Searched for: +
(1 - 20 of 38)

Pages

document
Yu, Fuyang (author), Wang, Zhen (author), Li, Dongyuan (author), Zhu, P. (author), Liang, Xiaohui (author), Wang, Xiaochuan (author), Okumura, Manabu (author)
Cross-modal retrieval, as an important emerging foundational information retrieval task, benefits from recent advances in multimodal technologies. However, current cross-modal retrieval methods mainly focus on the interaction between textual information and 2D images, lacking research on 3D data, especially point clouds at scene level,...
conference paper 2024
document
Lu, T. (author), Wang, Ruizhi (author), Tang, Z. (author), Zou, Yiwei (author), Yue, X. (author), Liang, Yansong (author), Gong, Haoran (author), Liu, Shurui (author), Chen, Zhiyuan (author), Liu, Xun (author), Du, S. (author)
This article presents a 10mV-startup-voltage thermoelectric energy harvesting system, assisted by a piezoelectric generator (PEG) as a cold starter. It exploits the fact that when a thermoelectric energy harvesting system is implemented in a place where kinetic energy is also present, the PEG starter can provide a clock signal to start the...
journal article 2024
document
Adwani, Dheeraj (author), Pipintakos, Georgios (author), Mirwald, Johannes (author), Wang, Yudi (author), Hajj, Ramez (author), Guo, Meng (author), Liang, Meichen (author), Jing, R. (author), Varveri, Aikaterini (author)
Oxidative aging induces significant stiffening of asphalt binders that leads to a pronounced reduction in the overall durability of asphalt pavements. The strategic implementation of antioxidant additives provides a potential solution to alleviate this issue. This work presents results from the second phase of the global consortium for...
journal article 2024
document
Li, Wenting (author), Wang, Ping (author), Liang, K. (author)
Password-only authentication is one of the most popular secure mechanisms for real-world online applications. But it easily suffers from a practical threat - password leakage, incurred by external and internal attackers. The external attacker may compromise the password file stored on the authentication server, and the insider may...
journal article 2023
document
Ying, Chong (author), Cheng, Bin (author), Zhao, Youwei (author), Huang, He Liang (author), Zhang, Y.N. (author), Gong, Ming (author), Wu, Yulin (author), Wang, S. (author), Liang, Futian (author)
Although near-term quantum computing devices are still limited by the quantity and quality of qubits in the so-called NISQ era, quantum computational advantage has been experimentally demonstrated. Moreover, hybrid architectures of quantum and classical computing have become the main paradigm for exhibiting NISQ applications, where low-depth...
journal article 2023
document
Li, Tiantian (author), Liang, Hongjing (author), Wu, Bin (author), Lan, Dongming (author), Ma, Yunjian (author), Hollmann, F. (author), Wang, Yonghua (author)
Unspecific peroxygenases (UPOs) represent an emerging class of catalysts for the selective oxyfunctionalisation of C–H- and C = C groups. Until now, only a few UPOs have been characterised. In this study, we report a new peroxygenase identified from the Unspecific Peroxygenase Database. The UPO from Agaricus bisporus var. bisporus (AbvbUPO)...
journal article 2023
document
Liang, Ping (author), Wang, Yan (author), Wang, T. (author)
The mental health of older adults has become one of the major health challenges facing society today, which has attracted wide concerns from scholars in urban areas, but research in rural areas has been neglected. Therefore, this paper took rural older adult residents of 11 sample villages in Jintang County, Chengdu City, Sichuan Province, as...
journal article 2023
document
Ghavamipour, Ali Reza (author), Turkmen, Fatih (author), Wang, Rui (author), Liang, K. (author)
Synthetic data generation plays a crucial role in many areas where data is scarce and privacy/confidentiality is a significant concern. Generative Adversarial Networks (GANs), arguably one of the most widely used data synthesis techniques, allow for the training of a model (i.e., generator) that can generate real-looking data by playing a min...
conference paper 2023
document
Wang, Wei (author), Liu, Dongli (author), Xu, Peng (author), Yang, Laurence Tianruo (author), Liang, K. (author)
It has become a trend for clients to outsource their encrypted databases to remote servers and then leverage the Searchable Encryption technique to perform secure data retrieval. However, the method has yet to be considered a crucial need for replication on searchable encrypted data. It calls for challenging works on Dynamic Searchable...
journal article 2023
document
Li, Wenting (author), Yang, Jiahong (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)
Modeling password distributions is a fundamental problem in password security, benefiting the research and applications on password guessing, password strength meters, honey password vaults, etc. As one of the best segment-based password models, WordPCFG has been proposed to capture individual semantic segments (called words) in passwords....
conference paper 2023
document
Guo, Lanpeng (author), Liang, Hongping (author), Hu, Huiyun (author), Shi, Shenbin (author), Wang, Chenxu (author), Li, Hao (author), Lee, Yi Kuen (author), French, P.J. (author), Wang, Yao (author)
Achieving convenient and accurate detection of indoor ppb-level formaldehyde is an urgent requirement to ensure a healthy working and living environment for people. Herein, ultrasmall In<sub>2</sub>O<sub>3</sub> nanorods and supramolecularly functionalized reduced graphene oxide are selected as hybrid components of visible-light-driven (VLD)...
journal article 2023
document
Wang, Lili (author), Lin, Ye (author), Yao, Ting (author), Xiong, Hu (author), Liang, K. (author)
Existing proxy re-encryption (PRE) schemes to secure cloud data sharing raise challenges such as supporting the heterogeneous system efficiently and achieving the unbounded feature. To address this problem, we proposed a fast and secure unbounded cross-domain proxy re-encryption scheme, named FABRIC, which enables the delegator to authorize...
journal article 2023
document
Zhu, Hangyu (author), Wang, R. (author), Jin, Yaochu (author), Liang, K. (author)
Federated learning (FL) is an emerging privacy preserving machine learning protocol that allows multiple devices to collaboratively train a shared global model without revealing their private local data. Nonparametric models like gradient boosting decision trees (GBDTs) have been commonly used in FL for vertically partitioned data. However,...
journal article 2023
document
Liang, Hongping (author), Guo, Xin (author), Guo, Lanpeng (author), Liu, Siying (author), Zhan, Qiuqiang (author), Yang, Haihong (author), Li, Hao (author), de Rooij, Nicolaas Frans (author), Lee, Yi Kuen (author), French, P.J. (author), Wang, Yao (author), Zhou, Guofu (author)
Constructing near-infrared light (NIR) light-enhanced room temperature gas sensors is becoming more promising for practical application. In this study, learning from the structure and photosynthetic process of chlorophyll thylakoid membranes in plants, the first “Thylakoid membrane” structural formaldehyde (HCHO) sensor is constructed by...
journal article 2023
document
Xu, Peng (author), Susilo, Willy (author), Wang, Wei (author), Chen, Tianyang (author), Wu, Qianhong (author), Liang, K. (author), Jin, Hai (author)
Dynamic searchable symmetric encryption (DSSE) has been widely recognized as a promising technique to delegate update and search queries over an outsourced database to an untrusted server while guaranteeing the privacy of data. Many efforts on DSSE have been devoted to obtaining a good tradeoff between security and performance. However, it...
journal article 2022
document
Ma, Yunjian (author), Liang, Hongjing (author), Zhao, Zexin (author), Wu, Bin (author), Lan, Dongming (author), Hollmann, F. (author), Wang, Yonghua (author)
Unspecific peroxygenases (UPOs, EC 1.11.2.1) are promising oxyfunctionalization catalysts because of their unique stereoselectivity. However, so far only a few UPOs have been reported. In this study, gene mining was used to identify a gene from Galerina marginata that coded for a novel UPO (GmaUPO). GmaUPO was expressed in Pichia pastoris X...
journal article 2022
document
Zhang, Jianguo (author), Jiang, Zaixing (author), Liang, Chao (author), Baars, T.F. (author), Wang, Y. (author), Abels, H.A. (author)
The middle Eocene Dongying sag in the Bohai Bay Basin of China has an estimated shale oil resource of approximately 1.1 billion t (8.06 billion bbl); flows of shale oil have been produced in the succession from tens of wells, where the daily production of a single well generally varies between 10 and 100 t (73.3–733 bbl). Therein, the mudrock...
journal article 2022
document
Xie, Jiahong (author), Cheng, Haibo (author), Zhu, Rong (author), Wang, Ping (author), Liang, K. (author)
To date there are few researches on the semantic information of passwords, which leaves a gap preventing us from fully understanding the passwords characteristic and security. We propose a new password probability model for semantic information based on Markov Chain with both generalization and accuracy, called WordMarkov, that can capture the...
conference paper 2022
document
Wang, Xingkai (author), Cao, Zhenfu (author), LIU, Z. (author), Liang, K. (author)
Gordon et al. (TCC 2015) systematically studied the security of Multi-client Verifiable Computation (MVC), in which a set of computationally-weak clients outsource the computation of a general function f over their private inputs to an untrusted server. They introduced the universally composable (UC) security of MVC and proposed a scheme...
conference paper 2022
document
Zheng, Yubo (author), Xu, Peng (author), Wang, Wei (author), Chen, Tianyang (author), Susilo, Willy (author), Liang, K. (author), Jin, Hai (author)
Many practical secure systems have been designed to prevent real-world attacks via maximizing the attacking cost so as to reduce attack intentions. Inspired by this philosophy, we propose a new concept named delay encryption with keyword search (DEKS) to resist the notorious keyword guessing attack (KGA), in the context of secure cloud-based...
conference paper 2022
Searched for: +
(1 - 20 of 38)

Pages