Robust watermarking of databases in order-preserving encrypted domain
Improvement on a batch authenticated key agreement scheme
Semantic and secure search over encrypted outsourcing cloud based on BERT
Return just your search: privacy-preserving homoglyph search for arbitrary languages
Defocus blur detection using novel local directional mean patterns (LDMP) and segmentation via KNN matting
iNet: visual analysis of irregular transition in multivariate dynamic networks
TransRec++: Translation-based sequential recommendation with heterogeneous feedback
EcoVis: visual analysis of industrial-level spatio-temporal correlations in electricity consumption
A comprehensive study on fault tolerance in stream processing systems
Spatio-temporal keyword query in semantic trajectories
Cancer classification with data augmentation based on generative adversarial networks
An improved branching algorithm for the proper interval edge deletion problem
Towards better entity linking
Relation Reconstructive Binarization of word embeddings
THS-GWNN: a deep learning framework for temporal network link prediction
Side-channel analysis attacks based on deep learning network
DeepM6ASeq-EL: prediction of human N6-methyladenosine (m6A) sites with LSTM and ensemble learning
Probabilistic synthesis against GR(1) winning condition
ForkXplorer: an approach of fork summary generation
Automated detection on the security of the linked-list operations
Flexibility and rigidity index for chromosome packing, flexibility and dynamics analysis
SeBROP: blind ROP attacks without returns
Precise sensitivity recognizing, privacy preserving, knowledge graph-based method for trajectory data publication
An efficient and authenticated key establishment scheme based on fog computing for healthcare system
SCARE and power attack on AES-like block ciphers with secret S-box
Nighttime image dehazing using color cast removal and dual path multi-scale fusion strategy
Image copy-move forgery passive detection based on improved PCNN and self-selected sub-images
TPRPF: a preserving framework of privacy relations based on adversarial training for texts in big data
Demystifying Ethereum account diversity: observations, models and analysis
A dynamic logic for verification of synchronous models based on theorem proving
The parametric complexity of bisimulation equivalence of normed pushdown automata
Rehearsal: learning from prediction to decision
Multi-granularity semantic alignment distillation learning for remote sensing image semantic segmentation
Identification and classification of promoters using the attention mechanism based on long short-term memory
Community search over heterogeneous information networks via weighting strategy and query replacement
Disk based pay-as-you-go record linkage
Disclosing incoherent sparse and low-rank patterns inside homologous GPCR tasks for better modelling of ligand bioactivities
DRPS: efficient disk-resident parameter servers for distributed machine learning
Improving deep reinforcement learning by safety guarding model via hazardous experience planning
Polynomial stacked-attention network for nationality classification
Controllable data synthesis method for grammatical error correction
Accelerating temporal action proposal generation via high performance computing
Exploring associations between streetscape factors and crime behaviors using Google Street View images
Monotonicity and nonmonotonicity in L3-valued propositional logic
Pusher: an augmented fuzzer based on the connection between input and comparison operand
Handling class imbalance problem in software maintainability prediction: an empirical investigation
A structural variation genotyping algorithm enhanced by CNV quantitative transfer
String kernels construction and fusion: a survey with bioinformatics application
Low-cost client-side encryption and secure Internet of things (IoT) provisioning
On the hardness of NTRU problems
An approach for detecting LDoS attack based on cloud model
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage
Power diagram based algorithm for the facility location and capacity acquisition problem with dense demand
Instance-sequence reasoning for video question answering
An efficient graph data compression model based on the germ quotient set structure
Graph convolution machine for context-aware recommender system
Super solutions of the model RB
PSLDA: a novel supervised pseudo document-based topic model for short texts
Non-salient region erasure for time series augmentation
Referring image segmentation with attention guided cross modal fusion for semantic oriented languages
CrowdDesigner: information-rich and personalized product description generation
Data fusing and joint training for learning with noisy labels
Defense against local model poisoning attacks to byzantine-robust federated learning
Distant supervised relation extraction based on residual attention
A survey of music emotion recognition
ResLNet: deep residual LSTM network with longer input for action recognition
Exploiting comments information to improve legal public opinion news abstractive summarization
Revenue-maximizing online stable task assignment on taxi-dispatching platforms
Effort-aware cross-project just-in-time defect prediction framework for mobile apps
Performance optimization for cloud computing systems in the microservice era: state-of-the-art and research opportunities
A framework combines supervised learning and dense subgraphs discovery to predict protein complexes
Implementing a sidechain-based asynchronous DPKI
A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor
A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid
Multi-key FHE without ciphertext-expansion in two-server model
MSDA: multi-subset data aggregation scheme without trusted third party
A novel threshold changeable secret sharing scheme
Dynamic road crime risk prediction with urban open data
An optimal differentially private data release mechanism with constrained error
An efficient memory data organization strategy for application-characteristic graph processing
IP-geolocater: a more reliable IP geolocation algorithm based on router error training
Cross-scene passive human activity recognition using commodity WiFi
OCSO-CA: opposition based competitive swarm optimizer in energy efficient IoT clustering
The LP-rounding plus greed approach for partial optimization revisited
LIDAR: learning from imperfect demonstrations with advantage rectification
Improving accuracy of automatic optical inspection with machine learning
Label distribution for multimodal machine learning
Understanding the role of human-inspired heuristics for retrieval models
GridNet: efficiently learning deep hierarchical representation for 3D point cloud understanding
Weapon-target assignment in unreliable peer-to-peer architecture based on adapted artificial bee colony algorithm
SCENERY: a lightweight block cipher based on Feistel structure
Mean estimation over numeric data with personalized local differential privacy
New construction of highly nonlinear resilient S-boxes via linear codes
Collaborative eye tracking based code review through real-time shared gaze visualization
Speech-driven facial animation with spectral gathering and temporal attention
K-ary search tree revisited: improving construction and intersection efficiency
Exploiting user behavior learning for personalized trajectory recommendations
A subgraph matching algorithm based on subgraph index for knowledge graph
Similarity-based privacy protection for publishing k-anonymous trajectories
An improved multi-attribute decision-making based network selection algorithm for heterogeneous vehicular network
Satisfiability threshold of the random regular (s, c, k)-SAT problem
On the use of formal methods to model and verify neuronal archetypes
Full friendly index sets of mCn
Toward few-shot domain adaptation with perturbation-invariant representation and transferable prototypes
Linguistic feature template integration for Chinese-Vietnamese neural machine translation
Biomedical entity linking based on less labeled data
Transferring priors from virtual data for crowd counting in real world
On the learning dynamics of two-layer quadratic neural networks for understanding deep learning
Mask guided diverse face image synthesis
Local feature aggregation algorithm based on graph convolutional network
Model-based automated testing of JavaScript Web applications via longer test sequences
Compressed page walk cache
Accelerating the cryo-EM structure determination in RELION on GPU cluster
A bi-metric autoscaling approach for n-tier web applications on kubernetes
Towards a better prediction of subcellular location of long non-coding RNA
Efficient protocols for heavy hitter identification with local differential privacy
A privacy-preserving group encryption scheme with identity exposure
(Full) Leakage resilience of Fiat-Shamir signatures over lattices
Challenges and future directions of secure federated learning: a survey
Line drawing via saliency map and ETF
Fast and efficient parallel breadth-first search with power-law graph transformation
Efficient and stable quorum-based log replication and replay for modern cluster-databases
Heterogeneous information network embedding with incomplete multi-view fusion
A mobile edge computing-based applications execution framework for Internet of Vehicles
A Bayesian matrix factorization model for dynamic user embedding in recommender system
Metric learning for domain adversarial network
Endowing rotation invariance for 3D finger shape and vein verification
Improving meta-learning model via meta-contrastive loss
Efficient policy evaluation by matrix sketching
A survey of discourse parsing
Multiband decomposition and spectral discriminative analysis for motor imagery BCI via deep neural network
Citywide package deliveries via crowdshipping: minimizing the efforts from crowdsourcers
Informative and diverse emotional conversation generation with variational recurrent pointer-generator
Exploiting natural language services: a polarity based black-box attack
Community detection with attributed random walk via seed replacement
Self-corrected unsupervised domain adaptation
Prediction of job characteristics for intelligent resource allocation in HPC systems: a survey and future directions
GCSS: a global collaborative scheduling strategy for wide-area high-performance computing