Searched for: +
(1 - 20 of 180)

Pages

document
Liang, X. (author), An, Kun (author), Correia, Gonçalo (author), van Arem, B. (author)
abstract 2018
document
Schlangen, E. (author), Liang, M. (author), Šavija, B. (author)
The study aims to investigate the mechanism of early-age cracks in different massive concrete structures (i.e. tunnels, bridge foundations and underground parking garages), with the objective of answering the following three specific questions: <br/><br/>1) How does the parameters of concrete proportion mix (e.g. w/c ratio, cementitious...
book chapter 2022
document
Liang, M. (author), Schlangen, E. (author), Šavija, B. (author)
Stress evolution of restrained concrete is directly related to early-age cracking (EAC) potential of concrete, which is a tricky problem that often happens in engineering practice. Due to the global objective of carbon reduction, Ground granulated blast furnace slag (GGBFS) concrete has become a more promising binder comparing with Ordinary...
book chapter 2023
document
He, S. (author), Liang, M. (author), Yang, En-hua (author), Schlangen, E. (author)
The properties of the interfacial transition zone (ITZ) between microfiber and cement-based matrix are of primary significance for the overall behavior of strain hardening cementitious composites (SHCCs). However, due to the relatively small diameter of polymeric microfibers (e.g., PVA fiber), it is technically difficult to obtain...
book chapter 2023
document
Li, Z. (author), Zhang, Shizhe (author), Liang, X. (author), Kostiuchenko, A. (author), Ye, G. (author)
Alkali activated concrete (AAC) has not received broader industry acceptance, one reason of which lies in the uncertainties in the durability against shrinkage and potential cracking. Many studies reported that AAC exhibit larger autogenous shrinkage than OPC concrete. However, it is unable to deduce that AAC should show higher cracking...
book chapter 2021
document
Liang, Z. (author)
In current mitigating-climate-change scenario, the urbanized area is believed to be crucial to the sustainable development of our living environment. In this respect, the low2No international competition has been recently held in Finland with an attempt to trigger systematic change on sustainable development nationally toward a low carbon future...
conference paper 2014
document
Liang, Xuhui (author), Dong, Hua (author), Li, Zhenming (author), van Zijl, Marc Brito (author), Ye, Guang (author)
This paper investigated the feasibility of using biomass fly ash (BFA) to prepare alkaliactivated slag and fly ash paste. The reference mixture was alkali-activated slag and coal fly ash (CFA) paste with a slag-to-coal fly ash ratio of 50/50. In other mixtures, coal fly ash was replaced at 40% and 100% with BFA, respectively. The results showed...
conference paper 2021
document
Liang, Rong Hao (author), Chiumento, Alessandro (author), Zuniga, Marco (author), Pawełczak, Przemysław (author), Funk, Mathias (author), Chuang, Yaliang (author), Frens, Joep (author)
The CHIIoT workshop series brings together researchers and practitioners from human-computer interaction (HCI) design, computer science, and electrical engineering working on new challenges in industry and academia. In EICS 2021, This workshop will provide a platform for participants to review and discuss challenges and opportunities in the...
conference paper 2021
document
Liang, Yu (author), Loni, B. (author), Larson, M.A. (author)
In the CLEF NewsREEL 2017 challenge, we build a delegation model based on the contextual bandit algorithm. Our goal is to investigate whether a bandit approach combined with context extracted from the user side, from the item side and from user-item interaction can help choose the appropriate recommender from a recommender algorithm pool for the...
conference paper 2017
document
Liang, X. (author), Dong, H. (author), Li, Z. (author), van Zijl, Marc Brito (author), Ye, G. (author)
This paper investigated the feasibility of using biomass fly ash (BFA) to prepare alkaliactivated slag and fly ash paste. The reference mixture was alkali-activated slag and coal fly ash (CFA) paste with a slag-to-coal fly ash ratio of 50/50. In other mixtures, coal fly ash was replaced at 40% and 100% with BFA, respectively. The results showed...
conference paper 2021
document
Xie, Jiahong (author), Cheng, Haibo (author), Zhu, Rong (author), Wang, Ping (author), Liang, K. (author)
To date there are few researches on the semantic information of passwords, which leaves a gap preventing us from fully understanding the passwords characteristic and security. We propose a new password probability model for semantic information based on Markov Chain with both generalization and accuracy, called WordMarkov, that can capture the...
conference paper 2022
document
Ghavamipour, Ali Reza (author), Turkmen, Fatih (author), Wang, Rui (author), Liang, K. (author)
Synthetic data generation plays a crucial role in many areas where data is scarce and privacy/confidentiality is a significant concern. Generative Adversarial Networks (GANs), arguably one of the most widely used data synthesis techniques, allow for the training of a model (i.e., generator) that can generate real-looking data by playing a min...
conference paper 2023
document
Yu, Fuyang (author), Wang, Zhen (author), Li, Dongyuan (author), Zhu, P. (author), Liang, Xiaohui (author), Wang, Xiaochuan (author), Okumura, Manabu (author)
Cross-modal retrieval, as an important emerging foundational information retrieval task, benefits from recent advances in multimodal technologies. However, current cross-modal retrieval methods mainly focus on the interaction between textual information and 2D images, lacking research on 3D data, especially point clouds at scene level,...
conference paper 2024
document
Gordijn, Daan (author), Kromes, R.G. (author), Giannetsos, Thanassis (author), Liang, K. (author)
This work aims to provide a more secure access control in Hyperledger Fabric blockchain by combining multiple ID’s, attributes, and policies with the components that regulate access control. The access control system currently used by Hyperledger Fabric is first completely analyzed. Next, a new implementation is proposed that builds upon the...
conference paper 2023
document
Wang, Xingkai (author), Cao, Zhenfu (author), LIU, Z. (author), Liang, K. (author)
Gordon et al. (TCC 2015) systematically studied the security of Multi-client Verifiable Computation (MVC), in which a set of computationally-weak clients outsource the computation of a general function f over their private inputs to an untrusted server. They introduced the universally composable (UC) security of MVC and proposed a scheme...
conference paper 2022
document
Zheng, Yubo (author), Xu, Peng (author), Wang, Wei (author), Chen, Tianyang (author), Susilo, Willy (author), Liang, K. (author), Jin, Hai (author)
Many practical secure systems have been designed to prevent real-world attacks via maximizing the attacking cost so as to reduce attack intentions. Inspired by this philosophy, we propose a new concept named delay encryption with keyword search (DEKS) to resist the notorious keyword guessing attack (KGA), in the context of secure cloud-based...
conference paper 2022
document
Grishkov, I. (author), Kromes, R.G. (author), Giannetsos, Thanassis (author), Liang, K. (author)
This paper offers a prototype of a Hyperledger Fabric-IPFS based network architecture including a smart contract based encryption scheme that meant to improve the security of user’s data that is being uploaded to the distributed ledger. A new extension to the self-encryption scheme was deployed by integrating data owner’s identity into the...
conference paper 2023
document
Liang, X. (author), Correia, Gonçalo (author)
In this paper, we propose an optimization model to select the charging locations of an automated electric taxi (AET) system. The service provided by this AET system is a seamless door-to-door service connected to the train station, which helps improve the last mile transport. We individualize the vehicles instead of treating them as a flow to...
conference paper 2020
document
Zhao, Zhendong (author), Chen, Xiaojun (author), Xuan, Yuexin (author), Dong, Ye (author), Wang, Dakui (author), Liang, K. (author)
Backdoor attack is a type of serious security threat to deep learning models. An adversary can provide users with a model trained on poisoned data to manipulate prediction behavior in test stage using a backdoor. The backdoored models behave normally on clean images, yet can be activated and output incorrect prediction if the input is stamped...
conference paper 2022
document
Teng, Li (author), Liang, Junrui (author), Du, S. (author)
Owing to the advancement of vibration energy harvesting technology, many motion-powered battery-free Internet of things (IoT) applications have been reported in recent years. Since the ambient energy is usually weak, these IoT devices (a) mostly operate in intermittent or burst mode. The operation of these devices heavily depends on the level of...
conference paper 2022
Searched for: +
(1 - 20 of 180)

Pages