Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024JUST ACCEPTED
Leveraging HLS to Design a Versatile & High-Performance Classic McEliece Accelerator
ACM Transactions on Embedded Computing Systems (TECS), Just Accepted https://doi.org/10.1145/3698395By harnessing fundamental quantum properties, a large-scale quantum computer could undermine currently deployed public-key algorithms. The post-quantum, code-based cryptosystem Classic McEliece (CM) addresses this security concern. However, its large ...
- research-articleJuly 2024
Evolution-based energy-efficient data collection system for UAV-supported IoT: Differential evolution with population size optimization mechanism
Expert Systems with Applications: An International Journal (EXWA), Volume 245, Issue Chttps://doi.org/10.1016/j.eswa.2023.123082AbstractIn recent years, unmanned aerial vehicles (UAVs) have been broadly employed as a data collection platform to assist in efficiently collecting data from IoT devices. However, the deployment optimization of UAVs has been challenged due to the need ...
- research-articleJune 2024
FPO++: efficient encoding and rendering of dynamic neural radiance fields by analyzing and enhancing Fourier PlenOctrees
The Visual Computer: International Journal of Computer Graphics (VISC), Volume 40, Issue 7Pages 4777–4788https://doi.org/10.1007/s00371-024-03475-3AbstractFourier PlenOctrees have shown to be an efficient representation for real-time rendering of dynamic neural radiance fields (NeRF). Despite its many advantages, this method suffers from artifacts introduced by the involved compression when ...
- ArticleJune 2024
-
- posterJune 2024
Getting in Touch: Engaging Public Event Visitors through Participatory Data Physicalization
AVI '24: Proceedings of the 2024 International Conference on Advanced Visual InterfacesArticle No.: 85, Pages 1–3https://doi.org/10.1145/3656650.3656736Participatory data physicalizations allow people to physically participate in the creation of visualizations. In this work, we present four categories of data physicalization concepts that were tested with public event visitors in a university context. ...
- research-articleMarch 2024
- research-articleJuly 2024
The reflective higher-order calculus: Encodability, typability and separation
AbstractThe ρ-calculus (Reflective Higher-Order Calculus) of Meredith and Radestock is a π-calculus-like language with unusual features, notably, structured names, runtime generation of free names, and the lack of a scoping operator. These features pose ...
- research-articleMay 2024
The area-efficient gate level information flow tracking schemes of digital circuit with multi-level security lattice
AbstractThe Gate Level Information Flow Tracking (GLIFT) is an effective method to uphold the information security for high-assurance digital circuits. The GLIFT method associates a security label with each data bit and monitors these labels to expose ...
- research-articleJanuary 2024
Advancements in encoded speech data by background noise suppression under uncontrolled environment
International Journal of Speech Technology (SPIJST), Volume 27, Issue 1Pages 77–84https://doi.org/10.1007/s10772-023-10078-1AbstractThe enhancements made to an earlier proposed combination of spectral subtraction using voice activity detection (SS-VAD) and linear predictive coding (LPC) system under uncontrolled environments are demonstrated in this work. In the earlier ...
- research-articleDecember 2023
DeepInsight: a CNN-based approach for machine reading comprehension in query answering systems and its applications
Multimedia Tools and Applications (MTAA), Volume 83, Issue 1Pages 3313–3333https://doi.org/10.1007/s11042-023-17732-5AbstractUnderstanding and reading an unstructured text to answer queries on it, also called Machine Reading Comprehension (MRC), has been a hot topic amongst researchers worldwide in the past few years. There are many ways in which this problem has been ...
- ArticleMarch 2024
Least Information Redundancy Algorithm of Printable Shellcode Encoding for X86
Computer Security. ESORICS 2023 International WorkshopsPages 361–376https://doi.org/10.1007/978-3-031-54129-2_21AbstractShellcode is a critical element in computer security that exploits vulnerabilities within software systems. Shellcode is written in machine code and often designed to be compact in size, evading detection by security software. Printable shellcode, ...
- ArticleFebruary 2024
The Random Fault Model
AbstractIn this work, we introduce the random fault model - a more advanced fault model inspired by the random probing model, where the adversary can fault all values in the algorithm but the probability for each fault to occur is limited. The new ...
- rapid-communicationJuly 2023
Self-triggered resilient stabilization of linear systems with quantized outputs
Automatica (Journal of IFAC) (AJIF), Volume 153, Issue Chttps://doi.org/10.1016/j.automatica.2023.111006AbstractThis paper studies the problem of stabilizing a self-triggered control system with quantized output. Employing a standard observer-based state feedback control law, a self-triggering mechanism that dictates the next sampling time based on ...
- research-articleMay 2023
Cheating identifiable polynomial based secret sharing scheme for audio and image
Multimedia Tools and Applications (MTAA), Volume 83, Issue 1Pages 403–423https://doi.org/10.1007/s11042-023-15625-1AbstractPolynomial based secret sharing is the art of protecting information and a tool used in areas where a secret has to be distributed among multiple parties. In this method, secret is encrypted into noisy shares and transferred to participants in the ...
- research-articleMarch 2023
Linguistic analysis for emotion recognition: a case of Chinese speakers
International Journal of Speech Technology (SPIJST), Volume 26, Issue 2Pages 417–432https://doi.org/10.1007/s10772-023-10028-xAbstractAcoustic features, in the examination of emotions occurring in pronouncing English and Chinese Mandarin words, are investigated in this study, then different emotion recognition experiments are presented. To this end, the sound recordings for 91 ...
- research-articleFebruary 2023
Succinct representation for (non)deterministic finite automata
Journal of Computer and System Sciences (JCSS), Volume 131, Issue CPages 1–12https://doi.org/10.1016/j.jcss.2022.07.002Abstract(Non)-Deterministic finite automata are one of the simplest models of computation studied in automata theory. Here we study them through the lens of succinct data structures. Towards this goal, we design a data structure for any ...
- chapterDecember 2022
Feature Fallacy: Complications with Interpreting Linear Decoding Weights in fMRI
Explainable AI: Interpreting, Explaining and Visualizing Deep LearningPages 363–378https://doi.org/10.1007/978-3-030-28954-6_20AbstractDecoding and encoding models are popular multivariate approaches used to study representations in functional neuroimaging data. Encoding approaches seek to predict brain activation patterns using aspects of the stimuli as features. Decoding models,...
- ArticleJanuary 2023
Big Data in Cognitive Neuroscience: Opportunities and Challenges
AbstractCognitive brain mapping is enjoying its growth with the availability of large open data sharing efforts as well as the application of modern machine learning and deep learning methods. In this article, we review some of the current practices in ...
- research-articleNovember 2022
Dynamic proof of retrievability based on public auditing for coded secure cloud storage
Multimedia Tools and Applications (MTAA), Volume 81, Issue 27Pages 39229–39249https://doi.org/10.1007/s11042-022-13089-3AbstractCloud storage represents a cloud delivered-service model which draws the attention of organizations and individuals due to its uncounted attractive advantages. Cloud Service Providers (CSPs) supply storage facilities while the cloud user has the ...