We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 10,000 results
  1. Design and analysis of DDoS mitigating network architecture

    Distributed Denial of Service (DDoS) attacks have emerged as the top security threat with the rise of e-commerce in recent years. Volumetric attacks...

    Swati, Sangita Roy, ... Jimson Mathew in International Journal of Information Security
    Article 30 November 2022
  2. Hardware Security Analysis

    Hardware is the backbone of all computing resources, and its security is of great importance. Compared with software vulnerabilities, hardware...
    Elisa Bertino, Sonam Bhardwaj, ... Ashraf Y. Mahgoub in Machine Learning Techniques for Cybersecurity
    Chapter 2023
  3. FPGA-Based Hardware Accelerator for Matrix Inversion

    Matrix inversion is a computationally expensive operation in many scientific applications. Performing matrix inversion of rank deficient large order...

    Venkata Siva Kumar Kokkiligadda, Vijitha Naikoti, ... Rangababu Peesapati in SN Computer Science
    Article 09 January 2023
  4. Hardware-friendly architecture for a pseudo 2D weighted median filter based on sparse-window approach

    Stereo matching, which is conventionally used for three-dimensional (3D) information acquisition through cameras, is the most actively studied...

    Jongkil Hyun, Younghyeon Kim, ... Byungin Moon in Multimedia Tools and Applications
    Article 06 October 2020
  5. NVM Hardware and Software

    This chapter provides the necessary background on NVM hardware, how it fits in modern computer systems and the way software can program it.
    Kaisong Huang, Tianzheng Wang in Indexing on Non-Volatile Memory
    Chapter 2024
  6. Hardware 101

    AIoT hardware includes all the physical components required to build an AIoT product or retrofit solution. For the retrofit solution, this will...
    Dirk Slama in The Digital Playbook
    Chapter Open access 2023
  7. Hardware Architecture for GRAND Markov Order (GRAND-MO)

    This chapter introduces the GRAND Markov Order (GRAND-MO), a hard-input variant of GRAND designed specifically for communication channels with memory...
    Syed Mohsin Abbas, Marwan Jalaleddine, Warren J. Gross in Guessing Random Additive Noise Decoding
    Chapter 2023
  8. VLSI architecture and implementation of HDR camera signal processor

    The camera imaging built with high dynamic range (HDR) techniques can effectively improve the quality of images and so increase the recognition rate...

    Shih-Chang Hsia, Szu-Hong Wang, Ting-Tseng Kuo in Journal of Real-Time Image Processing
    Article 30 January 2023
  9. Differential fault analysis attack-tolerant hardware implementation of AES

    Cryptographic circuits contain various confidential information and are susceptible to fraudulent manipulations, commonly called attacks, performed...

    Anit Kumar Ghosal, Amit Sardar, Dipanwita Roy Chowdhury in The Journal of Supercomputing
    Article 19 September 2023
  10. An efficient hardware accelerator for NTT-based polynomial multiplication using FPGA

    The number theoretic transform (NTT) is used to efficiently execute polynomial multiplication. It has become an important part of lattice-based...

    Raziyeh Salarifard, Hadi Soleimany in Journal of Cryptographic Engineering
    Article 04 June 2024
  11. A multiple-UAV architecture for autonomous media production

    Cinematography with Unmanned Aerial Vehicles (UAVs) is an emerging technology promising to revolutionize media production. On the one hand, manually...

    Ioannis Mademlis, Arturo Torres-González, ... Ioannis Pitas in Multimedia Tools and Applications
    Article 14 June 2022
  12. Int-Monitor: a model triggered hardware trojan in deep learning accelerators

    Deep learning accelerators have domain-specific architectures, this special memory hierarchy and working mode could bring about new crucial security...

    Peng Li, Rui Hou in The Journal of Supercomputing
    Article 29 August 2022
  13. Digital-to-analog converter free architecture for digital reconfigurable intelligent surface

    This research investigates the digital-to-analog converter (DAC) free architecture for the digital reconfigurable intelligent surface (RIS) system,...

    Miaoran Peng, **hao Kan, ... Tao Jiang in Frontiers of Information Technology & Electronic Engineering
    Article 01 December 2023
  14. Software and hardware realizations for different designs of chaos-based secret image sharing systems

    Secret image sharing (SIS) conveys a secret image to mutually suspicious receivers by sending meaningless shares to the participants, and all shares...

    Bishoy K. Sharobim, Muhammad Hosam, ... Ahmed G. Radwan in Journal of Real-Time Image Processing
    Article Open access 06 May 2024
  15. Machine Learning Method with Applications in Hardware Security of Post-Quantum Cryptography

    Machine learning (ML) is the core of Artificial Intelligence (AI), and it is the fundamental way to make computer have intelligence. ML is a...

    Article 20 March 2023
  16. Evolutionary approximation and neural architecture search

    Automated neural architecture search (NAS) methods are now employed to routinely deliver high-quality neural network architectures for various...

    Michal Pinos, Vojtech Mrazek, Lukas Sekanina in Genetic Programming and Evolvable Machines
    Article 11 June 2022
  17. Isadora: automated information-flow property generation for hardware security verification

    Isadora is a specification mining tool for creating information-flow properties for hardware. Isadora combines hardware information-flow tracking and...

    Calvin Deutschbein, Andres Meza, ... Cynthia Sturton in Journal of Cryptographic Engineering
    Article 11 November 2022
  18. A hybrid memory architecture supporting fine-grained data migration

    Hybrid memory systems composed of dynamic random access memory (DRAM) and Non-volatile memory (NVM) often exploit page migration technologies to...

    Ye Chi, Jianhui Yue, ... Hai ** in Frontiers of Computer Science
    Article 22 January 2024
  19. High throughput architecture for multiscale variational optical flow

    Computation of high-quality Optical Flow ( OF ) for fast-moving objects in real time is still an unsolved issue for High Definition (HD) images. The...

    Bibin Johnson, Sachin Thomas, J. Sheeba Rani in Journal of Real-Time Image Processing
    Article 05 April 2022
  20. In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium

    During the standardisation process of post-quantum cryptography, NIST encourages research on side-channel analysis for candidate schemes. As the...

    Huaxin Wang, Yiwen Gao, ... Yongbin Zhou in Cybersecurity
    Article Open access 03 June 2024
Did you find what you were looking for? Share feedback.