the proceedings contain 51 papers. the special focus in this conference is on Security and Privacy in Communication Networks. the topics include: CyberEA: An Efficient Entity Alignment Framework for Cybersecurity...
ISBN:
(纸本)9783031649530
the proceedings contain 51 papers. the special focus in this conference is on Security and Privacy in Communication Networks. the topics include: CyberEA: An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph;DNN Architecture Attacks via Network and Power Side Channels;invisibility Spell: Adversarial Patch Attack Against Object Detectors;Meta Perturbation Generation Network for Text-Based CAPTCHA;model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks;unsupervised Multi-criteria Adversarial Detection in Deep Image Retrieval;VRC-GraphNet: A Graph Neural Network-Based Reasoning Framework for Attacking Visual Reasoning Captchas;an Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density;Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home;optimizing Lightweight Intermittent Message Authentication for Programmable logic Controller;byzantine Protocols with Asymptotically Optimal Communication Complexity;demystifying Blockchain Scalability: Sibling Chains with Minimal Interleaving;VDABSys: A Novel Security-Testing Framework for Blockchain Systems Based on Vulnerability detection;anonymous Key Issuing Protocol with Certified Identities in Identity-Based Encryption;Batch Lattice-Based Designated-Verifier ZK-SNARKs for R1CS;certificateless Aggregate Signature Without Trapdoor for Cloud Storage;efficient Zero Knowledge for Regular Language;enabling Fast Settlement in Atomic Cross-Chain Swaps;HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network Inference;Optimization of Functional Bootstraps with Large LUT and Packing Key Switching;an Authentication Algorithm for Sets of Spatial Data Objects;An Efficient Private Information Retrieval Protocol Based on TFHE;mShield: Protecting In-process Sensitive Data Against Vulnerable third-Party Libraries;password Cracking by Exploiting User Group Information.
Quaternions are four-dimensional hyper-complex numbers discovered by Sir William Hamilton in the 19th century. Compared to Euler angles, quaternions allow combining rotations in three-dimensional space and help overco...
详细信息
the proceedings contain 51 papers. the special focus in this conference is on Security and Privacy in Communication Networks. the topics include: CyberEA: An Efficient Entity Alignment Framework for Cybersecurity...
ISBN:
(纸本)9783031649479
the proceedings contain 51 papers. the special focus in this conference is on Security and Privacy in Communication Networks. the topics include: CyberEA: An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph;DNN Architecture Attacks via Network and Power Side Channels;invisibility Spell: Adversarial Patch Attack Against Object Detectors;Meta Perturbation Generation Network for Text-Based CAPTCHA;model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks;unsupervised Multi-criteria Adversarial Detection in Deep Image Retrieval;VRC-GraphNet: A Graph Neural Network-Based Reasoning Framework for Attacking Visual Reasoning Captchas;an Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density;Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home;optimizing Lightweight Intermittent Message Authentication for Programmable logic Controller;byzantine Protocols with Asymptotically Optimal Communication Complexity;demystifying Blockchain Scalability: Sibling Chains with Minimal Interleaving;VDABSys: A Novel Security-Testing Framework for Blockchain Systems Based on Vulnerability detection;anonymous Key Issuing Protocol with Certified Identities in Identity-Based Encryption;Batch Lattice-Based Designated-Verifier ZK-SNARKs for R1CS;certificateless Aggregate Signature Without Trapdoor for Cloud Storage;efficient Zero Knowledge for Regular Language;enabling Fast Settlement in Atomic Cross-Chain Swaps;HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network Inference;Optimization of Functional Bootstraps with Large LUT and Packing Key Switching;an Authentication Algorithm for Sets of Spatial Data Objects;An Efficient Private Information Retrieval Protocol Based on TFHE;mShield: Protecting In-process Sensitive Data Against Vulnerable third-Party Libraries;password Cracking by Exploiting User Group Information.
the problem of particulars and universals is one of the most essential problems in the formal philosophy of language in the sense that it consists in a crossroads of ontology and semantics. According to Resemblance No...
详细信息
ISBN:
(数字)9783031439773
ISBN:
(纸本)9783031439766;9783031439773
the problem of particulars and universals is one of the most essential problems in the formal philosophy of language in the sense that it consists in a crossroads of ontology and semantics. According to Resemblance Nominalism, resemblance relations are primitive and the properties of a thing are defined by them. We (2020) proposed, in terms of measurement theory, a first-order modal resemblance logic MRL that can furnish solutions to the problems with which Resemblance Nominalism is confronted. Yi (2014) raises a new version of degree of resemblance problem with Resemblance Nominalism of Rodriguez-Pereyra (2002). We think this problem to be a problem of multidimensionality. When we considered this problem, we realized that the model of MRL was not able to deal appropriately withthe multidimensionality of this type of problem. the aim of this paper is to revise MRL so that the revised first-order modal resemblance logic RMRL can solve Rodriguez-Pereyra-Yi Problem in terms of measurement-theoretic multidimensional representation. Measurement theory makes it possible that qualitative resemblance relations can represent quantitative (numerical) functions, whereas it is not designed to explicate the parthood between a particular and its parts referred to for determining the raking on a resemblance relation. So, in the construction of the multidimensional model of RMRL, we connect measurement-theory with mereology that can explicate the parthood between a particular and its parts referred to for determining the raking on a resemblance relation. the punch line of Resemblance Nominalism is the reducibility of universals into resemblance relations. the point of formalizing Resemblance Nominalism in RMRL is to avoid the circularity in this reduction into which it tends to slide.
this paper considers the problem of maximizing the input rate in a relay assisted network coding (RANC) wireless multicast with packet erasure channels where the relay to destination channels have relatively higher ch...
详细信息
ISBN:
(数字)9781665471800
ISBN:
(纸本)9781665471800
this paper considers the problem of maximizing the input rate in a relay assisted network coding (RANC) wireless multicast with packet erasure channels where the relay to destination channels have relatively higher channel gains than the corresponding transmitter to destination channels. Specifically, a new queuing model consisting of several sub-queues at boththe transmitter and the relay is introduced. Our objective is to maximize the input rate under the queue stability constraints. First, we formulate it as a linear programming problem to achieve the maximum stable throughput and then applying Lyapunov optimization method a network coding based optimal packet scheduling scheme is obtained. Finally, the simulation results corroborate our method.
Service-orientation recommends dividing software into separate independent services, with each service being implemented in the programming language that best fits into the service's problem space. However, data m...
详细信息
this paper presents a novel single-inductor dual-output (SIDO) DC-DC converter topology with two flying capacitors. the two flying capacitors are located in the same current path, targeting an enhanced voltage drop re...
详细信息
Diagnosis of faults in logic circuit is essential to improve the yield of semiconductor circuit production. However, accurate diagnosis of adjacent multiple faults is difficult. In this paper, an idea for diagnosis of...
详细信息
ISBN:
(纸本)9781665459716
Diagnosis of faults in logic circuit is essential to improve the yield of semiconductor circuit production. However, accurate diagnosis of adjacent multiple faults is difficult. In this paper, an idea for diagnosis of logic circuit faults using deep learning is proposed. In the proposed diagnosis idea, two adjacent faults can be accurately diagnosed using three deep learning modules. Once the modules are trained with data processed from fault simulation, the number of faults and the location of the faults are predicted by the modules from test responses of logic circuit. Experimental results of the proposed fault diagnosis idea show more than 96.4% diagnostic accuracy.
We investigate common objects as material support for programming workshops for children and adolescents in non-formal learning contexts. To this end, we engaged in a one-year participatory design process with a facil...
详细信息
ISBN:
(纸本)9783031422799;9783031422805
We investigate common objects as material support for programming workshops for children and adolescents in non-formal learning contexts. To this end, we engaged in a one-year participatory design process with a facilitator of programming workshops. Based on observations of workshops and interviews withthe facilitator, we mapped out their artifact ecologies to investigate how the multiple artifacts and common objects were orchestrated by the facilitator and then adopted by the participants of the workshops. Building on these findings, we explored the development of a collaborative teaching tool, MicroTinker, through a participatory design process withthe facilitator. this paper presents the results of our analyses and shows their constructive use to design technology in a non-formal learning setting.
We show that the vast majority of extensions of the description logic EL do not enjoy the Craig interpolation nor the projective Beth definability property. this is the case, for example, for EL with nominals, EL with...
详细信息
暂无评论