We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 255 results
  1. Simple electromagnetic analysis attack based on geometric leak on ASIC implementation of ring-oscillator PUF

    Physically unclonable functions (PUFs) are assumed to provide high tamper resistance against counterfeiting and hardware attacks since PUFs extract...

    Mitsuru Shiozaki, Takeshi Fu**o in Journal of Cryptographic Engineering
    Article 03 September 2020
  2. Multilevel thresholding image segmentation using meta-heuristic optimization algorithms: comparative analysis, open challenges and new trends

    This paper studied the multilevel threshold image segmentation-based metaheuristics optimization methods and their applications. Image segmentation...

    Laith Abualigah, Khaled H. Almotairi, Mohamed Abd Elaziz in Applied Intelligence
    Article 09 September 2022
  3. TFAugment: A Key Frequency-Driven Data Augmentation Method for Human Activity Recognition

    Data augmentation enhances Human Activity Recognition (HAR) models by diversifying training data through transformations, improving their robustness....
    Hao Zhang, Bixiao Zeng, ... Hongfang Gong in Advances in Knowledge Discovery and Data Mining
    Conference paper 2024
  4. Articulation During Voice Disguise: A Pilot Study

    Speakers can conceal their identity by deliberately changing their speech characteristics, or disguising their voices. During voice disguise,...
    Lauri Tavi, Tomi Kinnunen, ... Anton Malmi in Speech and Computer
    Conference paper 2021
  5. Design and Simulation Analysis of Bionic Jellyfish AUV Driven by SMA Flexible Driver

    In this paper, the structure and movement of sea moon jellyfish were analyzed. For the purpose of better synthesis, a novel bionic actuator was...
    Jianfeng Yu, Chao Zhang, Shao** Wang in Intelligent Robotics and Applications
    Conference paper 2021
  6. Towards Automatic Determination of Critical Gestures for European Portuguese Sounds

    Technologies, such as electromagnetic midsagittal articulography (EMA) and real-time magnetic resonance (RT-MRI), can contribute to improve our...
    Samuel Silva, Conceição Cunha, ... Jens Frahm in Computational Processing of the Portuguese Language
    Conference paper 2020
  7. Metaheuristics: a comprehensive overview and classification along with bibliometric analysis

    Research in metaheuristics for global optimization problems are currently experiencing an overload of wide range of available metaheuristic-based...

    Absalom E. Ezugwu, Amit K. Shukla, ... Pranab K. Muhuri in Artificial Intelligence Review
    Article 16 March 2021
  8. Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack

    In side-channel analysis (SCA), the success of an attack is largely dependent on the dataset sizes and the number of instances in each class. The...
    Conference paper 2024
  9. Mispronunciation detection and diagnosis using deep neural networks: a systematic review

    The increased need for foreign language learning, along with advances in speech technology have heightened interest in computer-assisted...

    Meriem Lounis, Bilal Dendani, Halima Bahi in Multimedia Tools and Applications
    Article 09 January 2024
  10. A deep learning model enabled multi-event recognition for distributed optical fiber sensing

    Fiber optic sensors that utilize backscattered light offer distributed real-time measurements and have been seen tremendous improvements in sensing...

    Yujiao Li, **aomin Cao, ... Kuanglu Yu in Science China Information Sciences
    Article 19 February 2024
  11. Deep-learning-based real-time silent speech recognition using facial electromyogram recorded around eyes for hands-free interfacing in a virtual reality environment

    Speech recognition technology is a promising hands-free interfacing modality for virtual reality (VR) applications. However, it has several...

    Ho-Seung Cha, Won-Du Chang, Chang-Hwan Im in Virtual Reality
    Article 30 January 2022
  12. Photonic power firewalls

    This paper describes a new countermeasure against side-channel power attacks. We show that a conventional chipcard can be powered using an organic...

    Jean-Max Dutertre, Amir-Pasha Mirbaha, ... Assia Tria in Journal of Cryptographic Engineering
    Article 02 September 2022
  13. How to Develop ECC-Based Low Cost RFID Tags Robust Against Side-Channel Attacks

    Radio Frequency Identification (RFID) tags using asymmetric cryptography are more and more proposed to solve the well-known issue of symmetric-based...
    Manh-Hiep Dao, Vincent Beroulle, ... Xuan-Tu Tran in Industrial Networks and Intelligent Systems
    Conference paper 2021
  14. Structure damage diagnosis of bleacher based on DSKNet model

    Bleacher usually carries a large number of people, and their safety and stability are critical. Structure damage diagnosis of bleacher can find...

    Chaozhi Cai, **aoyu Guo, ... Jianhua Ren in The Journal of Supercomputing
    Article 20 December 2023
  15. Advancements in arithmetic optimization algorithm: theoretical foundations, variants, and applications

    Arithmetic optimization algorithm (AOA) is a population-based metaheuristic algorithm that mimics the properties of primitive arithmetic operators....

    Article 02 October 2023
  16. Comprehensive Taxonomies of Nature- and Bio-inspired Optimization: Inspiration Versus Algorithmic Behavior, Critical Analysis Recommendations

    In recent algorithmic family simulates different biological processes observed in Nature in order to efficiently address complex optimization...

    Daniel Molina, Javier Poyatos, ... Francisco Herrera in Cognitive Computation
    Article 05 July 2020
  17. Contributions to a Quantitative Unsupervised Processing and Analysis of Tongue in Ultrasound Images

    Speech production studies and the knowledge they bring forward are of paramount importance to advance a wide range of areas including Phonetics,...
    Fábio Barros, Ana Rita Valente, ... Catarina Oliveira in Image Analysis and Recognition
    Conference paper 2020
  18. Horizontal Attacks Against ECC: From Simulations to ASIC

    In this paper we analyse the impact of different compile options on the success rate of side channel analysis attacks. We run horizontal differential...
    Ievgen Kabin, Zoya Dyka, ... Peter Langendoerfer in Computer Security
    Conference paper 2020
  19. Physical security in the post-quantum era

    Over the past decades, quantum technology has seen consistent progress, with notable recent developments in the field of quantum computers....

    Sreeja Chowdhury, Ana Covic, ... Domenic Forte in Journal of Cryptographic Engineering
    Article 01 February 2021
  20. Synchronization of Musical Acoustics and Articulatory Movements in Russian Classical Romance

    The given paper is aimed at investigating synchronization of musical acoustics (pitch, frequencies, durations) and articulatory movements in Russian...
    Karina Evgrafova, Vera Evdokimova, ... Tatjana Chukaeva in Language, Music and Computing
    Conference paper 2019
Did you find what you were looking for? Share feedback.