supported by the National Natural Science Foundation of China(No.61902027).
End-to-end text spotting is a vital computer vision task that aims to integrate scene text detection and recognition into a unified framework.Typical methods heavily rely on region-of-interest(Rol)operations to extrac...
partially supported by NSFC under Grant Nos.61832001 and 62272008;ZTE Industry-University-Institute Fund Project。
The query processing in distributed database management systems(DBMS)faces more challenges,such as more operators,and more factors in cost models and meta-data,than that in a single-node DMBS,in which query optimizati...
With its untameable and traceable properties,blockchain technology has been widely used in the field of data sharing.How to preserve individual privacy while enabling efficient data queries is one of the primary issue...
This research was supported in part by the Nature Science Foundation of China(Nos.62262033,61962029,61762055,62062045 and 62362042);the Jiangxi Provincial Natural Science Foundation of China(Nos.20224BAB202012,20202ACBL202005 and 20202BAB212006);the Science and Technology Research Project of Jiangxi Education Department(Nos.GJJ211815,GJJ2201914 and GJJ201832);the Hubei Natural Science Foundation Innovation and Development Joint Fund Project(No.2022CFD101);Xiangyang High-Tech Key Science and Technology Plan Project(No.2022ABH006848);Hubei Superior and Distinctive Discipline Group of“New Energy Vehicle and Smart Transportation”,the Project of Zhejiang Institute of Mechanical&Electrical Engineering,and the Jiangxi Provincial Social Science Foundation of China(No.23GL52D).
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so on.Data owners and users can save costs and improve efficiency by storing large amounts of graph data on...
supported in part by NSFC No.62202275,Shandong-SF No.ZR2022QF012 projects.
Recently,studies show that deep learning-based automatic speech recognition(ASR)systems are vulnerable to adversarial examples(AEs),which add a small amount of noise to the original audio examples.These AE attacks pos...
This work was supported in part by the National Key R&D Program of China(No.2021ZD0110303).
While China has become the largest online market in the world with approximately 1 billion internet users,Baidu runs the world's largest Chinese search engine serving more than hundreds of millions of daily active use...
support by the National Key R&D Program of China(No.2020YFB1005900);the National Natural Science Foundation of China(Grant Nos.62172216,62032025,62071222,U20A201092);the Key R&D Program of Guangdong Province(No.2020B0101090002);the Natural Science Foundation of Jiangsu Province(No.BK20211180,BK20200418);the Research Fund of Guangxi Key Laboratory of Trusted Software(No.KX202034);JSPS Postdoctoral Fellowships for Research in Japan(No.P21073).
Secure k-Nearest Neighbor(k-NN)query aims to find k nearest data of a given query from an encrypted database in a cloud server without revealing privacy to the untrusted cloud and has wide applications in many areas,s...
supported by the National Natural Science Foundation of China under Grant Nos.61772565 and 62272492;the Guangdong Basic and Applied Basic Research Foundation under Grant No.2020B1515020050;the Key Research and Development Program of Guangdong Province of China under Grant No.2018B030325001.
The query model(or black-box model)has attracted much attention from the communities of both classical and quantum computing.Usually,quantum advantages are revealed by presenting a quantum algorithm that has a better ...