j.cviu.2024.103932AbstractThe purpose of camouflaged object detection is to detect objects in images that are not easily perceived by human eyes. Aiming at the problems of low recognition performance and unsatisfied texture information extraction in the complex ...
Highlights- We design a novel model called LGPNet for collaborative camouflaged object detection.
- The Local Detail Mining module is designed to capture subtle information.
- the Global Intra-group Feature Extraction module uses global ...
- research-articleMay 2024
Object Detection and Instance Segmentation in Construction Sites
CACML '24: Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine LearningPages 184–190https://doi.org/10.1145/3654823.3654857Identifying safety hazards and ensuring quality control in construction sites requires information from surveillance images, such as clear detection boxes, accurate edges of targets, etc. Although both object detection and instance segmentation models ...
- rapid-communicationMarch 2024
Performance analysis for cyber–physical systems under two types of stealthy deception attacks
Automatica (Journal of IFAC) (AJIF), Volume 160, Issue Chttps://doi.org/10.1016/j.automatica.2023.111446AbstractThis paper focuses on the performance analysis of cyber–physical systems under the stealthy deception attack. Two types of attack models, strictly stealthy attack and ϵ-stealthy attack, are considered. The strictly stealthy deception attack model ...
- research-articleJanuary 2024
Depth alignment interaction network for camouflaged object detection
AbstractMany animals actively change their own characteristics, such as color and texture, through camouflage, a natural defense mechanism, making them difficult to be detected in the natural environment, which makes the task of camouflaged object ...
- research-articleOctober 2024
LDHD-Net: A Lightweight Network With Double Branch Head for Feature Enhancement of UAV Targets in Complex Scenes
International Journal of Intelligent Systems (IJIS), Volume 2024https://doi.org/10.1155/2024/7259029The development of small UAV technology has led to the emergence of new challenges in UAV countermeasures. The timely detection of UAVs can effectively prevent potential infringements on airspace and privacy. Currently, methods based on deep learning ...
- research-articleMarch 2024
MMGInpainting: Multi-Modality Guided Image Inpainting Based on Diffusion Models
IEEE Transactions on Multimedia (TOM), Volume 26Pages 8811–8823https://doi.org/10.1109/TMM.2024.3382484Proper inference of semantics is necessary for realistic image inpainting. Most image inpainting methods use deep generative models, which require large image datasets to predict and generate content. However, predicting the missing regions and generating ...