Search
Search Results
-
Simple electromagnetic analysis attack based on geometric leak on ASIC implementation of ring-oscillator PUF
Physically unclonable functions (PUFs) are assumed to provide high tamper resistance against counterfeiting and hardware attacks since PUFs extract...
-
Multilevel thresholding image segmentation using meta-heuristic optimization algorithms: comparative analysis, open challenges and new trends
This paper studied the multilevel threshold image segmentation-based metaheuristics optimization methods and their applications. Image segmentation...
-
TFAugment: A Key Frequency-Driven Data Augmentation Method for Human Activity Recognition
Data augmentation enhances Human Activity Recognition (HAR) models by diversifying training data through transformations, improving their robustness.... -
Articulation During Voice Disguise: A Pilot Study
Speakers can conceal their identity by deliberately changing their speech characteristics, or disguising their voices. During voice disguise,... -
Design and Simulation Analysis of Bionic Jellyfish AUV Driven by SMA Flexible Driver
In this paper, the structure and movement of sea moon jellyfish were analyzed. For the purpose of better synthesis, a novel bionic actuator was... -
Towards Automatic Determination of Critical Gestures for European Portuguese Sounds
Technologies, such as electromagnetic midsagittal articulography (EMA) and real-time magnetic resonance (RT-MRI), can contribute to improve our... -
Metaheuristics: a comprehensive overview and classification along with bibliometric analysis
Research in metaheuristics for global optimization problems are currently experiencing an overload of wide range of available metaheuristic-based...
-
Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack
In side-channel analysis (SCA), the success of an attack is largely dependent on the dataset sizes and the number of instances in each class. The... -
Mispronunciation detection and diagnosis using deep neural networks: a systematic review
The increased need for foreign language learning, along with advances in speech technology have heightened interest in computer-assisted...
-
A deep learning model enabled multi-event recognition for distributed optical fiber sensing
Fiber optic sensors that utilize backscattered light offer distributed real-time measurements and have been seen tremendous improvements in sensing...
-
Deep-learning-based real-time silent speech recognition using facial electromyogram recorded around eyes for hands-free interfacing in a virtual reality environment
Speech recognition technology is a promising hands-free interfacing modality for virtual reality (VR) applications. However, it has several...
-
Photonic power firewalls
This paper describes a new countermeasure against side-channel power attacks. We show that a conventional chipcard can be powered using an organic...
-
How to Develop ECC-Based Low Cost RFID Tags Robust Against Side-Channel Attacks
Radio Frequency Identification (RFID) tags using asymmetric cryptography are more and more proposed to solve the well-known issue of symmetric-based... -
Structure damage diagnosis of bleacher based on DSKNet model
Bleacher usually carries a large number of people, and their safety and stability are critical. Structure damage diagnosis of bleacher can find...
-
Advancements in arithmetic optimization algorithm: theoretical foundations, variants, and applications
Arithmetic optimization algorithm (AOA) is a population-based metaheuristic algorithm that mimics the properties of primitive arithmetic operators....
-
Comprehensive Taxonomies of Nature- and Bio-inspired Optimization: Inspiration Versus Algorithmic Behavior, Critical Analysis Recommendations
In recent algorithmic family simulates different biological processes observed in Nature in order to efficiently address complex optimization...
-
Contributions to a Quantitative Unsupervised Processing and Analysis of Tongue in Ultrasound Images
Speech production studies and the knowledge they bring forward are of paramount importance to advance a wide range of areas including Phonetics,... -
Horizontal Attacks Against ECC: From Simulations to ASIC
In this paper we analyse the impact of different compile options on the success rate of side channel analysis attacks. We run horizontal differential... -
Physical security in the post-quantum era
Over the past decades, quantum technology has seen consistent progress, with notable recent developments in the field of quantum computers....
-
Synchronization of Musical Acoustics and Articulatory Movements in Russian Classical Romance
The given paper is aimed at investigating synchronization of musical acoustics (pitch, frequencies, durations) and articulatory movements in Russian...