Search
Search Results
-
Simple electromagnetic analysis attack based on geometric leak on ASIC implementation of ring-oscillator PUF
Physically unclonable functions (PUFs) are assumed to provide high tamper resistance against counterfeiting and hardware attacks since PUFs extract...
-
Minimizing False-Rejection Rates in Gas Leak Testing Using an Ensemble Multiclass Classifier for Unbalanced Data
Leak testing is a fundamental stage in the manufacturing process of leak-tight products providing a non-destructive quality measurement. However,... -
Geometric Range Searchable Encryption with Forward and Backward Security
Geometric range query is a general query algorithm over spatial data and applies to many real-world applications, such as location-based services.... -
Revisiting Security Estimation for LWE with Hints from a Geometric Perspective
The Distorted Bounded Distance Decoding Problem ( \(\textsf{DBDD}\)... -
Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy
Driven by the cloud-first initiative taken by various governments and companies, it has become a common practice to outsource spatial data to cloud... -
Threat for the Secure Remote Password Protocol and a Leak in Apple’s Cryptographic Library
The Secure Remote Password protocol is a password-based authenticated key-exchange between two parties. One advantage is to prevent offline... -
Learning to Censor by Noisy Sampling
Point clouds are an increasingly ubiquitous input modality and the raw signal can be efficiently processed with recent progress in deep learning.... -
One-shot Face Reenactment with Dense Correspondence Estimation
One-shot face reenactment is a challenging task due to the identity mismatch between source and driving faces. Most existing methods fail to...
-
Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense Against Model Inversion Attacks
In this work, we investigate privacy risks associated with model inversion attribute inference attacks. Specifically, we explore a case in which a... -
How to measure value alignment in AI
How can we make sure that AI systems align with human values and norms? An important step towards reaching this goal is to develop a method for...
-
Adaptive isomap feature extractive gradient deep belief network classifier for diabetic retinopathy identification
Diabetic retinopathy (DR) is an infection that bases eternal visualization loss in patients with diabetes mellitus. With DR, the glucose level in the...
-
Klee’s Measure Problem Made Oblivious
We study Klee’s measure problem — computing the volume of the union of n axis-parallel hyperrectangles in... -
Geometric Pairwise Key-Sharing Scheme
In recent years, there has been a growth in Internet of Things (IoT) technologies that are used to collect and exchange data. In such networks,... -
PanoFormer: Panorama Transformer for Indoor 360 \(^{\circ }\) Depth Estimation
Existing panoramic depth estimation methods based on convolutional neural networks (CNNs) focus on removing panoramic distortions, failing to... -
Open Sharing of Digital Education Training Resources Based on Machine Learning
In order to solve the problem of poor security caused by data explosion in the traditional open sharing method of digital education training... -
Introduction
In this chapter, we introduce the basic concept of information hiding, steganography, and watermarking. -
Secure Multiparty Sampling of a Biased Coin for Differential Privacy
Sampling a biased coin is a key primitive in designing secure multiparty computation (MPC) for differentially private mechanisms. We explore... -
Does a Program Yield the Right Distribution?
We study discrete probabilistic programs with potentially unbounded loo** behaviors over an infinite state space. We present, to the best of our... -
Privacy-Preserving Federated Learning with Hierarchical Clustering to Improve Training on Non-IID Data
Federated learning (FL), as a privacy-enhanced distributed machine learning paradigm, has achieved tremendous success in solving the data silo... -
FedBC: An Efficient and Privacy-Preserving Federated Consensus Scheme
The capacity of federated learning (FL) to tackle the issue of “Data Island” while maintaining data privacy has garnered significant attention....