Search
Search Results
-
Surrogate Constraints for Synchronized Energy Production/Consumption
We deal here with job scheduling under encapsulated renewable and non-renewable resource constraints, while relying on a case study related to energy... -
Neuron Pairs in Binarized Neural Networks Robustness Verification via Integer Linear Programming
In the context of classification, robustness verification of a neural network is the problem which consists in determining if small changes of inputs... -
Optimal Charging Station Location in a Linear Cycle Path with Deviations
Bicycle tourism is on the rise thanks to assisted-pedaling bikes, also known as e-bikes. While pedalling is still required on these bikes, they allow... -
On a Geometric Graph-Covering Problem Related to Optimal Safety-Landing-Site Location
We develop a set-cover based integer-programming approach to an optimal safety-landing-site location arising in the design of urban... -
Multi-agent Simulation of Intelligent Energy Regulation in Vehicle-to-Grid
The vehicle-to-grid feature of today’s electric vehicles suggests using them as batteries for stabilizing the power grid besides using them to... -
Aspects of Modeling Human Behavior in Agent-Based Social Simulation – What Can We Learn from the COVID-19 Pandemic?
Proper modeling of human behavior is crucial when develo** agent-based models to investigate the effects of policies, such as the potential... -
Combining Constraint-Based and Imperative Programming in MABS for More Reliable Modelling
We argue for a combination of declarative/constraint and imperative programming approaches for MABS: a declarative layer that specified the ontology,... -
Smart Appliance Abnormal Electrical Power Consumption Detection
Potential cyber threats now have an immensely larger attack surface due to the widespread use of smart devices and smart environments. Smart home... -
Enhancing Cognition Through Cooperative Learning and Augmented Mentorship
With increasing cybercrime, educational institutions are working to create increased opportunities for people to enter the cyber workforce. Some... -
Projective Space Stern Decoding and Application to SDitH
We show that here standard decoding algorithms for generic linear codes over a finite field can speeded up by a factor which is essentially the size... -
Assessment of a Novel Virtual Environment for Examining Cognitive-Motor Processes During Execution of Action Sequences in a Human-Robot Teaming Context
With the development of advanced AI and robotic systems, there is a growing interest in examining human-robot teaming. While the vast majority of... -
Evaluation of Lightweight Machine Learning-Based NIDS Techniques for Industrial IoT
Internet of Things (IoT) devices have revolutionized communication, transportation, healthcare, and many other fields. In particular, the adoption of... -
Device Fingerprinting in a Smart Grid CPS
Data integrity attacks on the various meter readings found in smart grid systems can be executed to be undetectable by current detection algorithms... -
Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries
The improvement of quantum computing poses a significant threat to cryptographic security. It enables the potential utilization of quantum algorithms... -
Game Theoretic Modeling of Insider Threats in an Organization
Insider threats have emerged as serious threats to organizations due to the rapid advancement and incorporation of communication technologies.... -
One Time Chat – A Toy End-to-End Encrypted Web Messaging Service
In the digital age, instant messaging (IM) is a cornerstone of communication, necessitating secure and efficient platforms. The One Time Chat web... -
Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework
Deep learning is becoming an increasingly proficient tool for side-channel analysis. While deep learning has been evolving around the tasks of image... -
Physically Unclonable Fingerprints for Authentication
We have developed an innovative fingerprinting method using the melt-electrospinning printing process for product authentication. This method... -
Cross-Correlation Based Trace Segmentation for Clustering Power Analysis on Public Key Cryptosystems
Simple Power Analysis (SPA) is a technique that directly analyzes the power consumption information collected during the execution of cryptographic... -
Privacy-Preserving Sentiment Analysis Using Homomorphic Encryption and Attention Mechanisms
Homomorphic encryption (HE) is a promising approach to preserving the privacy of data used in machine learning by allowing computations to be...