A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encr...
详细信息
A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encrypted message. All data delivered in the cryptosystem are public. Therefore it does not need a partial decrypting results combiner and any secure communication channel. The security of the group oriented cryptosystem is based on the intractability of the discrete log problem and difficulty of factoring large integers. The suspected attacks can not break it.
We study the problem of leveraging the syntactic structure of text to enhance pre-trained models such as BERT and RoBERTa. Existing methods utilize syntax of text either in the pre-training stage or in the fine-tuning...
详细信息
Most of current person re-identification (ReID) methods neglect a spatial-temporal constraint. Given a query image, conventional methods compute the feature distances between the query image and all the gallery images...
详细信息
A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encr...
详细信息
A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encrypted message. All data delivered in the cryptosystem are public. Therefore it does not need a partial decrypting results combiner and any secure communication channel. The security of the group oriented cryptosystem is based on the intractability of the discrete log problem and difficulty of factoring large integers. The suspected attacks can not break it.
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ...
详细信息
We propose an attention-injective deformable convolutional network called ADCrowdNet for crowd understanding that can address the accuracy degradation problem of highly congested noisy scenes. ADCrowdNet contains two ...
详细信息
In constructing an efficient multicast tree of application-level multicast, not only the delay of link should be considered, but also the process delay of many end systems in sending and transmitting data can not be i...
详细信息
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur...
详细信息
This technical report presents a brief description of our submission to the dense video captioning task of ActivityNet Challenge 2020. Our approach follows a two-stage pipeline: first, we extract a set of temporal eve...
Real-time and energy-efficient transmissions are two critical demands for status update systems, however it is difficult to meet these requirements simultaneously. This paper focuses on the tradeoff between the averag...
详细信息
Real-time and energy-efficient transmissions are two critical demands for status update systems, however it is difficult to meet these requirements simultaneously. This paper focuses on the tradeoff between the average age of information (AoI) and the average energy cost (EC) for two-hop decode-and-forward (DF) relaying networks with short packet transmissions. Both the partial relay selection (PRS) and max-min relay selection (MMRS) schemes are considered. The expressions for the average AoI and the average EC of two-hop relaying networks are derived, and the age-energy tradeoff is also achieved by minimizing the weighted sum of them. Numerical simulations show that both PRS and MMRS schemes have their own advantages to minimize the age and energy cost under different channel conditions, where MMRS is a fairness scheme that takes the channel conditions of two hops into account. In addition, an optimal packet length can always be found to tradeoff the average AoI and average EC in two-hop relaying networks.
暂无评论