Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Jingnan He"'
Publikováno v:
Diagnostics, Vol 12, Iss 6, p 1423 (2022)
Background: Graf’s method is currently the most commonly used ultrasound-based technique for the diagnosis of developmental dysplasia of the hip (DDH). However, the efficiency and accuracy of diagnosis are highly affected by the sonographers’ qua
Externí odkaz:
https://doaj.org/article/031cb3d17c8c4dfd953f05b10a552474
Publikováno v:
Journal of Pediatric Orthopaedics B; Jul2024, Vol. 33 Issue 4, p314-321, 8p
Publikováno v:
Journal of Clinical Ultrasound. 51:656-662
Publikováno v:
Security and Communication Networks, Vol 2020 (2020)
We present a secure backpropagation neural network training model (SecureBP), which allows a neural network to be trained while retaining the confidentiality of the training data, based on the homomorphic encryption scheme. We make two contributions.
Autor:
Jingnan He, Ligang Cui, Tao Chen, Xuemin Lyu, Jingmiao Yu, Wen Guo, Dandan Wang, Xiaoting Qin, Yibing Zhao, Shumin Zhang
Publikováno v:
Journal of clinical ultrasound : JCUREFERENCES. 50(5)
An automatic evaluation technology based on artificial intelligence and three-dimensional ultrasonography (3D US) is proposed for hip US inspection plane selection. This study aimed to evaluate the consistency of the α angle as measured using 3D US
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030453732
Public Key Cryptography (1)
Public Key Cryptography (1)
Password-based authenticated key exchange (PAKE) allows two parties with a shared pass- word to agree on a session key. In the last decade, the design of PAKE protocols from lattice assumptions has attracted lots of attention. However, existing solut
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::56d804bb81d1b2672ba3948d12b1ad98
https://doi.org/10.1007/978-3-030-45374-9_14
https://doi.org/10.1007/978-3-030-45374-9_14
Publikováno v:
Cryptology and Network Security ISBN: 9783030315771
CANS
CANS
As an extension of identity-based encryption (IBE), revocable hierarchical IBE (RHIBE) supports both key revocation and key delegation simultaneously, which are two important functionalities for cryptographic use in practice. Recently in PKC 2019, Ka
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9291ab1bce2a15836b27950bf761d103
https://doi.org/10.1007/978-3-030-31578-8_6
https://doi.org/10.1007/978-3-030-31578-8_6
Publikováno v:
Information Security and Cryptology ISBN: 9783030142339
Inscrypt
Inscrypt
The Number Theoretic Transform (NTT) provides efficient algorithm for multiplying large degree polynomials. It is commonly used in cryptographic schemes that are based on the hardness of the Ring Learning With Errors problem (RLWE), which is a popula
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::deb86f7d266ccd664d96cfc543d24b94
https://doi.org/10.1007/978-3-030-14234-6_7
https://doi.org/10.1007/978-3-030-14234-6_7
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030033286
ASIACRYPT (2)
ASIACRYPT (2)
Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM). It is a special type of KEM involving two pairs o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4c590714008beab1f723d53c7a7dea85
https://doi.org/10.1007/978-3-030-03329-3_6
https://doi.org/10.1007/978-3-030-03329-3_6
Publikováno v:
APKC@AsiaCCS
Based on the learning with errors (LWE) problem, we construct an identity-based encryption (IBE) scheme in the standard-model which is secure against the key dependent message (KDM) attacks and the selective opening (SO) attacks. KDM security, which