Search
Search Results
-
Algebraic Graph Algorithms A Practical Guide Using Python
This textbook discusses the design and implementation of basic algebraic graph algorithms, and algebraic graph algorithms for complex networks,...
-
Minimization of Empirical Risk as a Means of Choosing the Number of Hypotheses in Algebraic Machine Learning
Abstract—The paper examines a new approach to assessing the number of required hypotheses about the causes of a target property. It follows the...
-
A comprehensive tolerant algebraic side-channel attack over modern ciphers using constraint programming
Tolerant algebraic side-channel attack (TASCA) exploits side-channel information with an algebraic formulation of a cipher to exploit its weaknesses...
-
A Modified Convergence DDPG Algorithm for Robotic Manipulation
Today, robotic arms are widely used in industry. Reinforcement learning algorithms are used frequently for controlling robotic arms in complex...
-
Global optimization of optimal Delaunay triangulation with modified whale optimization algorithm
In this paper, we introduce an innovative approach to generate a high-quality mesh with a density function in a given domain. Our method involves...
-
Multiple-image encryption algorithm based on 3D-LWT and dynamic stereo S-box
Digital image is transmitted more and more frequently through the network. To protect the security of batch images in an open network, a...
-
Quantum Annealing and Algebraic Attack on Speck Cipher
Algebraic attacks using quantum annealing are a new idea of cryptanalysis. This paper shows how to obtain a QUBO problem equivalent to the algebraic... -
Application of an extrapolation method in the Hessenberg algorithm for computing PageRank
PageRank can be viewed as a hyperlink-based method for estimating the importance of nodes in a network, and has attracted a lot of attention from...
-
Solving Constrained Horn Clauses over Algebraic Data Types
Safety verification problems are often reduced to solving the satisfiability of Constrained Horn Clauses (CHCs), a set of constraints in first-order... -
An algebraic approach to symmetric linear layers in cryptographic primitives
Subterranean 2.0 is a permutation-based cipher suite which works with a 257 bit-state. It is designed for lightweight cryptography, and it scores...
-
Minimizing CNOT-count in quantum circuit of the extended Shor’s algorithm for ECDLP
The elliptic curve discrete logarithm problem (ECDLP) is a popular choice for cryptosystems due to its high level of security. However, with the...
-
Concrete constructions of weightwise perfectly balanced (2-rotation symmetric) functions with optimal algebraic immunity and high weightwise nonlinearity
Boolean functions satisfying good cryptographic criteria when restricted to the set of vectors with constant Hamming weight play an important role in...
-
NIWI and New Notions of Extraction for Algebraic Languages
We give an efficient construction of a computational non-interactive witness indistinguishable (NIWI) proof in the plain model, and investigate... -
A One Pass Streaming Algorithm for Finding Euler Tours
Given an undirected graph G on n nodes and m edges in the form of a data stream we study the problem of finding an Euler tour in G . Our main result...
-
Using the Grasshopper Optimization Algorithm for Fuzzy Classifier Design
AbstractThe paper describes three stages in the construction of a fuzzy classifier. The first refers to the formation of fuzzy rules, the second...
-
Algebraic Program Analysis
This paper is a tutorial on algebraic program analysis. It explains the foundations of algebraic program analysis, its strengths and limitations, and... -
Coupling algebraic topology theory, formal methods and safety requirements toward a new coverage metric for artificial intelligence models
Safety requirements are among the main barriers to the industrialization of machine learning based on deep learning architectures. In this work, a...
-
New General Framework for Algebraic Degree Evaluation of NFSR-Based Cryptosystems
At CRYPTO 2017, Liu presented a general framework of iterative estimation of algebraic degree for NFSR-based cryptosystems, by exploiting a... -
The Backpropagation Algorithm
This chapter will introduce the backpropagation algorithm, which is the key to learning in multilayer neural networks. In the early years, methods... -
A proximal subgradient algorithm with extrapolation for structured nonconvex nonsmooth problems
In this paper, we consider a class of structured nonconvex nonsmooth optimization problems, in which the objective function is formed by the sum of a...