找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cyber Security, Cryptology, and Machine Learning; 7th International Sy Shlomi Dolev,Ehud Gudes,Pascal Paillier Conference proceedings 2023

[复制链接]
楼主: Definite
发表于 2025-3-26 21:47:16 | 显示全部楼层
发表于 2025-3-27 01:42:45 | 显示全部楼层
,Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan, and Israel,ext year. Prediction is performed by training various machine learning algorithms, such as AdaBoost, XGBoost, Random Forest, Logistic Regression, and Info-Fuzzy Network. The models are induced using a combination of seismic indicators used in the earthquake literature as well as various time-series
发表于 2025-3-27 05:20:43 | 显示全部楼层
A Bag of Tokens Neural Network to Predict Webpage Age,es. To improve the efficiency of (automated) penetration testers, we invent a machine learning method that predicts the age of a webpage. An HTML-specific tokenizer is trained and used to tokenize HTML bodies, which are then transformed into binary vector encodings (a “bag of tokens”). We train a Mu
发表于 2025-3-27 10:15:11 | 显示全部楼层
,Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutationsad obtained the distributions of the correlations between linear input and output combiners of uniform random functions and uniform random permutations. The present work generalises these results to obtain the distributions of the correlations between arbitrary input and output combiners of uniform
发表于 2025-3-27 13:37:27 | 显示全部楼层
发表于 2025-3-27 19:41:50 | 显示全部楼层
Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO, resource sharing to access the wireless shared channel for uplink communication with the base station (BS) becomes daunting. To address this issue, we devise and study a . multiple-access protocol for massive multiple-input-multiple-output (MIMO) systems, based on sparse coding techniques originate
发表于 2025-3-27 22:54:17 | 显示全部楼层
The Use of Performance-Countersto Perform Side-Channel Attacks,m and the user that uses it; thus, they have the potential to become a major privacy threat. This work shows that performance traces, achieved with performance counters, are sufficient for three efficient privacy attacks on a computer. The first attack allows the identification of webpages the user
发表于 2025-3-28 04:14:15 | 显示全部楼层
发表于 2025-3-28 07:09:34 | 显示全部楼层
Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks,el approach to graphical password (GP) schemes that utilize a dual-view technology known as the global precedence effect, which eliminates the need for external devices and makes the grid and pattern invisible to potential shoulder surfers. The usability of Hollow-Pass was evaluated through an onlin
发表于 2025-3-28 11:35:48 | 显示全部楼层
,Practical Improvements on BKZ Algorithm, BKZ algorithm is the most efficient way to solve them. In this paper, we give four further improvements on BKZ algorithm, which can be used for SVP subroutines based on enumeration and sieving. These improvements in combination provide a speed-up of . in total. So all the lattice-based NIST PQC can
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-30 05:32
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表