We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. A survey on design and application of open-channel solid-state drives

    Compared with traditional solid-state drives (SSDs), open-channel SSDs (OCSSDs) expose their internal physical layout and provide a host-based flash...

    Junchao Chen, Guangyan Zhang, Junyu Wei in Frontiers of Information Technology & Electronic Engineering
    Article 01 May 2023
  2. SRISC: Open Source Soft Processor Side Channel Analysis Attack Framework Using RISC-V

    Side channel analysis (SCA) attacks on soft processor systems (such as RISC-V and LEON3) are typically performed on FPGA prototy** boards. For the...
    Darshana Jayasinghe, Sri Parameswaran in Asia Pacific Advanced Network
    Conference paper 2024
  3. FlexiPCN: Flexible Payment Channel Network

    Payment Channel Network (PCN) is a widely recognized and effective off-chain solution used to reduce on-chain operational costs. PCN is designed to...
    Conference paper 2024
  4. Side-Channel Analysis for the Re-Keying Protocol of Bluetooth Low Energy

    In the era of the Internet of Things, Bluetooth low energy (BLE/BTLE) plays an important role as a well-known wireless communication technology....

    Pei Cao, Chi Zhang, ... Da-Wu Gu in Journal of Computer Science and Technology
    Article 30 September 2023
  5. Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version

    Masking is a promising countermeasure against side-channel attacks, and share slicing is a masking technique that stores all shares in a single...

    Tamon Asano, Takeshi Sugawara in Journal of Cryptographic Engineering
    Article 20 June 2023
  6. Multi-channel quantum parameter estimation

    The aim of quantum metrology is to exploit quantum effects to improve the precision of parameter estimation beyond its classical limit. In this...

    Liying Bao, Bo Qi, ... Rebing Wu in Science China Information Sciences
    Article 16 June 2022
  7. Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC

    Secure channel establishment protocols such as Transport Layer Security (TLS) are some of the most important cryptographic protocols, enabling the...

    Shan Chen, Samuel Jero, ... Cristina Nita-Rotaru in Journal of Cryptology
    Article Open access 24 May 2021
  8. Open Community Communication Channels

    In this chapter, I will introduce the topic of Open Community Communication Channels in the context of engineering documentation. Open community...
    Alejandra Quetzalli in Docs-as-Ecosystem
    Chapter 2023
  9. Quantum key distribution over a mimicked dynamic-scattering channel

    Free-space quantum key distribution (QKD) plays an important role in the global quantum network. However, free space channels suffer from the...

    Qi-Hang Lu, Fang-**ang Wang, ... Zheng-Fu Han in Science China Information Sciences
    Article 27 March 2024
  10. Multi-channel attribute preservation for face de-identification

    The advancement of computer vision and surveillance devices has underscored the significance of safeguarding privacy in facial images and videos,...

    Yiting Cao, Yaofang Zhang, ... Yuchun Fang in Multimedia Tools and Applications
    Article 24 May 2024
  11. Constructive Side-Channel Analysis and Secure Design 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12, 2022, Proceedings

    This book constitutes revised selected papers from the 13th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE...
    Josep Balasch, Colin O’Flynn in Lecture Notes in Computer Science
    Conference proceedings 2022
  12. Adaptive Channel Transformation-Based Detector for Adversarial Attacks

    As deep neural networks (DNNs) are extensively used in computer vision tasks, the vulnerability of such systems to well-designed adversarial examples...
    **yin Chen, **min Zhang, Haibin Zheng in Attacks, Defenses and Testing for Deep Learning
    Chapter 2024
  13. Kernel ridge regression model for sediment transport in open channel flow

    Sediment transport modeling is of primary importance for the determination of channel design velocity in lined channels. This study proposes to model...

    Mir Jafar Sadegh Safari, Shervin Rahimzadeh Arashloo in Neural Computing and Applications
    Article 11 January 2021
  14. Improving Performance of Virtual Machine Covert Timing Channel Through Optimized Run-Length Encoding

    With its wider acceptability, cloud can host a diverse set of data and applications ranging from entertainment to personal to industry. The...

    Chong Wang, Rong-Liang Chen, Liang Gu in Journal of Computer Science and Technology
    Article 31 July 2023
  15. Enhancing Multi-agent Coordination via Dual-channel Consensus

    Successful coordination in multi-agent systems requires agents to achieve consensus. Previous works propose methods through information sharing, such...

    Qingyang Zhang, Kaishen Wang, ... Bo Xu in Machine Intelligence Research
    Article 16 March 2024
  16. A comprehensive survey 5G wireless communication systems: open issues, research challenges, channel estimation, multi carrier modulation and 5G applications

    The fifth generation (5G) organize is required to help essentially enormous measure of versatile information traffic and immense number of remote...

    Nilofer Shaik, Praveen Kumar Malik in Multimedia Tools and Applications
    Article 12 June 2021
  17. On Channel Selection for EEG-Based Mental Workload Classification

    Electroencephalogram (EEG) is a non-invasive technology with high temporal resolution, widely used in Brain-Computer Interfaces (BCIs) for mental...
    Kunjira Kingphai, Yashar Moshfeghi in Machine Learning, Optimization, and Data Science
    Conference paper 2024
  18. OpenFE: feature-extended OpenMax for open set facial expression recognition

    Open-set methods are crucial for rejecting unknown facial expressions in real-world scenarios. Traditional open-set methods primarily rely on a...

    Jie Shao, Zicheng Song, ... Wenzhong Shen in Signal, Image and Video Processing
    Article 11 November 2023
  19. HUAWEI AI Open Platform

    This chapter is an introduction to HUAWEI HiAI, an open AI capability platform for smart devices. Firstly, Architecture of HUAWEI HiAI Platform, a...
    Chapter Open access 2023
  20. Improved gradient boosting hybrid spectrum sharing and actor critic channel allocation in 6G CR-IOT

    The fast advancement of wireless communication technology and the growth in the reputation of Internet of Things (IoT) applications have led to the...

    Mayank Kothari, Suresh Kurumbanshi in International Journal of Information Technology
    Article 23 June 2024
Did you find what you were looking for? Share feedback.