1
Wang, Shui-Hua
2022
Table of Contents:
“... Hashing for Image Retrieval -- Covid-19 detection by Wavelet Entropy and Artificial Bee Colony -- Heat-map Algorithm based Multi-robots Path Planning Method -- Workshop of Data Fusion for Positioning and Navigation -- Distributed quaternion Kalman filter...”2022
Full text
2
Table of Contents:
“... for Video Anomaly Analysis with Weak Label -- A Data Fusion Model based on Multi-source Non-real-time Intelligence -- Ancient Chinese Lexicon Construction Based on Unsupervised Algorithm of Minimum Entropy and CBDB Optimization -- Availability Analysis of GNSS...”
Full text
Full text
3
Malkin, Tal
2021
Table of Contents:
“... -- Low-Complexity Cryptography -- Low-Complexity Weak Pseudorandom Functions in AC0[MOD2] -- MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications -- No Time to Hash: On Super-Efficient Entropy Accumulation...”2021
Full text
4
Li, Bo
2021
Table of Contents:
“... -- Modulation Pattern Recognition Based on Wavelet Approximate Coefficient Entropy -- A new message passing algorithm based on sphere decoding improvement -- A Novel Codebook Design Scheme for Sparse Code Multiple Access -- Multi-View Polarization HRRP Target...”2021
Full text
5
Echizen, Isao
2016
Table of Contents:
“... and Natural Ones Using Smoothness Property and Local Entropy -- Multiple MP3 Compression Detection based on the Statistical Properties of Scale Factors -- Detection of Double compression for HEVC videos based on the Co-occurrence Matrix of DCT coefficients...”2016
Full text
6
Barreto, Paulo
2016
Table of Contents:
“...Secret sharing -- Quantum cryptography -- Visual cryptography -- Cryptographic protocols.-Entropy, extractors and privacy....”2016
Full text
7
Padró, Carles.
2014
Table of Contents:
“... -- New Lower Bounds for Privacy in Communication Protocols -- On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis -- Information Theoretic Security for Encryption Based on Conditional Renyi Entropies -- Insider-proof encryption...”2014
Full text
8
Danger, Jean Luc.
2014
Table of Contents:
“...On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case -- On the Feasibility of a Censorship Resistant Decentralized Naming System -- A General Framework for Group Authentication and Key Exchange Protocols -- Modelling Simultaneous...”2014
Full text
9
Bacon, Dave
2014
Table of Contents:
“...Weak Coin Flipping in a Device-Independent Setting -- Security of Device-Independent Quantum Key Distribution Protocols -- The Locking-Decoding Frontier for Generic Dynamics -- Telescopic Relative Entropy. Approximating the Turaev-Viro Invariant...”2014
Full text
10
Iwama, Kazuo.
2013
Table of Contents:
“... by Quantum Walks on Two-Dimensional Grid without Amplitude Amplification -- The Effects of Free Will on Randomness Expansion -- Semi-device-independent QKD Based on BB84 and a CHSH-Type Estimation -- On Some Special Cases of the Entropy Photon-Number Inequality...”2013
Full text
11
Dose, Volker
1999
Table of Contents:
“...Edwin Thompson Jaynes -- A Tribute to Edwin T. Jaynes -- The Near-Irrelevance of Sampling Frequency Distributions -- Outlier Tolerant Parameter Estimation -- Universality, Prior Information and Maximum Entropy in Foams -- Texture Reconstruction in Noisy...”1999
Full text
12
Erickson, Gary J.
1998
Table of Contents:
“...Massive Inference and Maximum Entropy -- CV-NP Bayesianism by MCMC -- Which Algorithms are Feasible? A Maxent Approach -- Maximum Entropy, Likelihood and Uncertainty: A Comparison -- Probabilistic Methods for Data Fusion -- Whence the Laws of Probability...”1998
Full text
13
Fu, King Sun
1982
Table of Contents:
“... Inequalities -- Pattern Class Representation Related to the Karhunen-Loeve Expansion -- Sample Size Sensitive Entropy -- An Optimal Clustering Method Based on the Rasson’s Criterion and Resulting from a New Approach -- Computational Geometric Problems in Pattern...”1982
Full text