Penrose tiling for visual secret sharing View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2020-08-29

AUTHORS

Xuehu Yan, Wei Qi Yan, Lintao Liu, Yuliang Lu

ABSTRACT

Visual secret sharing (VSS) has the advantage that the decryption is based on our human visual system without participation of any computational devices. However, traditional VSS schemes are only for sharing raster images with regard to pixels, which lead to that the secret image will be aliased when enlarged and its pixels are shared in rectangular way only. In this paper, we will introduce a VSS scheme for vectorized images based on Penrose tiling. Penrose tiling is with the merits of vectorization and nonperiodicity. These properties are applied to the proposed scheme so as to share those vectorized images; the basic unit of secret sharing could be any graphical shapes instead of pixels or rectangular regions only in the traditional methods. Our experiments show the effectiveness of the proposed scheme. More... »

PAGES

32693-32710

References to SciGraph publications

  • 2010. A Comprehensive Study of Visual Cryptography in TRANSACTIONS ON DATA HIDING AND MULTIMEDIA SECURITY V
  • 2017-12-15. A new two-level QR code with visual cryptography scheme in MULTIMEDIA TOOLS AND APPLICATIONS
  • 1995. Visual cryptography in ADVANCES IN CRYPTOLOGY — EUROCRYPT'94
  • 2017-03-01. Multi secret sharing with unexpanded meaningful shares in MULTIMEDIA TOOLS AND APPLICATIONS
  • 2017-11-30. Distortion less secret image sharing scheme for Internet of Things system in CLUSTER COMPUTING
  • 2015-10-27. An enhanced threshold visual secret sharing based on random grids in JOURNAL OF REAL-TIME IMAGE PROCESSING
  • 2017-07-26. Temporal Integration Based Visual Cryptography Scheme and Its Application in DIGITAL FORENSICS AND WATERMARKING
  • 2018-03-27. Coverless image steganography using partial-duplicate image retrieval in SOFT COMPUTING
  • 2018-11-26. Hybrid JND model-guided watermarking method for screen content images in MULTIMEDIA TOOLS AND APPLICATIONS
  • 1992-12. An explication of secret sharing schemes in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2008. Multiple Watermarking in Visual Cryptography in DIGITAL WATERMARKING
  • 2017-02-27. A novel multiple-level secret image sharing scheme in MULTIMEDIA TOOLS AND APPLICATIONS
  • 2017-09-21. A novel lossless recovery algorithm for basic matrix-based VSS in MULTIMEDIA TOOLS AND APPLICATIONS
  • 2014-07-09. Visual Cryptography and Random Grids Schemes in DIGITAL-FORENSICS AND WATERMARKING
  • 2016-10-04. Perfect contrast XOR-based visual cryptography schemes via linear algebra in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2016-01-14. Secret-Sharing for NP in JOURNAL OF CRYPTOLOGY
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s11042-020-09568-0

    DOI

    http://dx.doi.org/10.1007/s11042-020-09568-0

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1130447706


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Artificial Intelligence and Image Processing", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, 230037, Hefei, China", 
              "id": "http://www.grid.ac/institutes/None", 
              "name": [
                "National University of Defense Technology, 230037, Hefei, China", 
                "Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, 230037, Hefei, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Yan", 
            "givenName": "Xuehu", 
            "id": "sg:person.010467364517.31", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Auckland University of Technology, 1142, Auckland, New Zealand", 
              "id": "http://www.grid.ac/institutes/grid.252547.3", 
              "name": [
                "Auckland University of Technology, 1142, Auckland, New Zealand"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Yan", 
            "givenName": "Wei Qi", 
            "id": "sg:person.016172257054.22", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016172257054.22"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, 230037, Hefei, China", 
              "id": "http://www.grid.ac/institutes/None", 
              "name": [
                "National University of Defense Technology, 230037, Hefei, China", 
                "Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, 230037, Hefei, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Liu", 
            "givenName": "Lintao", 
            "id": "sg:person.013517427271.32", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013517427271.32"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, 230037, Hefei, China", 
              "id": "http://www.grid.ac/institutes/None", 
              "name": [
                "National University of Defense Technology, 230037, Hefei, China", 
                "Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, 230037, Hefei, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Lu", 
            "givenName": "Yuliang", 
            "id": "sg:person.015112370271.93", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015112370271.93"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/bfb0053419", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008839066", 
              "https://doi.org/10.1007/bfb0053419"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-92238-4_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027072586", 
              "https://doi.org/10.1007/978-3-540-92238-4_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11042-017-4536-x", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1084028952", 
              "https://doi.org/10.1007/s11042-017-4536-x"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11042-017-4512-5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1084028932", 
              "https://doi.org/10.1007/s11042-017-4512-5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-016-0285-5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1030004022", 
              "https://doi.org/10.1007/s10623-016-0285-5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11042-017-5215-7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1091893616", 
              "https://doi.org/10.1007/s11042-017-5215-7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11042-018-6860-1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1110192282", 
              "https://doi.org/10.1007/s11042-018-6860-1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bf00125203", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1019308821", 
              "https://doi.org/10.1007/bf00125203"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-64185-0_30", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1090958909", 
              "https://doi.org/10.1007/978-3-319-64185-0_30"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11042-017-5465-4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1099682813", 
              "https://doi.org/10.1007/s11042-017-5465-4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10586-017-1345-y", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093096612", 
              "https://doi.org/10.1007/s10586-017-1345-y"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11554-015-0540-4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022432477", 
              "https://doi.org/10.1007/s11554-015-0540-4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-14298-7_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050017989", 
              "https://doi.org/10.1007/978-3-642-14298-7_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00145-015-9226-0", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009468991", 
              "https://doi.org/10.1007/s00145-015-9226-0"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-43886-2_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018728677", 
              "https://doi.org/10.1007/978-3-662-43886-2_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00500-018-3151-8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1101794157", 
              "https://doi.org/10.1007/s00500-018-3151-8"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2020-08-29", 
        "datePublishedReg": "2020-08-29", 
        "description": "Visual secret sharing (VSS) has the advantage that the decryption is based on our human visual system without participation of any computational devices. However, traditional VSS schemes are only for sharing raster images with regard to pixels, which lead to that the secret image will be aliased when enlarged and its pixels are shared in rectangular way only. In this paper, we will introduce a VSS scheme for vectorized images based on Penrose tiling. Penrose tiling is with the merits of vectorization and nonperiodicity. These properties are applied to the proposed scheme so as to share those vectorized images; the basic unit of secret sharing could be any graphical shapes instead of pixels or rectangular regions only in the traditional methods. Our experiments show the effectiveness of the proposed scheme.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s11042-020-09568-0", 
        "isAccessibleForFree": false, 
        "isFundedItemOf": [
          {
            "id": "sg:grant.8304044", 
            "type": "MonetaryGrant"
          }
        ], 
        "isPartOf": [
          {
            "id": "sg:journal.1044869", 
            "issn": [
              "1380-7501", 
              "1573-7721"
            ], 
            "name": "Multimedia Tools and Applications", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "43-44", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "79"
          }
        ], 
        "keywords": [
          "visual secret sharing", 
          "secret sharing", 
          "VSS scheme", 
          "vectorized images", 
          "traditional VSS scheme", 
          "human visual system", 
          "secret image", 
          "computational devices", 
          "raster images", 
          "graphical shapes", 
          "sharing", 
          "pixels", 
          "images", 
          "traditional methods", 
          "rectangular region", 
          "scheme", 
          "visual system", 
          "decryption", 
          "basic unit", 
          "vectorization", 
          "tiling", 
          "effectiveness", 
          "devices", 
          "system", 
          "advantages", 
          "way", 
          "nonperiodicity", 
          "experiments", 
          "method", 
          "merits", 
          "units", 
          "shape", 
          "regard", 
          "participation", 
          "Penrose tiling", 
          "properties", 
          "region", 
          "paper"
        ], 
        "name": "Penrose tiling for visual secret sharing", 
        "pagination": "32693-32710", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1130447706"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s11042-020-09568-0"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s11042-020-09568-0", 
          "https://app.dimensions.ai/details/publication/pub.1130447706"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2022-12-01T06:41", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/article/article_849.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s11042-020-09568-0"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11042-020-09568-0'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11042-020-09568-0'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11042-020-09568-0'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11042-020-09568-0'


     

    This table displays all metadata directly associated to this object as RDF triples.

    186 TRIPLES      21 PREDICATES      78 URIs      54 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s11042-020-09568-0 schema:about anzsrc-for:08
    2 anzsrc-for:0801
    3 schema:author Nc0ce3b8faa9045e59e8e444c18c3f7e0
    4 schema:citation sg:pub.10.1007/978-3-319-64185-0_30
    5 sg:pub.10.1007/978-3-540-92238-4_6
    6 sg:pub.10.1007/978-3-642-14298-7_5
    7 sg:pub.10.1007/978-3-662-43886-2_8
    8 sg:pub.10.1007/bf00125203
    9 sg:pub.10.1007/bfb0053419
    10 sg:pub.10.1007/s00145-015-9226-0
    11 sg:pub.10.1007/s00500-018-3151-8
    12 sg:pub.10.1007/s10586-017-1345-y
    13 sg:pub.10.1007/s10623-016-0285-5
    14 sg:pub.10.1007/s11042-017-4512-5
    15 sg:pub.10.1007/s11042-017-4536-x
    16 sg:pub.10.1007/s11042-017-5215-7
    17 sg:pub.10.1007/s11042-017-5465-4
    18 sg:pub.10.1007/s11042-018-6860-1
    19 sg:pub.10.1007/s11554-015-0540-4
    20 schema:datePublished 2020-08-29
    21 schema:datePublishedReg 2020-08-29
    22 schema:description Visual secret sharing (VSS) has the advantage that the decryption is based on our human visual system without participation of any computational devices. However, traditional VSS schemes are only for sharing raster images with regard to pixels, which lead to that the secret image will be aliased when enlarged and its pixels are shared in rectangular way only. In this paper, we will introduce a VSS scheme for vectorized images based on Penrose tiling. Penrose tiling is with the merits of vectorization and nonperiodicity. These properties are applied to the proposed scheme so as to share those vectorized images; the basic unit of secret sharing could be any graphical shapes instead of pixels or rectangular regions only in the traditional methods. Our experiments show the effectiveness of the proposed scheme.
    23 schema:genre article
    24 schema:isAccessibleForFree false
    25 schema:isPartOf N5e82b68ae09040c48ebd28719dc4f2b3
    26 Neda60e8763284430b34bf1cc3dace4f2
    27 sg:journal.1044869
    28 schema:keywords Penrose tiling
    29 VSS scheme
    30 advantages
    31 basic unit
    32 computational devices
    33 decryption
    34 devices
    35 effectiveness
    36 experiments
    37 graphical shapes
    38 human visual system
    39 images
    40 merits
    41 method
    42 nonperiodicity
    43 paper
    44 participation
    45 pixels
    46 properties
    47 raster images
    48 rectangular region
    49 regard
    50 region
    51 scheme
    52 secret image
    53 secret sharing
    54 shape
    55 sharing
    56 system
    57 tiling
    58 traditional VSS scheme
    59 traditional methods
    60 units
    61 vectorization
    62 vectorized images
    63 visual secret sharing
    64 visual system
    65 way
    66 schema:name Penrose tiling for visual secret sharing
    67 schema:pagination 32693-32710
    68 schema:productId N894e0d2668624e11ba241643a089eee8
    69 Ncea66090da07402c8d2d7afdf7e0215c
    70 schema:sameAs https://app.dimensions.ai/details/publication/pub.1130447706
    71 https://doi.org/10.1007/s11042-020-09568-0
    72 schema:sdDatePublished 2022-12-01T06:41
    73 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    74 schema:sdPublisher N60aa282fa2b44849bcfbc81b9a11614f
    75 schema:url https://doi.org/10.1007/s11042-020-09568-0
    76 sgo:license sg:explorer/license/
    77 sgo:sdDataset articles
    78 rdf:type schema:ScholarlyArticle
    79 N2229f8209a4540ac9f15527f8f08a895 rdf:first sg:person.016172257054.22
    80 rdf:rest N8a66ba6bbdc440b49f8988621050b352
    81 N5e82b68ae09040c48ebd28719dc4f2b3 schema:volumeNumber 79
    82 rdf:type schema:PublicationVolume
    83 N60aa282fa2b44849bcfbc81b9a11614f schema:name Springer Nature - SN SciGraph project
    84 rdf:type schema:Organization
    85 N6e61e473f4c74916aca1ae4995cac99f rdf:first sg:person.015112370271.93
    86 rdf:rest rdf:nil
    87 N894e0d2668624e11ba241643a089eee8 schema:name dimensions_id
    88 schema:value pub.1130447706
    89 rdf:type schema:PropertyValue
    90 N8a66ba6bbdc440b49f8988621050b352 rdf:first sg:person.013517427271.32
    91 rdf:rest N6e61e473f4c74916aca1ae4995cac99f
    92 Nc0ce3b8faa9045e59e8e444c18c3f7e0 rdf:first sg:person.010467364517.31
    93 rdf:rest N2229f8209a4540ac9f15527f8f08a895
    94 Ncea66090da07402c8d2d7afdf7e0215c schema:name doi
    95 schema:value 10.1007/s11042-020-09568-0
    96 rdf:type schema:PropertyValue
    97 Neda60e8763284430b34bf1cc3dace4f2 schema:issueNumber 43-44
    98 rdf:type schema:PublicationIssue
    99 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    100 schema:name Information and Computing Sciences
    101 rdf:type schema:DefinedTerm
    102 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
    103 schema:name Artificial Intelligence and Image Processing
    104 rdf:type schema:DefinedTerm
    105 sg:grant.8304044 http://pending.schema.org/fundedItem sg:pub.10.1007/s11042-020-09568-0
    106 rdf:type schema:MonetaryGrant
    107 sg:journal.1044869 schema:issn 1380-7501
    108 1573-7721
    109 schema:name Multimedia Tools and Applications
    110 schema:publisher Springer Nature
    111 rdf:type schema:Periodical
    112 sg:person.010467364517.31 schema:affiliation grid-institutes:None
    113 schema:familyName Yan
    114 schema:givenName Xuehu
    115 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31
    116 rdf:type schema:Person
    117 sg:person.013517427271.32 schema:affiliation grid-institutes:None
    118 schema:familyName Liu
    119 schema:givenName Lintao
    120 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013517427271.32
    121 rdf:type schema:Person
    122 sg:person.015112370271.93 schema:affiliation grid-institutes:None
    123 schema:familyName Lu
    124 schema:givenName Yuliang
    125 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015112370271.93
    126 rdf:type schema:Person
    127 sg:person.016172257054.22 schema:affiliation grid-institutes:grid.252547.3
    128 schema:familyName Yan
    129 schema:givenName Wei Qi
    130 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016172257054.22
    131 rdf:type schema:Person
    132 sg:pub.10.1007/978-3-319-64185-0_30 schema:sameAs https://app.dimensions.ai/details/publication/pub.1090958909
    133 https://doi.org/10.1007/978-3-319-64185-0_30
    134 rdf:type schema:CreativeWork
    135 sg:pub.10.1007/978-3-540-92238-4_6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027072586
    136 https://doi.org/10.1007/978-3-540-92238-4_6
    137 rdf:type schema:CreativeWork
    138 sg:pub.10.1007/978-3-642-14298-7_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050017989
    139 https://doi.org/10.1007/978-3-642-14298-7_5
    140 rdf:type schema:CreativeWork
    141 sg:pub.10.1007/978-3-662-43886-2_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018728677
    142 https://doi.org/10.1007/978-3-662-43886-2_8
    143 rdf:type schema:CreativeWork
    144 sg:pub.10.1007/bf00125203 schema:sameAs https://app.dimensions.ai/details/publication/pub.1019308821
    145 https://doi.org/10.1007/bf00125203
    146 rdf:type schema:CreativeWork
    147 sg:pub.10.1007/bfb0053419 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008839066
    148 https://doi.org/10.1007/bfb0053419
    149 rdf:type schema:CreativeWork
    150 sg:pub.10.1007/s00145-015-9226-0 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009468991
    151 https://doi.org/10.1007/s00145-015-9226-0
    152 rdf:type schema:CreativeWork
    153 sg:pub.10.1007/s00500-018-3151-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1101794157
    154 https://doi.org/10.1007/s00500-018-3151-8
    155 rdf:type schema:CreativeWork
    156 sg:pub.10.1007/s10586-017-1345-y schema:sameAs https://app.dimensions.ai/details/publication/pub.1093096612
    157 https://doi.org/10.1007/s10586-017-1345-y
    158 rdf:type schema:CreativeWork
    159 sg:pub.10.1007/s10623-016-0285-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030004022
    160 https://doi.org/10.1007/s10623-016-0285-5
    161 rdf:type schema:CreativeWork
    162 sg:pub.10.1007/s11042-017-4512-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1084028932
    163 https://doi.org/10.1007/s11042-017-4512-5
    164 rdf:type schema:CreativeWork
    165 sg:pub.10.1007/s11042-017-4536-x schema:sameAs https://app.dimensions.ai/details/publication/pub.1084028952
    166 https://doi.org/10.1007/s11042-017-4536-x
    167 rdf:type schema:CreativeWork
    168 sg:pub.10.1007/s11042-017-5215-7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1091893616
    169 https://doi.org/10.1007/s11042-017-5215-7
    170 rdf:type schema:CreativeWork
    171 sg:pub.10.1007/s11042-017-5465-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1099682813
    172 https://doi.org/10.1007/s11042-017-5465-4
    173 rdf:type schema:CreativeWork
    174 sg:pub.10.1007/s11042-018-6860-1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1110192282
    175 https://doi.org/10.1007/s11042-018-6860-1
    176 rdf:type schema:CreativeWork
    177 sg:pub.10.1007/s11554-015-0540-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022432477
    178 https://doi.org/10.1007/s11554-015-0540-4
    179 rdf:type schema:CreativeWork
    180 grid-institutes:None schema:alternateName Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, 230037, Hefei, China
    181 schema:name Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, 230037, Hefei, China
    182 National University of Defense Technology, 230037, Hefei, China
    183 rdf:type schema:Organization
    184 grid-institutes:grid.252547.3 schema:alternateName Auckland University of Technology, 1142, Auckland, New Zealand
    185 schema:name Auckland University of Technology, 1142, Auckland, New Zealand
    186 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...