Search
Search Results
-
Surrogate Constraints for Synchronized Energy Production/Consumption
We deal here with job scheduling under encapsulated renewable and non-renewable resource constraints, while relying on a case study related to energy... -
Neuron Pairs in Binarized Neural Networks Robustness Verification via Integer Linear Programming
In the context of classification, robustness verification of a neural network is the problem which consists in determining if small changes of inputs... -
Optimal Charging Station Location in a Linear Cycle Path with Deviations
Bicycle tourism is on the rise thanks to assisted-pedaling bikes, also known as e-bikes. While pedalling is still required on these bikes, they allow... -
On a Geometric Graph-Covering Problem Related to Optimal Safety-Landing-Site Location
We develop a set-cover based integer-programming approach to an optimal safety-landing-site location arising in the design of urban... -
Smart Appliance Abnormal Electrical Power Consumption Detection
Potential cyber threats now have an immensely larger attack surface due to the widespread use of smart devices and smart environments. Smart home... -
Projective Space Stern Decoding and Application to SDitH
We show that here standard decoding algorithms for generic linear codes over a finite field can speeded up by a factor which is essentially the size... -
Evaluation of Lightweight Machine Learning-Based NIDS Techniques for Industrial IoT
Internet of Things (IoT) devices have revolutionized communication, transportation, healthcare, and many other fields. In particular, the adoption of... -
Device Fingerprinting in a Smart Grid CPS
Data integrity attacks on the various meter readings found in smart grid systems can be executed to be undetectable by current detection algorithms... -
Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries
The improvement of quantum computing poses a significant threat to cryptographic security. It enables the potential utilization of quantum algorithms... -
Game Theoretic Modeling of Insider Threats in an Organization
Insider threats have emerged as serious threats to organizations due to the rapid advancement and incorporation of communication technologies.... -
One Time Chat – A Toy End-to-End Encrypted Web Messaging Service
In the digital age, instant messaging (IM) is a cornerstone of communication, necessitating secure and efficient platforms. The One Time Chat web... -
Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework
Deep learning is becoming an increasingly proficient tool for side-channel analysis. While deep learning has been evolving around the tasks of image... -
Physically Unclonable Fingerprints for Authentication
We have developed an innovative fingerprinting method using the melt-electrospinning printing process for product authentication. This method... -
Cross-Correlation Based Trace Segmentation for Clustering Power Analysis on Public Key Cryptosystems
Simple Power Analysis (SPA) is a technique that directly analyzes the power consumption information collected during the execution of cryptographic... -
Privacy-Preserving Sentiment Analysis Using Homomorphic Encryption and Attention Mechanisms
Homomorphic encryption (HE) is a promising approach to preserving the privacy of data used in machine learning by allowing computations to be... -
Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding
In the race for quantum-safe cryptography, fostered by the ongoing National Institute of Standards and Technology (NIST) post-quantum standardization... -
Diversity Algorithms for Laser Fault Injection
Before third-party evaluation and certification, manufacturers often conduct internal security evaluations on secure hardware devices, including... -
One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection
Automatic Dependent Surveillance-Broadcast (ADS-B) is an integral part of the Next Generation Air Transport System, providing an efficient and safe... -
Power Quality Forecasting of Microgrids Using Adaptive Privacy-Preserving Machine Learning
Microgrids face challenges in monitoring and controlling the power quality (PQ) of integrated electrical systems to make timely decisions.... -
EasyLog: An Efficient Kernel Logging Service for Machine Learning
Recently, logs serves as a crucial tool to monitor system’s real-time state for experiments and generate data for machine learning. However, the...