Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Two classes of 1-resilient semi-bent functions based on disjoint linear codes
Discrete Applied Mathematics (DAMA), Volume 358, Issue CPages 147–157https://doi.org/10.1016/j.dam.2024.06.040AbstractSemi-bent functions are Boolean functions with almost optimal nonlinearity, and the number of input variables can be either even or odd. Semi-bent functions are widely used in the design of symmetric cryptographic systems and CDMA communication ...
- research-articleOctober 2024
Further construction of even-variable balanced rotation symmetric Boolean functions with optimal algebraic immunity
AbstractThe field of cryptography has given a lot of attention to rotation symmetric Boolean functions (RSBFs) because they possess special structures and include many functions with good cryptographic properties. It is difficult to construct even-...
- research-articleJuly 2024
Pairing-free Proxy Re-Encryption scheme with Equality Test for data security of IoT
Journal of King Saud University - Computer and Information Sciences (JKSUCIS), Volume 36, Issue 6https://doi.org/10.1016/j.jksuci.2024.102105AbstractThe construction of IoT cloud platform brings great convenience to the storage of massive IoT node data. To ensure security of data collected by the IoT nodes, the data must be encrypted when the nodes upload it. However, it arises some challenge ...
- research-articleJune 2024
Multi-feature fusion enhanced monocular depth estimation with boundary awareness
The Visual Computer: International Journal of Computer Graphics (VISC), Volume 40, Issue 7Pages 4955–4967https://doi.org/10.1007/s00371-024-03498-wAbstractSelf-supervised monocular depth estimation has opened up exciting possibilities for practical applications, including scene understanding, object detection, and autonomous driving, without the need for expensive depth annotations. However, ...
- research-articleJune 2024
DRCLAS: An efficient certificateless aggregate signature scheme with dynamic revocation in vehicular ad-hoc networks
AbstractThe emergence of the Vehicular Ad-hoc Networks (VANETs) has greatly enhanced the efficiency and safety of transportation systems. However, due to the dynamicness and openness of vehicular networks, it is vulnerable for VANETs to confront various ...
-
- research-articleJune 2024
An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics
We propose a one-time blind signature scheme based on coding theory, which is improved on the basis of the SHMWW protocol. By adding two blinding factors, the anonymity of users is protected. The analysis proves that the scheme is secure and meets the ...
- research-articleDecember 2023
KuaiSim: a comprehensive simulator for recommender systems
NIPS '23: Proceedings of the 37th International Conference on Neural Information Processing SystemsArticle No.: 1945, Pages 44880–44897Reinforcement Learning (RL)-based recommender systems (RSs) have garnered considerable attention due to their ability to learn optimal recommendation policies and maximize long-term user rewards. However, deploying RL models directly in online ...
- research-articleDecember 2023
State regularized policy optimization on data with dynamics shift
NIPS '23: Proceedings of the 37th International Conference on Neural Information Processing SystemsArticle No.: 1427, Pages 32926–32937In many real-world scenarios, Reinforcement Learning (RL) algorithms are trained on data with dynamics shift, i.e., with different underlying environment dynamics. A majority of current methods address such issue by training context encoders to identify ...
- ArticleDecember 2023
DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection
AbstractAmong indoor localization services, WiFi fingerprint technology has attracted much attention because of its wide coverage area and high positioning accuracy. However, concerns arise regarding the vulnerability of users’ personal sensitive ...
- research-articleDecember 2023
A lattice-based designated-server public-key authenticated encryption with keyword search
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 145, Issue Chttps://doi.org/10.1016/j.sysarc.2023.103031AbstractPublic-key Encryption with Keyword Search (PEKS) provides an efficient way to search on encrypted cloud data. However, it cannot resist against off-line Inside Keyword Guessing Attacks (IKGA). To alleviate this issue, Huang and Li proposed the ...
- ArticleNovember 2023
- research-articleNovember 2023
pdRide: Privacy-Preserving Distributed Online Ride-Hailing Matching Scheme
IEEE Transactions on Intelligent Transportation Systems (ITS-TRANSACTIONS), Volume 24, Issue 11Pages 12491–12505https://doi.org/10.1109/TITS.2023.3286804Privacy-preserving online ride-hailing (ORH) service enables riders and drivers to conveniently establish optimized ride-hailing through mobile applications without disclosing their location information. In order to alleviate the load of central server ...
- research-articleOctober 2023
A unified construction of weightwise perfectly balanced Boolean functions
Discrete Applied Mathematics (DAMA), Volume 337, Issue CPages 190–201https://doi.org/10.1016/j.dam.2023.04.021AbstractAt Eurocrypt 2016, Méaux et al. presented FLIP, a new family of stream ciphers that aimed to enhance the efficiency of homomorphic encryption frameworks. Motivated by FLIP, recent research has focused on the study of Boolean functions with good ...
- research-articleAugust 2023
PrefRec: Recommender Systems with Human Preferences for Reinforcing Long-term User Engagement
KDD '23: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 2874–2884https://doi.org/10.1145/3580305.3599473Current advances in recommender systems have been remarkably successful in optimizing immediate engagement. However, long-term user engagement, a more desirable performance metric, remains difficult to improve. Meanwhile, recent reinforcement learning (...
- research-articleAugust 2023
Generative Flow Network for Listwise Recommendation
KDD '23: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 1524–1534https://doi.org/10.1145/3580305.3599364Personalized recommender systems fulfill the daily demands of customers and boost online businesses. The goal is to learn a policy that can generate a list of items that matches the user's demand or interest. While most existing methods learn a ...
- research-articleJuly 2023
A Novel Authentication Scheme Supporting Multiple User Access for 5G and Beyond
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 20, Issue 4Pages 2970–2987https://doi.org/10.1109/TDSC.2022.3198723The deployment of ultra-dense networks in the fifth-generation (5 G) network architecture can significantly improve the quality of wireless links, but this will cause frequent handovers of mobile users and increase authentication delays. Furthermore, the ...
- short-paperApril 2023
Reinforcing User Retention in a Billion Scale Short Video Recommender System
- Qingpeng Cai,
- Shuchang Liu,
- Xueliang Wang,
- Tianyou Zuo,
- Wentao Xie,
- Bin Yang,
- Dong Zheng,
- Peng Jiang,
- Kun Gai
WWW '23 Companion: Companion Proceedings of the ACM Web Conference 2023Pages 421–426https://doi.org/10.1145/3543873.3584640Recently, short video platforms have achieved rapid user growth by recommending interesting content to users. The objective of the recommendation is to optimize user retention, thereby driving the growth of DAU (Daily Active Users). Retention is a long-...
- research-articleApril 2023
Multi-Task Recommendations with Reinforcement Learning
- Ziru Liu,
- Jiejie Tian,
- Qingpeng Cai,
- Xiangyu Zhao,
- Jingtong Gao,
- Shuchang Liu,
- Dayou Chen,
- Tonghao He,
- Dong Zheng,
- Peng Jiang,
- Kun Gai
WWW '23: Proceedings of the ACM Web Conference 2023Pages 1273–1282https://doi.org/10.1145/3543507.3583467In recent years, Multi-task Learning (MTL) has yielded immense success in Recommender System (RS) applications [40]. However, current MTL-based recommendation models tend to disregard the session-wise patterns of user-item interactions because they are ...
- research-articleApril 2023
Two-Stage Constrained Actor-Critic for Short Video Recommendation
- Qingpeng Cai,
- Zhenghai Xue,
- Chi Zhang,
- Wanqi Xue,
- Shuchang Liu,
- Ruohan Zhan,
- Xueliang Wang,
- Tianyou Zuo,
- Wentao Xie,
- Dong Zheng,
- Peng Jiang,
- Kun Gai
WWW '23: Proceedings of the ACM Web Conference 2023Pages 865–875https://doi.org/10.1145/3543507.3583259The wide popularity of short videos on social media poses new opportunities and challenges to optimize recommender systems on the video-sharing platforms. Users sequentially interact with the system and provide complex and multi-faceted responses, ...
- research-articleApril 2023
Exploration and Regularization of the Latent Action Space in Recommendation
- Shuchang Liu,
- Qingpeng Cai,
- Bowen Sun,
- Yuhao Wang,
- Ji Jiang,
- Dong Zheng,
- Peng Jiang,
- Kun Gai,
- Xiangyu Zhao,
- Yongfeng Zhang
WWW '23: Proceedings of the ACM Web Conference 2023Pages 833–844https://doi.org/10.1145/3543507.3583244In recommender systems, reinforcement learning solutions have effectively boosted recommendation performance because of their ability to capture long-term user-system interaction. However, the action space of the recommendation policy is a list of items,...