Intelligent transportation systems (ITSs) have been fueled by the rapid
...
The advent of artificial intelligence-generated content (AIGC) represent...
As an essential technology underpinning trusted computing, the trusted
e...
Knowledge tracing (KT) is the problem of predicting students' future
per...
The "Right to be Forgotten" rule in machine learning (ML) practice enabl...
In this work, we propose a novel method to improve the generalization ab...
In many real-world applications, sequential rule mining (SRM) can provid...
Steganography conceals the secret message into the cover media, generati...
In secure machine learning inference, most current schemes assume that t...
With the advent of the screen-reading era, the confidential documents
di...
Watermarking is an important copyright protection technology which gener...
This paper proposes a new approach for privacy-preserving and verifiable...
Utility-driven mining is an important task in data science and has many
...
Recently, contiguous sequential pattern mining (CSPM) gained interest as...
Significant efforts have been expended in the research and development o...
Because of the increasing demand for computation in DNN, researchers dev...
Data holders, such as mobile apps, hospitals and banks, are capable of
t...
ML-as-a-service (MLaaS) becomes increasingly popular and revolutionizes ...
The rapid development of cloud computing has probably benefited each of ...
The rapid growth of digital images motivates individuals and organizatio...
The emergence of cloud computing provides a new computing paradigm for
u...
A basic problem in constant dimension subspace coding is to determine th...
Content-Based Image Retrieval (CBIR) techniques have been widely researc...
Generative adversarial network (GAN) has attracted increasing attention
...
In this paper, we propose a privacy-preserving medical treatment system ...
Deep Learning (DL) techniques allow ones to train models from a dataset ...
The popularity of Internet-of-Things (IoT) comes with security concerns....
Mobile edge computing (MEC) is an emerging technology to transform the
c...
Smart contract technology is reshaping conventional industry and busines...
Lattice reduction is a popular preprocessing strategy in multiple-input
...
A code over a finite field is called locally recoverable code (LRC) if e...
A code over a finite field is called locally recoverable code (LRC) if e...
With the popularity of Blockchain comes grave security-related concerns....
To defeat security threats such as man-in-the-middle (MITM) attacks,
Blu...
A basic problem for the constant dimension subspace coding is to determi...
Dense linear algebra kernels are critical for wireless applications, and...
The Korkine-Zolotareff (KZ) reduction is a widely used lattice reduction...