In the modern era, characterized by the widespread presence of sensor-based systems, ensuring time-series data privacy without compromising utility has emerged as a significant challenge. While current strategies for ...
详细信息
Deep neural networks (DNNs) have demonstrated remarkable performance in various computer vision tasks. However, they face challenges that can inhibit their performance and transparency such as the learning of spurious...
详细信息
To address human-machine conflicts caused by high driver control authority, this paper proposes a driver-vehicle model and an autonomous steering controller using Model Predictive control (MPC). Simulink simulations s...
详细信息
the proceedings contain 22 papers. the special focus in this conference is on Information Security Practice and Experience. the topics include: Lattice-Based Universal Designated Multi-verifiers Signature Scheme;Diffe...
ISBN:
(纸本)9789819790524
the proceedings contain 22 papers. the special focus in this conference is on Information Security Practice and Experience. the topics include: Lattice-Based Universal Designated Multi-verifiers Signature Scheme;Differential Cryptanalysis Against SIMECK Implementation in a Leakage Profiling Scenario;shrinkable Ring Signatures: It Wasn’t them!;Related-Tweakey Boomerang and Rectangle Attacks on Reduced-Round Joltik-BC;isogeny-Based Password-Authenticated Key Exchange Based on Shuffle Algorithm;a New Construction of Leakage-Resilient Identity-Based Encryption Scheme;enhancing Portability in Deep Learning-Based Side-Channel Attacks Against Kyber;Generic CCA Secure Key Homomorphic KEM and Updatable Public Key Encryption;Breaking GEA-Like Stream Ciphers with Lower Time Cost;SNIPER: Detect Complex Attacks Accurately from Traffic;from the Perspective of Prototypes: A Privacy-Preserving Personalized Federated Learning Framework;efficient Large-Scale Multi-party Computation Based on Garbled Circuit;Parallel Implementation of Sieving Algorithm on Heterogeneous CPU-GPU Computing Architectures;Unveiling the Efficacy of BERT’s Attention in Memory Obfuscated Malware Detection;An eID-Based Privacy-Enhanced Public Transportation Ticket System;outsourced and Robust Multi-party Computation with Identifying Malicious Behavior and Application to Machine Learning;controlled Multi-client Functional Encryption for Flexible Access control;a Secure Incentive Mechanism in Blockchain-Based Mobile Crowdsensing;a Comparative Analysis of Phishing Tools: Features and Countermeasures;OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT.
the convergence of information technology (IT) and operational technology (OT) has made manufacturing industries an attractive target for cyberattacks, ranging from industrial espionage to sabotage. Existing security ...
详细信息
this paper presents an adaptive fractional order sliding mode projective synchronization scheme for different hyperjerk systems with uncertainty and disturbances. A fractional order sliding mode controller withthree ...
详细信息
the role of anomaly detection systems in Critical Infrastructures (CIs) is critical due to the complexity of CIs and their controlsystems, which are usually implemented by computer-based controllers that constantly p...
详细信息
Marine radar systems are a core technical instrument for collision avoidance in shipping and an indispensable decision-making aid for navigators on the ship’s bridge in limited visibility conditions at sea, in strait...
详细信息
this research investigates the perceptions of cybersecurity among older adults in Malaysia, aged 60 years and above, who are reliant on technology for basic activities. the data from 331 participants showed that 30.8%...
详细信息
this paper introduces an efficient approach, the dynamic coefficient polynomial model, which emulates crop growth dynamics using NDVI. this model, a significant improvement over traditional models like the NDVI mean a...
详细信息
暂无评论