Certificateless public key cryptography eliminates certificate management in traditional public key infrastructure and solves the key escrow problem in identity-based cryptography. Certificateless signcryption is one ...
详细信息
Certificateless public key cryptography eliminates certificate management in traditional public key infrastructure and solves the key escrow problem in identity-based cryptography. Certificateless signcryption is one of the most important primitives in certificateless public key cryptography which achieves confidentiality and authentication simultaneously. Multi-receiver signcryption signcrypts a message to a large number of receivers. Selvi et al. proposed the first efficient and provably secure certificateless multi-receiver signcryption scheme. Recently, they found the scheme is insecure against the type I adversary and gave an enhanced one. However, we find that their enhanced scheme is still insecure against the type I adversary. In this paper, we present an attack on Selvi et al.'s enhanced scheme. Specifically, we show that a type I adversary can first replace a sender's public key and generate a signcrypted message on behalf of the sender.
In this paper, we propose a leg-driven physiology framework for pedestrian detection. The framework is introduced to reduce the search space of candidate regions of pedestrians. Given a set of vertical line segments, ...
详细信息
ISBN:
(纸本)9781467399623
In this paper, we propose a leg-driven physiology framework for pedestrian detection. The framework is introduced to reduce the search space of candidate regions of pedestrians. Given a set of vertical line segments, we can generate a space of rectangular candidate regions, based on a model of body proportions. The proposed framework can be either integrated with or without learning-based pedestrian detection methods to validate the candidate regions. A symmetry constraint is then applied to validate each candidate region to decrease the false positive rate. The experiment demonstrates the promising results of the proposed method by comparing it with Dalal & Triggs method. For example, rectangular regions detected by the proposed method has much similar area to the ground truth than regions detected by Dalal & Triggs method.
Multi-view clustering has attracted considerable attention in recent years, some related approaches always use matrices to represent views, and model by capturing two dimensional structure among views. The critical de...
详细信息
Multi-view clustering has attracted considerable attention in recent years, some related approaches always use matrices to represent views, and model by capturing two dimensional structure among views. The critical deficiency of these work is ignoring the space structure information of all views, which results in the mediocre performance of clustering. In this paper, we propose a novel Tensor-SVD decomposition based Multi-view Spectral Clustering algorithm(TMSC) to iron out flaws. Our method firstly puts transition probability matrices of all views into a three-order tensor, which naturally reserves the whole structure information of data. Then it establishes a low multi-rank tensor model based on tensor-SVD decomposition by fully mining the complementary information among multiple views. Another difficulty in this paper is that the optimal objective of TMSC has a low multirank constraint on the transition probability tensor, and a probabilistic simplex constraint on each fiber of the tensor. To tackle this challenging problem, we design an optimization procedure based on the Augmented Lagrangian Multiplier scheme. Experimental results on real word datasets show that TMSC has superior clustering quality over several state-of-the-art multi-view clustering approaches.
Studying the intricate relationship between miRNAs and diseases is crucial to prevent and treat miRNA-related disorders. Existing computational methods often overlook the importance of features of different nodes and ...
详细信息
Wireless sensor networks have great potential for use in flood control, weather forecasting systems, the military, and the healthcare industry. A WSN’s nodes are connected to one another and share information. When s...
Wireless sensor networks have great potential for use in flood control, weather forecasting systems, the military, and the healthcare industry. A WSN’s nodes are connected to one another and share information. When sending data between nodes, data security is essential. In the world of networking, security is a top priority. data travels along a path when it is transferred from one location to another, increasing the likelihood that a rogue node would enter the network. Detecting malicious nodes within a network presents a formidable challenge, particularly due to external assaults on data packets during their transmission between nodes. Hackers take advantage of weaknesses to manipulate and alter data as it travels from the source node to the destination node. This paper looked at machine learning algorithm-based preventive measures and layer-level security challenges.
This paper addresses the challenge of solving large-scale nonlinear equations with Hölder continuous Jacobians. We introduce a novel Incremental Gauss–Newton (IGN) method within explicit superlinear convergence ...
详细信息
Knowledge Distillation (KD) is a promising approach for unsupervised Anomaly Detection (AD). However, the student network’s over-generalization often diminishes the crucial representation differences between teacher ...
详细信息
A long-standing problem for kernel-based regularization methods is their high computational complexity O(N 3 ), where N is the number of data points. In this paper, we show that for semiseparable kernels and some typi...
详细信息
A long-standing problem for kernel-based regularization methods is their high computational complexity O(N 3 ), where N is the number of data points. In this paper, we show that for semiseparable kernels and some typical input signals, their computational complexity can be lowered to O(Nq 2 ), where q is the output kernel’s semiseparability rank that only depends on the chosen kernel and the input signal.
Hash coding has been widely used in the approximate nearest neighbor search for large-scale image retrieval. Given semantic annotations such as class labels and pairwise similarities of the training data, hashing meth...
详细信息
Deep learning frameworks generally require sufficient training data to generalize well while fail to adapt on small or few-shot datasets. Meta-learning offers an effective means of tackling few-shot scenarios and has ...
详细信息
ISBN:
(纸本)9781665423991
Deep learning frameworks generally require sufficient training data to generalize well while fail to adapt on small or few-shot datasets. Meta-learning offers an effective means of tackling few-shot scenarios and has drawn increasing attention in recent years. Meta-optimization aims to learn a shared set of parameters across tasks for meta-learning while facing challenges in determining whether an initialization condition can be generalized to tasks with diverse distributions. In this regard, we propose a meta-gradient boosting framework that can fit diverse distributions based on a base learner (which learns shared information across tasks) and a series of gradient-boosted modules (which capture task-specific information). We evaluate the model on several few-shot learning benchmarks and demonstrate the effectiveness of our model in modulating task-specific meta-learned priors and handling diverse distributions.
暂无评论