Affectation 发表于 2025-3-23 12:25:28
http://reply.papertrans.cn/17/1676/167504/167504_11.pngglomeruli 发表于 2025-3-23 16:02:47
Everything All at Once: Deep Learning Side-Channel Analysis Optimization Frameworknd speech recognition for decades, it is still lacking maturity for side-channel analysis. One of the challenges to train a good model is the fine-tuning of its hyperparameters. Many methods have been developed for Hyperparameter Optimization, but a few have been applied for deep learning side-channconsolidate 发表于 2025-3-23 21:55:09
Device Fingerprinting in a Smart Grid CPSed in smart grid systems. These unobservable cyberattacks present a potentially dangerous threat to grid operations. Data integrity attacks that involve the compromise of various meter readings such as voltage and current levels can lead to threats ranging from trivial problems such as energy usage巨硕 发表于 2025-3-23 22:44:52
http://reply.papertrans.cn/17/1676/167504/167504_14.png有害 发表于 2025-3-24 02:53:37
Evaluation of Lightweight Machine Learning-Based NIDS Techniques for Industrial IoTthese devices has propelled the growth of Industry 4.0 to an exponential pace. However, while this vast pool of interconnected devices broadens the opportunities for better business and better lives, it also attracts the attention of cybercriminals. Nevertheless, it has been shown that the resource-忘川河 发表于 2025-3-24 07:16:25
Measuring Cyber Resilience of IoT-Enabled Critical National Infrastructureson properly. CNI are increasingly being connected to the internet to improve operational efficiency and reduce costs. The adoption of the Industrial Internet of Things (IoT) introduced new attack vectors which have necessitated a need to build and improve cyber resilience in CNI. The quantification冷淡周边 发表于 2025-3-24 12:14:38
http://reply.papertrans.cn/17/1676/167504/167504_17.pngChronic 发表于 2025-3-24 17:34:35
https://doi.org/10.1007/978-3-662-49459-2res (EfficientNets, MobileNets, NasNet, etc.) are implemented on the GPU of Jetson Nano and the electromagnetic radiation of the GPU is analyzed during the inference operation of the neural networks. The results of the analysis show that neural network architectures are easily distinguishable using deep learning-based side-channel analysis.Vaginismus 发表于 2025-3-24 19:54:49
http://reply.papertrans.cn/17/1676/167504/167504_19.pngBARK 发表于 2025-3-25 01:12:08
https://doi.org/10.1007/978-3-662-49459-2Artix-7 and in a simulation and demonstrate its attack resistance against DL attacks. The experimental results show that the fDTM PUF achieves much higher attack resistance than the conventional Arbiter PUF with the equivalent area and achieves equivalent attack resistance to previous PUFs with areas around several to dozens of times smaller.