
-
Big Bird: Transformers for Longer Sequences
Transformers-based models, such as BERT, have been one of the most succe...
read it
-
Robust Sparse Regularization: Simultaneously Optimizing Neural Network Robustness and Compactness
Deep Neural Network (DNN) trained by the gradient descent method is know...
read it
-
Computer-aided Detection of Squamous Carcinoma of the Cervix in Whole Slide Images
Goal: Squamous cell carcinoma of cervix is one of the most prevalent can...
read it
-
Saliency Prediction on Omnidirectional Images with Generative Adversarial Imitation Learning
When watching omnidirectional images (ODIs), subjects can access differe...
read it
-
Block encryption of quantum messages
In modern cryptography, block encryption is a fundamental cryptographic ...
read it
-
A quantum related-key attack based on Bernstein-Vazirani algorithm
Due to the powerful computing capability of quantum computers, cryptogra...
read it
-
A voting scheme with post-quantum security based on physical laws
Traditional cryptography is under huge threat along of the evolution of ...
read it
-
Nonlinear Online Learning with Adaptive Nyström Approximation
Use of nonlinear feature maps via kernel approximation has led to succes...
read it
-
Quantum impossible differential and truncated differential cryptanalysis
We study applications of BV algorithm and present quantum versions of im...
read it
-
The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty
Covert communication can prevent the opponent from knowing that a wirele...
read it
-
Using Bernstein-Vazirani Algorithm to Attack Block Ciphers
In this paper, we study applications of Bernstein-Vazirani algorithm and...
read it
-
Tacit knowledge mining algorithm based on linguistic truth-valued concept lattice
This paper is the continuation of our research work about linguistic tru...
read it