E-Business and Telecommunications: 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26–28, 2019, Revised Selected Papers
暂无分享,去创建一个
Krishna M. Sivalingam | Alfredo Cuzzocrea | Simone Diniz Junqueira Barbosa | Mohammad S. Obaidat | Raquel Oliveira Prates | Phoebe Chen | Xiaoyong Du | Orhun Kara | Ting Liu | Dominik Ślęzak | Takashi Washio | Xiaokang Yang | Junsong Yuan | T. Washio | D. Ślęzak | Simone Diniz Junqueira Barbosa | Phoebe Chen | A. Cuzzocrea | Xiaoyong Du | Orhun Kara | Ting Liu | K. Sivalingam | Xiaokang Yang | Junsong Yuan | R. Prates | M. Obaidat
[1] Robert G. Gallager,et al. Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.
[2] V. Strassen. Gaussian elimination is not optimal , 1969 .
[3] E. Wolpert. A Manual of Standardized Terminology, Techniques and Scoring System for Sleep Stages of Human Subjects. , 1969 .
[4] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[5] T. W. Parsons. Separation of speech from interfering speech by means of harmonic selection , 1976 .
[6] E. Kay,et al. Introductory Graph Theory , 1978 .
[7] Abbas El Gamal,et al. Capacity theorems for the relay channel , 1979, IEEE Trans. Inf. Theory.
[8] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[9] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[10] H. Cooper. Organizing knowledge syntheses: A taxonomy of literature reviews , 1988 .
[11] Joachim Hagenauer,et al. A Viterbi algorithm with soft-decision outputs and its applications , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.
[12] A. Glavieux,et al. Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1 , 1993, Proceedings of ICC '93 - IEEE International Conference on Communications.
[13] Guy J. Brown,et al. Computational auditory scene analysis , 1994, Comput. Speech Lang..
[14] J. Samet,et al. The Sleep Heart Health Study: design, rationale, and methods. , 1997, Sleep.
[15] Hans-Andrea Loeliger. New turbo-like codes , 1997, Proceedings of IEEE International Symposium on Information Theory.
[16] H. Otzenberger,et al. Temporal relationship between dynamic heart rate variability and electroencephalographic activity during sleep in man , 1997, Neuroscience Letters.
[17] W. Loh,et al. SPLIT SELECTION METHODS FOR CLASSIFICATION TREES , 1997 .
[18] Uri Zwick,et al. All pairs shortest paths in weighted directed graphs-exact and almost exact algorithms , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[19] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[20] Uri Zwick,et al. All pairs shortest paths in undirected graphs with integer weights , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[21] Emre Telatar,et al. Capacity of Multi-antenna Gaussian Channels , 1999, Eur. Trans. Telecommun..
[22] R. Wise,et al. Go Downstream: The New Profit Imperative in Manufacturing , 1999 .
[23] Reid Lifset. Moving from Products to Services , 2000 .
[24] Ivan Damgård,et al. Multiparty Computation from Threshold Homomorphic Encryption , 2000, EUROCRYPT.
[25] Dariush Divsalar,et al. Serial turbo trellis coded modulation with rate-1 inner code , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[26] Michael A. Casey,et al. Separation of Mixed Audio Sources By Independent Subspace Analysis , 2000, ICMC.
[27] Silvio Micali,et al. Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements , 2000, EUROCRYPT.
[28] J. Trinder,et al. Autonomic activity during human sleep as a function of time and sleep stage , 2001, Journal of sleep research.
[29] Johann Großschädl,et al. A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m) , 2001, CHES.
[30] Stephan ten Brink,et al. Convergence behavior of iteratively decoded parallel concatenated codes , 2001, IEEE Trans. Commun..
[31] O. Mont. Introducing and developing a Product-Service System (PSS) concept in Sweden , 2001 .
[32] Wenliang Du,et al. Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.
[33] Mark D. Plumbley,et al. IF THE INDEPENDENT COMPONENTS OF NATURAL IMAGES ARE EDGES, WHAT ARE THE INDEPENDENT COMPONENTS OF NATURAL SOUNDS? , 2001 .
[34] Christoph Busch,et al. Watermarking 2D-vector data for geographical information systems , 2002, IS&T/SPIE Electronic Imaging.
[35] Richard T. Watson,et al. Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..
[36] Oksana Mont,et al. Clarifying the Concept of Product-Service System , 2002 .
[37] Ryutarou Ohbuchi,et al. Robust watermarking of vector digital maps , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.
[38] Elza Erkip,et al. User cooperation diversity. Part I. System description , 2003, IEEE Trans. Commun..
[39] Matthew C. Valenti,et al. Distributed turbo coded diversity for relay channel , 2003 .
[40] Ezio Manzini,et al. A strategic design approach to develop sustainable product service systems: examples taken from the ‘environmentally friendly innovation’ Italian prize , 2003 .
[41] G.-J. Jang,et al. Single-channel signal separation using time-domain basis functions , 2003, IEEE Signal Processing Letters.
[42] A. Tukker. Eight types of product–service system: eight ways to sustainability? Experiences from SusProNet , 2004 .
[43] Peter W. Markstein,et al. Software Division and Square Root Using Goldschmidt's Algorithms , 2004 .
[44] V. Tarokh,et al. Design and analysis of collaborative diversity protocols for wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[45] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[46] DeLiang Wang,et al. Overcomplete Blind Source Separation by Combining ICA and Binary Time-Frequency Masking , 2005, 2005 IEEE Workshop on Machine Learning for Signal Processing.
[47] Eike Kiltz,et al. Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation , 2006, IACR Cryptol. ePrint Arch..
[48] T. Strine,et al. Associations of frequent sleep insufficiency with health-related quality of life and health behaviors. , 2005, Sleep medicine.
[49] Yuval Ishai,et al. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation , 2005, TCC.
[50] Dan Barry,et al. Single Channel Source Separation using Short-time Independent Component Analysis , 2005 .
[51] Rémi Gribonval,et al. Performance measurement in blind audio source separation , 2006, IEEE Transactions on Audio, Speech, and Language Processing.
[52] Peng Li,et al. Monaural Speech Separation Based on Computational Auditory Scene Analysis and Objective Quality Assessment of Speech , 2006, IEEE Transactions on Audio, Speech, and Language Processing.
[53] Lutz H.-J. Lampe,et al. Distributed space-time coding for multihop transmission in power line communication networks , 2006, IEEE Journal on Selected Areas in Communications.
[54] Jan C. Aurich,et al. Life cycle oriented design of technical Product-Service Systems , 2006 .
[55] Mark R. Every,et al. Separation of synchronous pitched notes by spectral filtering of harmonics , 2006, IEEE Transactions on Audio, Speech, and Language Processing.
[56] Aggelos Bletsas,et al. A simple Cooperative diversity method based on network path selection , 2005, IEEE Journal on Selected Areas in Communications.
[57] M.E. Davies,et al. Source separation using single channel ICA , 2007, Signal Process..
[58] J. Pagel,et al. Primary care sleep medicine : a practical guide , 2007 .
[59] Ivan Damgård,et al. Non-interactive Proofs for Integer Multiplication , 2007, EUROCRYPT.
[60] Jun Hu,et al. Low Density Parity Check Codes over Wireless Relay Channels , 2007, IEEE Transactions on Wireless Communications.
[61] Artak Amirbekyan,et al. A New Efficient Privacy-Preserving Scalar Product Protocol , 2007, AusDM.
[62] T S Baines,et al. State-of-the-art in product-service systems , 2007 .
[63] Rémi Gribonval,et al. Oracle estimators for the benchmarking of source separation algorithms , 2007, Signal Process..
[64] Ashutosh Sabharwal,et al. Low density parity check codes for the relay channel , 2007, IEEE Journal on Selected Areas in Communications.
[65] Tsan-sheng Hsu,et al. Toward Empirical Aspects of Secure Scalar Product , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[66] M. Anwar Hasan,et al. High-Performance Architecture of Elliptic Curve Scalar Multiplication , 2008, IEEE Transactions on Computers.
[67] A. Li,et al. AUTHENTICATION OF GIS VECTOR DATA BASED ON ZERO-WATERMARKING , 2008 .
[68] Ping Deng,et al. Secure Multi-party Protocols for Privacy Preserving Data Mining , 2008, WASA.
[69] Milos D. Ercegovac,et al. Digital Arithmetic , 2003, Wiley Encyclopedia of Computer Science and Engineering.
[70] Derry Fitzgerald,et al. Extended Nonnegative Tensor Factorisation Models for Musical Sound Source Separation , 2008, Comput. Intell. Neurosci..
[71] Changshui Zhang,et al. Unsupervised Single-Channel Music Source Separation by Average Harmonic Structure Modeling , 2008, IEEE Transactions on Audio, Speech, and Language Processing.
[72] A. Neely. Exploring the financial consequences of the servitization of manufacturing , 2008 .
[73] Kristína Susmáková,et al. Discrimination ability of individual measures used in sleep stages classification , 2008, Artif. Intell. Medicine.
[74] Aggelos K. Katsaggelos,et al. A Computational Auditory Scene Analysis-Enhanced Beamforming Approach for Sound Source Separation , 2009, EURASIP J. Adv. Signal Process..
[75] Tomas Toft,et al. Linear, Constant-Rounds Bit-Decomposition , 2009, ICISC.
[76] Erdal Arikan,et al. Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.
[77] Yonghui Li,et al. Distributed space-time trellis codes for a cooperative system , 2009, IEEE Transactions on Wireless Communications.
[78] DeLiang Wang,et al. Monaural Musical Sound Separation Based on Pitch and Common Amplitude Modulation , 2009, IEEE Transactions on Audio, Speech, and Language Processing.
[79] G. David Forney,et al. Concatenated codes , 2009, Scholarpedia.
[80] Jalil Taghia,et al. Subband-based Single-channel Source Separation of Instantaneous Audio Mixtures , 2009 .
[81] Yi Li,et al. Sleep stage classification based on EEG Hilbert-Huang transform , 2009, 2009 4th IEEE Conference on Industrial Electronics and Applications.
[82] Relay Selection with ANC and TDBC Protocols in Bidirectional Relay Networks , 2010, IEEE Transactions on Communications.
[83] Jungyeop Kim. Robust Vector Digital Watermarking Using Angles and a Random Table , 2010, Adv. Inf. Sci. Serv. Sci..
[84] Xiang Li,et al. Iterative embedding-based reversible watermarking for 2D-vector maps , 2010, 2010 IEEE International Conference on Image Processing.
[85] Octavian Catrina,et al. Secure Computation with Fixed-Point Numbers , 2010, Financial Cryptography.
[86] Changshui Zhang,et al. Multiple Fundamental Frequency Estimation by Modeling Spectral Peaks and Non-Peak Regions , 2010, IEEE Transactions on Audio, Speech, and Language Processing.
[87] Mariko Nakano-Miyatake,et al. A Blind Video Watermarking Scheme Robust To Frame Attacks Combined With MPEG2 Compression , 2010 .
[88] Chokri Ben Amar,et al. Collusion, MPEG4 compression and frame dropping resistant video watermarking , 2010, Multimedia Tools and Applications.
[89] Octavian Catrina,et al. Secure Multiparty Linear Programming Using Fixed-Point Arithmetic , 2010, ESORICS.
[90] Stefan Conrad,et al. An approach for automatic sleep stage scoring and apnea-hypopnea detection , 2010, 2010 IEEE International Conference on Data Mining.
[91] Octavian Catrina,et al. Improved Primitives for Secure Multiparty Integer Computation , 2010, SCN.
[92] Vitaly Anatolyevich Mitekin,et al. The New Blockwise Algorithm for Large-Scale Images Robust Watermarking , 2010, 2010 20th International Conference on Pattern Recognition.
[93] Lajos Hanzo,et al. Maximum-Throughput Irregular Distributed Space-Time Code for Near-Capacity Cooperative Communications , 2010, IEEE Transactions on Vehicular Technology.
[94] Patrick McDaniel,et al. Analysis techniques for mobile operating system security , 2011 .
[95] Ki-Ryong Kwon,et al. Vector watermarking scheme for GIS vector map management , 2011, Multimedia Tools and Applications.
[96] Herbert Bos,et al. Minemu: The World's Fastest Taint Tracker , 2011, RAID.
[97] Bruno Crispo,et al. YAASE: Yet Another Android Security Extension , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[98] T. H. Liew,et al. Turbo Coding, Turbo Equalisation and Space-Time Coding: EXIT-Chart-Aided Near-Capacity Designs for Wireless Channels , 2011 .
[99] K. J. Ray Liu,et al. Factorization of Overlapping Harmonic Sounds Using Approximate Matching Pursuit , 2011, ISMIR.
[100] Dariusz Mika,et al. ICA-based Single Channel Audio Separation: New Bases and Measures of Distance , 2011 .
[101] Anna Krakovská,et al. Automatic sleep scoring: A search for an optimal combination of measures , 2011, Artif. Intell. Medicine.
[102] Sheng-Fu Liang,et al. A rule-based automatic sleep staging method , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[103] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[104] S. Sohn,et al. The reliability and validity of the Korean version of the Pittsburgh Sleep Quality Index , 2012, Sleep and Breathing.
[105] José Ramón Beltrán Blázquez,et al. Blind separation of overlapping partials in harmonic musical notes using amplitude and phase reconstruction , 2012, EURASIP J. Adv. Signal Process..
[106] Natheer Khasawneh,et al. Automated sleep stage identification system based on time-frequency analysis of a single EEG channel and random forest classifier , 2012, Comput. Methods Programs Biomed..
[107] S. Quan,et al. Rules for scoring respiratory events in sleep: update of the 2007 AASM Manual for the Scoring of Sleep and Associated Events. Deliberations of the Sleep Apnea Definitions Task Force of the American Academy of Sleep Medicine. , 2012, Journal of clinical sleep medicine : JCSM : official publication of the American Academy of Sleep Medicine.
[108] Mauro Conti,et al. MOSES: supporting operation modes on smartphones , 2012, SACMAT '12.
[109] Roberto Di Pietro,et al. PRISM - Privacy-Preserving Search in MapReduce , 2012, Privacy Enhancing Technologies.
[110] W. Jatmiko,et al. An integrated sleep stage classification device based on electrocardiograph signal , 2012, 2012 International Conference on Advanced Computer Science and Information Systems (ICACSIS).
[111] Seral Özsen,et al. Classification of sleep stages using class-dependent sequential feature selection and artificial neural network , 2012, Neural Computing and Applications.
[112] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[113] E. Zagrouba,et al. A robust video watermarking based on image mosacing and multi-frequential embedding , 2012, 2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing.
[114] Dan Bogdanov,et al. High-performance secure multi-party computation for data mining applications , 2012, International Journal of Information Security.
[115] Michael Bächle,et al. Einführung in die Wirtschaftsinformatik , 2012 .
[116] Gerhard Thonhauser,et al. Improving time series classification using Hidden Markov Models , 2012, 2012 12th International Conference on Hybrid Intelligent Systems (HIS).
[117] Mads Dam,et al. TreeDroid: a tree automaton based approach to enforcing data processing policies , 2012, CCS '12.
[118] Sheng-Fu Liang,et al. Automatic Stage Scoring of Single-Channel Sleep EEG by Using Multiscale Entropy and Autoregressive Models , 2012, IEEE Transactions on Instrumentation and Measurement.
[119] Travis Mayberry,et al. PIRMAP: Efficient Private Information Retrieval for MapReduce , 2013, Financial Cryptography.
[120] Roksana Boreli,et al. On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[121] William Enck,et al. AppsPlayground: automatic security analysis of smartphone applications , 2013, CODASPY.
[122] Shengping Zhang,et al. Dynamic image mosaic via SIFT and dynamic programming , 2013, Machine Vision and Applications.
[123] Matthias Boehm,et al. Looking beyond the rim of one's teacup: a multidisciplinary literature review of Product-Service Systems in Information Systems, Business Management, and Engineering & Design , 2013 .
[124] Lajos Hanzo,et al. Irregular Convolution and Unity-Rate Coded Network-Coding for Cooperative Multi-User Communications , 2013, IEEE Transactions on Wireless Communications.
[125] Gautham J. Mysore,et al. Interactive refinement of supervised and semi-supervised sound source separation estimates , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[126] Liliane Pintelon,et al. A refined typology of Product-Service Systems based on Functional Hierarchy Modeling , 2013 .
[127] Urbano Nunes,et al. Automatic sleep staging: A computer assisted approach for optimal combination of features and polysomnographic channels , 2013, Expert Syst. Appl..
[128] Sanjay R. Zadokar,et al. A digital watermarking for anaglyph 3D images , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[129] Paulo Augusto Cauchick Miguel,et al. Product-service systems: a literature review on integrated products and services , 2013 .
[130] Thomas Roche,et al. A decision methodology to support servitisation of manufacturing , 2013 .
[131] Oliver Gassmann,et al. Geschäftsmodelle entwickeln : 55 innovative Konzepte mit dem St. Galler Business Model Navigator , 2013 .
[132] Elena Hernández-Pereira,et al. A method for the automatic analysis of the sleep macrostructure in continuum , 2013, Expert Syst. Appl..
[133] Antoine Liutkus,et al. An overview of informed audio source separation , 2013, 2013 14th International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS).
[134] Ezzeddine Zagrouba,et al. An online approach for multi-sprite generation based on camera parameters estimation , 2013, Signal Image Video Process..
[135] Yihua Zhang,et al. Secure Computation on Floating Point Numbers , 2013, NDSS.
[136] Yuan Zhang,et al. Vetting undesirable behaviors in android apps with permission use analysis , 2013, CCS.
[137] Thomas Schreck,et al. Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques , 2015, International Journal of Information Security.
[138] Dirk Westhoff,et al. Curtailing privilege escalation attacks over asynchronous channels on Android , 2014, 2014 14th International Conference on Innovations for Community Services (I4CS).
[139] John C. S. Lui,et al. DroidTrace: A ptrace based Android dynamic analysis system with forward execution capability , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).
[140] François Le Gall,et al. Powers of tensors and fast matrix multiplication , 2014, ISSAC.
[141] T Penzel,et al. A review of signals used in sleep analysis , 2014, Physiological measurement.
[142] Louis Chevallier,et al. An interactive audio source separation framework based on non-negative matrix factorization , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[143] Yanick Fratantonio,et al. Andrubis: Android Malware Under the Magnifying Glass , 2014 .
[144] Sankardas Roy,et al. Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps , 2014, CCS.
[145] R. Anitha,et al. Robust and blind watermarking scheme for three dimensional anaglyph images , 2014, Comput. Electr. Eng..
[146] Hakan Erdogan,et al. Deep neural networks for single channel source separation , 2013, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[147] Mauro Conti,et al. MOSES: Supporting and Enforcing Security Profiles on Smartphones , 2014, IEEE Transactions on Dependable and Secure Computing.
[148] Xiapu Luo,et al. On Tracking Information Flows through JNI in Android Applications , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[149] Chang-qing Zhu,et al. Selective authentication algorithm based on semi-fragile watermarking for vector geographical data , 2014, 2014 22nd International Conference on Geoinformatics.
[150] Ana R. Cavalli,et al. Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps , 2014, FPS.
[151] Din J. Wasem,et al. Mining of Massive Datasets , 2014 .
[152] John Bosco Balaguru Rayappan,et al. Dual Cellular Automata on FPGA: An Image Encryptors Chip , 2014 .
[153] Jure Leskovec,et al. Mining of Massive Datasets, 2nd Ed , 2014 .
[154] Jan Willemson,et al. Secure floating point arithmetic and private satellite collision analysis , 2015, International Journal of Information Security.
[155] Musa Peker,et al. A Comparative Study on Classification of Sleep Stage Based on EEG Signals Using Feature Selection and Classification Algorithms , 2014, Journal of Medical Systems.
[156] Alessandro Armando,et al. Securing the "Bring Your Own Device" Paradigm , 2014, Computer.
[157] Birgit Vogel-Heuser,et al. Innovationsprozesse zyklenorientiert managen , 2014 .
[158] Joris Van Ostaeyen. Analysis of the Business Potential of Product-Service Systems for Investment Goods (Analyse van het zakelijk potentieel van product-dienstsystemen voor investeringsgoederen) , 2014 .
[159] Zhiyong Peng,et al. Blind watermarking scheme for polylines in vector geo-spatial data , 2014, Multimedia Tools and Applications.
[160] Yuwei Peng,et al. A Zero-Watermarking Scheme for Vector Map Based on Feature Vertex Distance Ratio , 2015, J. Electr. Comput. Eng..
[161] Miroslav Zivanovic,et al. Harmonic Bandwidth Companding for Separation of Overlapping Harmonics in Pitched Signals , 2015, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[162] Franck Giron,et al. Deep neural network based instrument extraction from music , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[163] Homer Nazeran,et al. Automatic sleep staging by simultaneous analysis of ECG and respiratory signals in long epochs , 2015, Biomed. Signal Process. Control..
[164] Xue Liu,et al. Effective Real-Time Android Application Auditing , 2015, 2015 IEEE Symposium on Security and Privacy.
[165] Loganathan Agilandeeswari,et al. A robust color video watermarking scheme based on hybrid embedding techniques , 2015, Multimedia Tools and Applications.
[166] Sanjay R. Zadokar,et al. A Robust DWT Watermarking for 3D Images , 2015 .
[167] Ivan Damgård,et al. Secure Multiparty Computation and Secret Sharing , 2015 .
[168] Richard Heusdens,et al. Sleep apnea detection using time-delayed heart rate variability , 2015, 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).
[169] Vrizlynn L. L. Thing,et al. Securing Android , 2015, ACM Comput. Surv..
[170] Chunxing Wang. Robust Digital Watermarking Scheme of Anaglyphic 3 D for RGB Color Images , 2015 .
[171] Taha Mohammed Hasan,et al. Imperceptible 3D Video Watermarking Technique Based on Scene Change Detection , 2015 .
[172] Masaaki Ikehara,et al. Vocal separation by constrained non-negative matrix factorization , 2015, 2015 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA).
[173] N. Wang,et al. RST Invariant Fragile Watermarking for 2D Vector Map Authentication , 2015, MUE 2015.
[174] Volodymyr I. Ponomaryov,et al. Invisible digital color watermarking technique in anaglyph 3D images , 2015, 2015 12th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE).
[175] Ezzeddine Zagrouba,et al. On Line Video Watermarking - A New Robust Approach of Video Watermarking based on Dynamic Multi-sprites Generation , 2015, VISAPP.
[176] Y. Rakesh,et al. Digital Watermarked Anaglyph 3D Images Using FrFT , 2016 .
[177] A. Hassan,et al. A decision support system for automatic sleep staging from EEG signals using tunable Q-factor wavelet transform and spectral features , 2016, Journal of Neuroscience Methods.
[178] John C. S. Lui,et al. TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime , 2016, CCS.
[179] Christian Kowalkowski,et al. Servitization and Deservitization: Overview, Concepts, and Definitions , 2016 .
[180] Chenxiong Qian,et al. Toward Engineering a Secure Android Ecosystem , 2016, ACM Comput. Surv..
[181] Azizah Abdul Manaf,et al. Collusion-Resistant digital video watermarking for copyright protection application , 2016 .
[182] Nana Wang,et al. RST Invariant Reversible Watermarking for 2D Vector Map , 2016, MUE 2016.
[183] Khumanthem Manglem Singh,et al. A robust and optimized 3D red-cyan anaglyph blind image watermarking in the DWT domain , 2016 .
[184] Mihaela Cocea,et al. Advancements in GIS map copyright protection schemes - a critical review , 2017, Multimedia Tools and Applications.
[185] Ehud Gudes,et al. Security and privacy aspects in MapReduce on clouds: A survey , 2016, Comput. Sci. Rev..
[186] Jan Willemson,et al. Alternative Implementations of Secure Real Numbers , 2016, IACR Cryptol. ePrint Arch..
[187] Shlomi Dolev,et al. Private and Secure Secret Shared MapReduce (Extended Abstract) - (Extended Abstract) , 2016, DBSec.
[188] Amit Phadikar,et al. A blind video watermarking scheme resistant to rotation and collusion attacks , 2016, J. King Saud Univ. Comput. Inf. Sci..
[189] Eric Bodden,et al. Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques , 2016, NDSS.
[190] Yehuda Lindell,et al. How To Simulate It - A Tutorial on the Simulation Proof Technique , 2016, IACR Cryptol. ePrint Arch..
[191] Marina Blanton,et al. Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model , 2016, International Journal of Information Security.
[192] Mohammed Imamul Hassan Bhuiyan,et al. Automatic sleep scoring using statistical features in the EMD domain and ensemble methods , 2016 .
[193] Mohammed Imamul Hassan Bhuiyan,et al. Computer-aided sleep staging using Complete Ensemble Empirical Mode Decomposition with Adaptive Noise and bootstrap aggregating , 2016, Biomed. Signal Process. Control..
[194] Tobias Bachmeier,et al. Business Model Generation A Handbook For Visionaries Game Changers And Challengers , 2016 .
[195] Urbano Nunes,et al. ISRUC-Sleep: A comprehensive public dataset for sleep researchers , 2016, Comput. Methods Programs Biomed..
[196] Jyh-Shing Roger Jang,et al. Singing Voice Separation and Pitch Extraction from Monaural Polyphonic Audio Music via DNN and Adaptive Pitch Tracking , 2016, 2016 IEEE Second International Conference on Multimedia Big Data (BigMM).
[197] Emilia Gómez,et al. Monaural Score-Informed Source Separation for Classical Music Using Convolutional Neural Networks , 2017, ISMIR.
[198] Tim C. McAloone,et al. Product/Service-System Origins and Trajectories: A Systematic Literature Review of PSS Definitions and their Characteristics , 2017 .
[199] Ezzeddine Zagrouba,et al. Online multi-sprites based video watermarking robust to collusion and transcoding attacks for emerging applications , 2017, Multimedia Tools and Applications.
[200] Mark D. Plumbley,et al. Two-Stage Single-Channel Audio Source Separation Using Deep Neural Networks , 2017, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[201] Reza Boostani,et al. A comparative review on sleep stage classification methods in patients and healthy individuals , 2017, Comput. Methods Programs Biomed..
[202] Ali Feizollah,et al. The Evolution of Android Malware and Android Analysis Techniques , 2017, ACM Comput. Surv..
[203] Yingying Wang,et al. A multiple watermarking algorithm for vector geographic data based on coordinate mapping and domain subdivision , 2017, Multimedia Tools and Applications.
[204] B. Kölmel,et al. Customer Centricity von digitalen Produkt-Service-Systemen , 2017 .
[205] Jimeng Sun,et al. SLEEPNET: Automated Sleep Staging System via Deep Learning , 2017, ArXiv.
[206] Heikki Huttunen,et al. Convolutional Recurrent Neural Networks for Polyphonic Sound Event Detection , 2017, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[207] Y. D. Vybornova. Password-based key derivation function as one of Blum-Blum-Shub pseudo-random generator applications , 2017 .
[208] Ezzeddine Zagrouba,et al. A Robust Video Watermarking for Real-Time Application , 2017, ACIVS.
[209] Pascal Lafourcade,et al. Secure Matrix Multiplication with MapReduce , 2017, ARES.
[210] Fei Peng,et al. A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping , 2017, SpaCCS Workshops.
[211] Jean-Guillaume Dumas,et al. Dual protocols for private multi-party matrix multiplication and trust computations , 2017, Comput. Secur..
[212] A. Tukker,et al. New Business for Old Europe : Product-Service Development, Competitiveness and Sustainability , 2017 .
[213] Zhu Han,et al. Machine Learning Paradigms for Next-Generation Wireless Networks , 2017, IEEE Wireless Communications.
[214] Yu Xue,et al. Multipurpose watermarking for vector map protection and authentication , 2018, Multimedia Tools and Applications.
[215] Vincent Charvillat,et al. Robust Video Watermarking Approach Based on Crowdsourcing and Hybrid Insertion , 2017, 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA).
[216] Emilia Gómez,et al. Monoaural Audio Source Separation Using Deep Convolutional Neural Networks , 2017, LVA/ICA.
[217] Hidangmayum Saxena Devi,et al. A Novel, Efficient, Robust, and Blind Imperceptible 3D Anaglyph Image Watermarking , 2017 .
[218] Jong-Uk Hou,et al. Collusion Attack Resilient 3D Mesh Watermarking Based on Anti-Collusion Fingerprint Code , 2018, Applied Sciences.
[219] Wenshan Wang,et al. A Novel Hybrid Information Security Scheme for 2D Vector Map , 2018, Mob. Networks Appl..
[220] Y D Vybornova. Application of spatial interpolation methods for restoration of partially defined images , 2018 .
[221] Octavian Catrina,et al. Round-Efficient Protocols for Secure Multiparty Fixed-Point Arithmetic , 2018, 2018 International Conference on Communications (COMM).
[222] Mahesh Chandra,et al. An efficient video watermarking based security model , 2018 .
[223] Maarten De Vos,et al. Automating the Detection of REM Sleep Behaviour Disorder , 2018, 2018 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).
[224] Arijit Sur,et al. View invariant DIBR-3D image watermarking using DT-CWT , 2018, Multimedia Tools and Applications.
[225] Ezzeddine Zagrouba,et al. An Efficient Group of Pictures Decomposition based Watermarking for Anaglyph 3D Video , 2018, VISIGRAPP.
[226] A. Richter,et al. A review of influential factors for Product Service System application [Un bilan des facteurs déterminants de la mise en œuvre de systèmes produits-services] , 2018 .
[227] Dan Bogdanov,et al. Rmind: A Tool for Cryptographically Secure Statistical Analysis , 2016, IEEE Transactions on Dependable and Secure Computing.
[228] Vincent Charvillat,et al. A robust video watermarking based on feature regions and crowdsourcing , 2018, Multimedia Tools and Applications.
[229] Antoine Liutkus,et al. An Overview of Lead and Accompaniment Separation in Music , 2018, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[230] Pascal Lafourcade,et al. Secure Grouping and Aggregation with MapReduce , 2018, IACR Cryptol. ePrint Arch..
[231] José Manuel Fonseca,et al. Investigating the contribution of distance-based features to automatic sleep stage classification , 2018, Comput. Biol. Medicine.
[232] J. Buhmann,et al. Automatic Human Sleep Stage Scoring Using Deep Neural Networks , 2018, Front. Neurosci..
[233] Mukesh Dalal,et al. A robust and imperceptible steganography technique for SD and HD videos , 2019, Multimedia Tools and Applications.
[234] Pascal Lafourcade,et al. Secure Joins with MapReduce , 2018, FPS.
[235] Christos Salis,et al. A novel, fast and efficient single-sensor automatic sleep-stage classification based on complementary cross-frequency coupling estimates , 2017, Clinical Neurophysiology.
[236] Ali Motie Nasrabadi,et al. A new automatic sleep staging system based on statistical behavior of local extrema using single channel EEG signal , 2018, Expert Syst. Appl..
[237] Ezzeddine Zagrouba,et al. A Robust Anaglyph 3D Video Watermarking based on Multi-sprite Generation , 2019, ICETE.
[238] Silvio Micali,et al. A Completeness Theorem for Protocols with Honest Majority , 1987, STOC 1987.
[239] Tapani Ristaniemi,et al. An Automatic Sleep Scoring Toolbox: Multi-modality of Polysomnography Signals' Processing , 2019, ICETE.
[240] Alejandro Delgado Castro,et al. Semi-supervised Audio Source Separation based on the Iterative Estimation and Extraction of Note Events , 2019, ICETE.
[241] Pascal Lafourcade,et al. Secure Intersection with MapReduce , 2019, ICETE.
[242] Johannes Sametinger,et al. Dynamic Taint-tracking: Directions for Future Research , 2019, ICETE.
[243] Tom Dhaene,et al. Automated Sleep Apnea Detection in Raw Respiratory Signals Using Long Short-Term Memory Neural Networks , 2019, IEEE Journal of Biomedical and Health Informatics.
[244] Pascal Lafourcade,et al. Secure and Efficient Matrix Multiplication with MapReduce , 2019, ICETE.
[245] Pascal Lafourcade,et al. Secure Strassen-Winograd Matrix Multiplication with MapReduce , 2019, ICETE.
[246] Yuliya Vybornova,et al. Method for Vector Map Protection based on using of a Watermark Image as a Secondary Carrier , 2019, ICETE.
[247] Oliver Y. Chén,et al. SeqSleepNet: End-to-End Hierarchical Recurrent Neural Network for Sequence-to-Sequence Automatic Sleep Staging , 2018, IEEE Transactions on Neural Systems and Rehabilitation Engineering.
[248] Yuliya Vybornova,et al. A new watermarking method for vector map data: a study on information capacity of the carrier image , 2019, International Conference on Machine Vision.
[249] U. Rajendra Acharya,et al. A review of automated sleep stage scoring based on physiological signals for the new millennia , 2019, Comput. Methods Programs Biomed..
[250] Ezzeddine Zagrouba,et al. A Review on Anaglyph 3D Image and Video Watermarking , 2019 .
[251] Ezzeddine Zagrouba,et al. A Multi-sprite Based Anaglyph 3D Video Watermarking Approach Robust Against Collusion , 2019 .
[252] Bashir I. Morshed,et al. Exacerbation in Obstructive Sleep Apnea: Early Detection and Monitoring Using a Single Channel EEG with Quadratic Discriminant Analysis * , 2019, 2019 9th International IEEE/EMBS Conference on Neural Engineering (NER).
[253] Stanislas Chambon,et al. DOSED: A deep learning approach to detect multiple sleep micro-events in EEG signal , 2018, Journal of Neuroscience Methods.
[254] David Kent,et al. Automated Sleep Stage Scoring of the Sleep Heart Health Study Using Deep Neural Networks. , 2019, Sleep.
[255] Nigel P. Smart,et al. Benchmarking Privacy Preserving Scientific Operations , 2019, IACR Cryptol. ePrint Arch..
[256] Johannes Sametinger,et al. Information Disclosure Detection in Cyber-Physical Systems , 2019, DEXA Workshops.
[257] Octavian Catrina. Efficient Secure Floating-point Arithmetic using Shamir Secret Sharing , 2019, ICETE.
[258] Tapani Ristaniemi,et al. Multi-modality of polysomnography signals' fusion for automatic sleep scoring , 2019, Biomed. Signal Process. Control..
[259] Ezzeddine Zagrouba,et al. An Efficient Anaglyph 3D Video Watermarking Approach Based on Hybrid Insertion , 2019, CAIP.
[260] Alexander Richter,et al. A Systematic Literature Review on Product-Service Systems Classifications and Types , 2019, ICETE.
[261] Xiangyu Zhang,et al. TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices , 2017, IEEE Transactions on Dependable and Secure Computing.