We, for anti-quantum computing, will discuss various number-based string...
The coming quantum computation is forcing us to reexamine the cryptosyst...
Making topological authentication from theory to practical application i...
Traditional principal component analysis (PCA) is well known in
high-dim...
Visual storytelling is a creative and challenging task, aiming to
automa...
In this paper, we propose an end-to-end CNN-LSTM model for generating
de...
Recent years have witnessed the significant progress of action recogniti...
Hardware-Software Co-Design is a highly successful strategy for improvin...
While machine learning (ML) systems have produced great advances in seve...
A mathematical topology with matrix is a natural representation of a cod...
Graphical passwords (GPWs) are in many areas of the current world.
Topol...
Next generation of embedded Information and Communication Technology (IC...
Topological graphic passwords (Topsnut-gpws) are one of graph-type passw...
Graphical passwords (GPWs) are convenient for mobile equipments with tou...
Graphical passwords (GPWs) have been studied over 20 years. We are motiv...
Topic modelling techniques such as LDA have recently been applied to spe...