We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,653 results
  1. SCIDP–Secure cloud-integrated data dissemination protocol for efficient reprogramming in internet of things

    Base station (BS) offers data dissemination as a service to IoT smart devices, enabling efficient reprogramming or reconfiguration for their intended...

    R. Shanmugapriya, S. V. N. Santhosh Kumar in Cluster Computing
    Article 17 June 2024
  2. Reprogramming GANs via Input Noise Design

    The goal of neural reprogramming is to alter the functionality of a fixed neural network just by preprocessing the input. In this work, we show that...
    Kangwook Lee, Changho Suh, Kannan Ramchandran in Machine Learning and Knowledge Discovery in Databases
    Conference paper 2021
  3. An Improved (Adversarial) Reprogramming Technique for Neural Networks

    Neural networks can be repurposed via adversarial reprogramming to perform new tasks, which are different from the tasks they were originally trained...
    Conference paper 2021
  4. Tight Adaptive Reprogramming in the QROM

    The random oracle model (ROM) enjoys widespread popularity, mostly because it tends to allow for tight and conceptually simple proofs where provable...
    Alex B. Grilo, Kathrin Hövelmanns, ... Christian Majenz in Advances in Cryptology – ASIACRYPT 2021
    Conference paper 2021
  5. Music Instrument Classification Reprogrammed

    The performance of approaches to Music Instrument Classification, a popular task in Music Information Retrieval, is often impacted and limited by the...
    Hsin-Hung Chen, Alexander Lerch in MultiMedia Modeling
    Conference paper 2023
  6. Contrastive Fitness Learning: Reprogramming Protein Language Models for Low-N Learning of Protein Fitness Landscape

    Machine learning (ML) is revolutionizing our ability to model the fitness landscape of protein sequences. Recently, the protein language model (pLM)...
    Junming Zhao, Chao Zhang, Yunan Luo in Research in Computational Molecular Biology
    Conference paper 2024
  7. Attribute inference privacy protection for pre-trained models

    With the increasing popularity of machine learning (ML) in image processing, privacy concerns have emerged as a significant issue in deploying and...

    Hossein Abedi Khorasgani, Noman Mohammed, Yang Wang in International Journal of Information Security
    Article 02 April 2024
  8. Multi-material Integrated Printing of Reprogrammable Magnetically Actuated Soft Structure

    The magnetically actuated soft structure has the unique advantages of remote actuation, free deformation, programmability, and high energy...
    Youchao Zhang, Huangyu Chen, ... **aoyang Zhu in Intelligent Robotics and Applications
    Conference paper 2023
  9. Sequential Reprogramming of Boolean Networks Made Practical

    We address the sequential reprogramming of gene regulatory networks modelled as Boolean networks. We develop an attractor-based sequential...
    Hugues Mandon, Cui Su, ... Loïc Paulevé in Computational Methods in Systems Biology
    Conference paper 2019
  10. Sequential Reprogramming of Biological Network Fate

    A major challenge in precision medicine consists in finding the appropriate network rewiring to induce a particular reprogramming of the cell...
    Jérémie Pardo, Sergiu Ivanov, Franck Delaplace in Computational Methods in Systems Biology
    Conference paper 2019
  11. Selective Opening Security in the Quantum Random Oracle Model, Revisited

    We prove that two variants of the Fujisaki-Okamoto transformations are selective opening (SO) secure against chosen-ciphertext attacks in the quantum...
    Jiaxin Pan, Runzhi Zeng in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  12. Cabean 2.0: Efficient and Efficacious Control of Asynchronous Boolean Networks

    We present a new version of the software, Cabean, integrating six source-target control methods and three target control methods for the...
    Cui Su, Jun Pang in Formal Methods
    Conference paper 2021
  13. Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model

    A hash-and-sign signature based on a preimage-sampleable function (Gentry et al., STOC 2008) is secure in the quantum random oracle model if the...
    Haruhisa Kosuge, Keita Xagawa in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  14. Government Programming and Budgeting for AI Leaders

    Program authorities and funding already exist for creating some impact on national security through AI. The President’s priorities and Congressional...
    Chris Whitlock, Frank Strickland in Winning the National Security AI Competition
    Chapter 2023
  15. Cellular Reprogramming

    With cellular reprogramming, it is possible to convert a cell from one phenotype to another without necessarily passing through a pluripotent state....
    Domenico Sgariglia, Alessandra Jordano Conforte, ... Fabricio Alves Barbosa da Silva in Theoretical and Applied Aspects of Systems Biology
    Chapter 2018
  16. On the Quantum Security of HAWK

    In this paper, we prove the quantum security of the signature scheme HAWK, proposed by Ducas, Postlethwaite, Pulles and van Woerden (ASIACRYPT 2022)....
    Serge Fehr, Yu-Hsuan Huang in Post-Quantum Cryptography
    Conference paper 2023
  17. A Detailed Analysis of Fiat-Shamir with Aborts

    Lyubashevky’s signatures are based on the Fiat-Shamir with Aborts paradigm. It transforms an interactive identification protocol that has a...
    Julien Devevey, Pouria Fallahpour, ... Damien Stehlé in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  18. Post-quantum Key-Blinding for Authentication in Anonymity Networks

    Anonymity networks, such as the Tor network, are highly decentralized and make heavy use of ephemeral identities. Both of these characteristics run...
    Edward Eaton, Douglas Stebila, Roy Stracovsky in Progress in Cryptology – LATINCRYPT 2021
    Conference paper 2021
  19. Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices

    We provide identity-based signature (IBS) schemes with tight security against adaptive adversaries, in the (classical or quantum) random oracle model...
    Éric Sageloli, Pierre Pébereau, ... Céline Chevalier in Applied Cryptography and Network Security
    Conference paper 2023
  20. Angriffssicherheit und Manipulationssicherheit bei KI-Systemen

    Industrie 4.0 führt in der produzierenden Wirtschaft zu mehr Computertechnologie und mehr Vernetzung – intern und extern. Dabei treffen zwei Welten...
    Chapter 2024
Did you find what you were looking for? Share feedback.