Publication Venue For
- A Blind Ring Signature Based on the Short Integer Solution Problem 2020
- A New Improved AES S-box with Enhanced Properties 2020
- A lattice-based key-insulated and privacy-preserving signature scheme with publicly derived public key 2020
- Efficient Anonymous Multi-group Broadcast Encryption 2020
- Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof 2020
- Lattice Blind Signatures with Forward Security 2020
- Learning Sample-Adaptive Intensity Lookup Table for Brain Tumor Segmentation 2020
- Provably Secure Group Authentication in the Asynchronous Communication Model 2020
- Puncturable encryption: A generic construction from delegatable fully key-homomorphic encryption 2020
- QR Code Watermarking for Digital Images 2020
- Resource-Based Adaptive Robotic Process Automation: Formal/Technical Paper 2020
- Secure cloud auditing with efficient ownership transfer 2020
- Towards a Universal Steganalyser Using Convolutional Neural Networks 2020
- Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model 2020
- A Case-Based Reasoning Approach for Facilitating Online Discussions 2019
- A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses 2019
- Cloud-based data-sharing scheme using verifiable and CCA-secure re-encryption from indistinguishability obfuscation 2019
- Cross-Modal Attention-Guided Convolutional Network for Multi-modal Cardiac Segmentation 2019
- Evaluation of breastfeeding mobile health applications based on the persuasive system design model 2019
- GameOfFlows: Process Instance Adaptation in Complex, Dynamic and Potentially Adversarial Domains 2019
- Helping an Agent Reach a Different Goal by Action Transfer in Reinforcement Learning 2019
- Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem 2019
- Integrating Functional and Structural Connectivities via Diffusion-Convolution-Bilinear Neural Network 2019
- Lattice-Based IBE with Equality Test in Standard Model 2019
- Outsourced ciphertext-policy attribute-based encryption with equality test 2019
- Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes 2019
- Puncturable Proxy Re-Encryption Supporting to Group Messaging Service 2019
- Single and Multi-channel Direct Visual Odometry with Binary Descriptors 2019
- Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search 2019
- Using Freivalds’ Algorithm to Accelerate Lattice-Based Signature Verifications 2019
- Combinatorial algorithms and methods for security of statistical databases related to the work of Mirka Miller 2018
- DSH: Deniable secret handshake framework 2018
- DeepKSPD: Learning Kernel-Matrix-Based SPD Representation For Fine-Grained Image Recognition 2018
- DeepRSD: A deep regression method for sequential data 2018
- Determining the applicability of advice for efficient multi-agent reinforcement learning 2018
- Efficient attribute-based encryption with blackbox traceability 2018
- Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters 2018
- An integer linear programming model for binary knapsack problem with dependent item values 2017
- Deniable ring authentication based on projective hash functions 2017
- Privacy-preserving k-time authenticated secret handshakes 2017
- A mapreduce-based ELM for regression in big data 2016
- Comprehensive influence propagation modelling for hybrid social network 2016
- Efficient threshold secret sharing schemes secure against rushing cheaters 2016
- High resolution SOM approach to improving anomaly detection in intrusion detection systems 2016
- Tempo-spatial compactness based background subtraction for vehicle detection and tracking 2016
- Computationally secure cheating identifiable multi-secret sharing for general access structure 2015
- An efficient robust secret sharing scheme with optimal cheater resiliency 2014
- A method to avoid duplicative flipping in local search for SAT 2012
- Metamodelling approach towards a disaster management decision support system 2010