EDGE Enhancement Network for Weakly Supervised Semantic Segmentation. | 0 | 0.34 | 2021 |
SSE - Scale-adaptive Soft Erase Weakly Supervised Segmentation Network for Thyroid Ultrasound Images. | 0 | 0.34 | 2021 |
Self-Organizing Slot Access for Neighboring Cooperation in UAV Swarms. | 2 | 0.39 | 2020 |
Multi-scale Object Detection in Optical Remote Sensing Images Using Atrous Feature Pyramid Network. | 0 | 0.34 | 2020 |
Semi-Automated Generation of Road Transition Lines Using Mobile Laser Scanning Data | 2 | 0.36 | 2020 |
Research on Key Exchange Protocol Based on LWE | 0 | 0.34 | 2019 |
Decentralization is Vulnerable Under the Gap Game | 1 | 0.63 | 2019 |
Multi-Attention Object Detection Model in Remote Sensing Images Based on Multi-Scale. | 1 | 0.35 | 2019 |
Measuring students' thermal comfort and its impact on learning. | 1 | 0.35 | 2019 |
Privacy preserved wireless sensor location protocols based on mobile edge computing | 1 | 0.36 | 2019 |
Blind Image Inpainting Using Pyramid GAN on Thyroid Ultrasound Images. | 0 | 0.34 | 2019 |
A comparison of clustering algorithms applied to fluid characterization using NMR T1-T2 maps of shale | 0 | 0.34 | 2019 |
Game-Theoretic Learning Approaches for Secure D2D Communications Against Full-Duplex Active Eavesdropper. | 0 | 0.34 | 2019 |
Keyword guessing on multi-user searchable encryption | 0 | 0.34 | 2019 |
An Efficient Strong Designated Verifier Signature Based on ℛ-SIS Assumption. | 0 | 0.34 | 2019 |
A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity. | 0 | 0.34 | 2018 |
Analysis on the Block Reward of Fork After Withholding (FAW). | 0 | 0.34 | 2018 |
Towards Security Authentication for IoT Devices with Lattice-Based ZK. | 0 | 0.34 | 2018 |
A New Post-Quantum Blind Signature From Lattice Assumptions. | 0 | 0.34 | 2018 |
Predicting When Teachers Look at Their Students in 1-on-1 Tutoring Sessions | 0 | 0.34 | 2018 |
An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms. | 0 | 0.34 | 2018 |
Multi-user searchable encryption with a designated server. | 1 | 0.36 | 2017 |
Implementation and Optimization of GPU-Based Static State Security Analysis in Power Systems. | 0 | 0.34 | 2017 |
An Efficient CPA-Secure Encryption Scheme with Equality Test | 0 | 0.34 | 2017 |
A Two-Layered Parallel Static Security Assessment for Large-Scale Grids Based on GPU. | 1 | 0.37 | 2017 |
Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System. | 0 | 0.34 | 2016 |
Practical Server-Aided K-Out-Of-N Oblivious Transfer Protocol | 0 | 0.34 | 2016 |
Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries | 0 | 0.34 | 2016 |
A Fine-Grained Parallel Power Flow Method For Large Scale Grid Based On Lightweight Gpu Threads | 0 | 0.34 | 2016 |
Several Oblivious Transfer Variants in Cut-and-Choose Scenario. | 0 | 0.34 | 2015 |
Cut-and-Choose Bilateral Oblivious Transfer and Its Application | 2 | 0.40 | 2015 |
Efficient ORAM Based on Binary Tree without Data Overflow and Evictions. | 0 | 0.34 | 2015 |
Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation. | 0 | 0.34 | 2014 |
A New Cross-realm Group Password-based Authenticated Key Exchange Protocol | 2 | 0.37 | 2011 |