We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Surrogate Constraints for Synchronized Energy Production/Consumption

    We deal here with job scheduling under encapsulated renewable and non-renewable resource constraints, while relying on a case study related to energy...
    Fatiha Bendali, Alejandro Olivas Gonzales, ... Helene Toussaint in Combinatorial Optimization
    Conference paper 2024
  2. Neuron Pairs in Binarized Neural Networks Robustness Verification via Integer Linear Programming

    In the context of classification, robustness verification of a neural network is the problem which consists in determining if small changes of inputs...
    Dymitr Lubczyk, José Neto in Combinatorial Optimization
    Conference paper 2024
  3. Optimal Charging Station Location in a Linear Cycle Path with Deviations

    Bicycle tourism is on the rise thanks to assisted-pedaling bikes, also known as e-bikes. While pedalling is still required on these bikes, they allow...
    Luca Pirolo, Pietro Belotti, ... Paolo Pileri in Combinatorial Optimization
    Conference paper 2024
  4. On a Geometric Graph-Covering Problem Related to Optimal Safety-Landing-Site Location

    We develop a set-cover based integer-programming approach to an optimal safety-landing-site location arising in the design of urban...
    Claudia D’Ambrosio, Marcia Fampa, ... Felipe Sinnecker in Combinatorial Optimization
    Conference paper 2024
  5. Multi-agent Simulation of Intelligent Energy Regulation in Vehicle-to-Grid

    The vehicle-to-grid feature of today’s electric vehicles suggests using them as batteries for stabilizing the power grid besides using them to...
    Aliyu Tanko Ali, Tim Schrills, ... Thomas Franke in Multi-Agent-Based Simulation XXIV
    Conference paper 2024
  6. Aspects of Modeling Human Behavior in Agent-Based Social Simulation – What Can We Learn from the COVID-19 Pandemic?

    Proper modeling of human behavior is crucial when develo** agent-based models to investigate the effects of policies, such as the potential...
    Emil Johansson, Fabian Lorig, Paul Davidsson in Multi-Agent-Based Simulation XXIV
    Conference paper 2024
  7. Combining Constraint-Based and Imperative Programming in MABS for More Reliable Modelling

    We argue for a combination of declarative/constraint and imperative programming approaches for MABS: a declarative layer that specified the ontology,...
    Bruce Edmonds, J. Gareth Polhill in Multi-Agent-Based Simulation XXIV
    Conference paper 2024
  8. Smart Appliance Abnormal Electrical Power Consumption Detection

    Potential cyber threats now have an immensely larger attack surface due to the widespread use of smart devices and smart environments. Smart home...
    Conference paper 2024
  9. Enhancing Cognition Through Cooperative Learning and Augmented Mentorship

    With increasing cybercrime, educational institutions are working to create increased opportunities for people to enter the cyber workforce. Some...
    Michael-Brian Ogawa, Rita M. Vick, ... Martha E. Crosby in Augmented Cognition
    Conference paper 2024
  10. Projective Space Stern Decoding and Application to SDitH

    We show that here standard decoding algorithms for generic linear codes over a finite field can speeded up by a factor which is essentially the size...
    Kevin Carrier, Valerian Hatey, Jean-Pierre Tillich in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  11. Assessment of a Novel Virtual Environment for Examining Cognitive-Motor Processes During Execution of Action Sequences in a Human-Robot Teaming Context

    With the development of advanced AI and robotic systems, there is a growing interest in examining human-robot teaming. While the vast majority of...
    Jayesh Jayashankar, Anna L. Packy, ... Rodolphe J. Gentili in Augmented Cognition
    Conference paper 2024
  12. Evaluation of Lightweight Machine Learning-Based NIDS Techniques for Industrial IoT

    Internet of Things (IoT) devices have revolutionized communication, transportation, healthcare, and many other fields. In particular, the adoption of...
    Alex Baron, Laurens Le Jeune, ... Nele Mentens in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  13. Device Fingerprinting in a Smart Grid CPS

    Data integrity attacks on the various meter readings found in smart grid systems can be executed to be undetectable by current detection algorithms...
    Chuadhry Mujeeb Ahmed, Nandha Kumar Kandasamy, ... Jianying Zhou in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  14. Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries

    The improvement of quantum computing poses a significant threat to cryptographic security. It enables the potential utilization of quantum algorithms...
    **aodong Ye, Teik Guan Tan, Jianying Zhou in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  15. Game Theoretic Modeling of Insider Threats in an Organization

    Insider threats have emerged as serious threats to organizations due to the rapid advancement and incorporation of communication technologies....
    K. C. Lalropuia, Sanjeev Goyal, Borja Garcia de Soto in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  16. One Time Chat – A Toy End-to-End Encrypted Web Messaging Service

    In the digital age, instant messaging (IM) is a cornerstone of communication, necessitating secure and efficient platforms. The One Time Chat web...
    Kamil Kaczyński, Michał Glet in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  17. Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework

    Deep learning is becoming an increasingly proficient tool for side-channel analysis. While deep learning has been evolving around the tasks of image...
    Gabriele Serafini, Léo Weissbart, Lejla Batina in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  18. Physically Unclonable Fingerprints for Authentication

    We have developed an innovative fingerprinting method using the melt-electrospinning printing process for product authentication. This method...
    Navajit S. Baban, Jiarui Zhou, ... Ramesh Karri in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  19. Cross-Correlation Based Trace Segmentation for Clustering Power Analysis on Public Key Cryptosystems

    Simple Power Analysis (SPA) is a technique that directly analyzes the power consumption information collected during the execution of cryptographic...
    Yaoyuan Hu, An Wang, ... Shufan Ma in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  20. Privacy-Preserving Sentiment Analysis Using Homomorphic Encryption and Attention Mechanisms

    Homomorphic encryption (HE) is a promising approach to preserving the privacy of data used in machine learning by allowing computations to be...
    Amirhossein Ebrahimi Moghaddam, Buvana Ganesh, Paolo Palmieri in Applied Cryptography and Network Security Workshops
    Conference paper 2024
Did you find what you were looking for? Share feedback.