We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 885 results
  1. Simple electromagnetic analysis attack based on geometric leak on ASIC implementation of ring-oscillator PUF

    Physically unclonable functions (PUFs) are assumed to provide high tamper resistance against counterfeiting and hardware attacks since PUFs extract...

    Mitsuru Shiozaki, Takeshi Fu**o in Journal of Cryptographic Engineering
    Article 03 September 2020
  2. Minimizing False-Rejection Rates in Gas Leak Testing Using an Ensemble Multiclass Classifier for Unbalanced Data

    Leak testing is a fundamental stage in the manufacturing process of leak-tight products providing a non-destructive quality measurement. However,...
    Conference paper 2022
  3. Geometric Range Searchable Encryption with Forward and Backward Security

    Geometric range query is a general query algorithm over spatial data and applies to many real-world applications, such as location-based services....
    Mengwei Yang, Chungen Xu, Pan Zhang in Network and System Security
    Conference paper 2022
  4. Revisiting Security Estimation for LWE with Hints from a Geometric Perspective

    The Distorted Bounded Distance Decoding Problem ( \(\textsf{DBDD}\)...
    Dana Dachman-Soled, Hui**g Gong, ... Hunter Kippen in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  5. Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy

    Driven by the cloud-first initiative taken by various governments and companies, it has become a common practice to outsource spatial data to cloud...
    Shabnam Kasra Kermanshahi, Rafael Dowsley, ... Xun Yi in Computer Security – ESORICS 2021
    Conference paper 2021
  6. Threat for the Secure Remote Password Protocol and a Leak in Apple’s Cryptographic Library

    The Secure Remote Password protocol is a password-based authenticated key-exchange between two parties. One advantage is to prevent offline...
    Conference paper 2021
  7. Learning to Censor by Noisy Sampling

    Point clouds are an increasingly ubiquitous input modality and the raw signal can be efficiently processed with recent progress in deep learning....
    Ayush Chopra, Abhinav Java, ... Ramesh Raskar in Computer Vision – ECCV 2022
    Conference paper 2022
  8. One-shot Face Reenactment with Dense Correspondence Estimation

    One-shot face reenactment is a challenging task due to the identity mismatch between source and driving faces. Most existing methods fail to...

    Yunfan Liu, Qi Li, Zhenan Sun in Machine Intelligence Research
    Article 30 May 2024
  9. Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense Against Model Inversion Attacks

    In this work, we investigate privacy risks associated with model inversion attribute inference attacks. Specifically, we explore a case in which a...
    Manel Slokom, Peter-Paul de Wolf, Martha Larson in Information Security
    Conference paper 2023
  10. How to measure value alignment in AI

    How can we make sure that AI systems align with human values and norms? An important step towards reaching this goal is to develop a method for...

    Martin Peterson, Peter Gärdenfors in AI and Ethics
    Article 30 October 2023
  11. Adaptive isomap feature extractive gradient deep belief network classifier for diabetic retinopathy identification

    Diabetic retinopathy (DR) is an infection that bases eternal visualization loss in patients with diabetes mellitus. With DR, the glucose level in the...

    Alka Singh, Rakesh Kumar, Amir H. Gandomi in Multimedia Tools and Applications
    Article 18 April 2024
  12. Klee’s Measure Problem Made Oblivious

    We study Klee’s measure problem — computing the volume of the union of n axis-parallel hyperrectangles in...
    Thore Thießen, Jan Vahrenhold in LATIN 2022: Theoretical Informatics
    Conference paper Open access 2022
  13. Geometric Pairwise Key-Sharing Scheme

    In recent years, there has been a growth in Internet of Things (IoT) technologies that are used to collect and exchange data. In such networks,...
    Conference paper 2019
  14. PanoFormer: Panorama Transformer for Indoor 360 \(^{\circ }\) Depth Estimation

    Existing panoramic depth estimation methods based on convolutional neural networks (CNNs) focus on removing panoramic distortions, failing to...
    Zhijie Shen, Chunyu Lin, ... Yao Zhao in Computer Vision – ECCV 2022
    Conference paper 2022
  15. Open Sharing of Digital Education Training Resources Based on Machine Learning

    In order to solve the problem of poor security caused by data explosion in the traditional open sharing method of digital education training...
    Jichao Yan, **gya Zheng in Multimedia Technology and Enhanced Learning
    Conference paper 2021
  16. Introduction

    In this chapter, we introduce the basic concept of information hiding, steganography, and watermarking.
    Hang Zhou, Kejiang Chen, ... Weiming Zhang in Triangle Mesh Watermarking and Steganography
    Chapter 2023
  17. Secure Multiparty Sampling of a Biased Coin for Differential Privacy

    Sampling a biased coin is a key primitive in designing secure multiparty computation (MPC) for differentially private mechanisms. We explore...
    Conference paper 2024
  18. Does a Program Yield the Right Distribution?

    We study discrete probabilistic programs with potentially unbounded loo** behaviors over an infinite state space. We present, to the best of our...
    Mingshuai Chen, Joost-Pieter Katoen, ... Tobias Winkler in Computer Aided Verification
    Conference paper Open access 2022
  19. Privacy-Preserving Federated Learning with Hierarchical Clustering to Improve Training on Non-IID Data

    Federated learning (FL), as a privacy-enhanced distributed machine learning paradigm, has achieved tremendous success in solving the data silo...
    Songwei Luo, Shao**g Fu, ... Shixiong Wang in Network and System Security
    Conference paper 2023
  20. FedBC: An Efficient and Privacy-Preserving Federated Consensus Scheme

    The capacity of federated learning (FL) to tackle the issue of “Data Island” while maintaining data privacy has garnered significant attention....
    Conference paper 2022
Did you find what you were looking for? Share feedback.