With the rapid advancement of electronic textiles, the design and integration of connectors have emerged as pivotal challenges. This study emphasizes the development of a connection solution that amalgamates miniaturi...
详细信息
This paper proposes the application of logic locking over TFHE to protect both user data and algorithms, such as input user data and models in machine learning inference applications. With the proposed secure computat...
This paper proposes the application of logic locking over TFHE to protect both user data and algorithms, such as input user data and models in machine learning inference applications. With the proposed secure computation protocol algorithm evaluation can be performed distributively on honest-but-curious user computers while keeping the algorithm secure. To achieve this, we combine conventional logic locking for untrusted foundries with TFHE to enable secure computation. By encrypting the logic locking key using TFHE, the key is secured with the degree of TFHE. We implemented the proposed secure protocols for combinational logic neural networks and decision trees using LUT-based obfuscation. Regarding the security analysis, we subjected them to the SAT attack and evaluated their resistance based on the execution time. We successfully configured the proposed secure protocol to be resistant to the SAT attack in all machine learning benchmarks. Also, the experimental result shows that the proposed secure computation involved almost no TFHE runtime overhead in a test case with thousands of gates.
Control of Dual Active Bridge (DAB) converters can be particularly challenging due to the involvement of multiple parameters such as phase shift, duty cycles, etc. This paper proposes a triple-phase shift control (TPS...
详细信息
Recently, with the development of deep learning techniques, text classification methods have achieved remarkable results. However, the existing work usually models the entire text, less consideration is given to the h...
详细信息
Spam has increased as a result of the widespread use of email-based communication, making reliable and effective categorization techniques necessary to detect and filter undesirable information. Our paper presents a S...
详细信息
ISBN:
(数字)9798331537579
ISBN:
(纸本)9798331537586
Spam has increased as a result of the widespread use of email-based communication, making reliable and effective categorization techniques necessary to detect and filter undesirable information. Our paper presents a Semantic Graph Neural Network (SGNN) method that reframes email categorization as a graph-based problem. Instead of using conventional numerical embeddings, emails are represented as semantic graphs. This approach makes use of the relational and structural information included in email content, enabling a more sophisticated and contextually sensitive classification procedure. Our tests, which were carried out on a number of popular public datasets, show that SGNN routinely beats state-of the-art deep learning models and attains greater accuracy, especially in the difficult field of spam categorization. These findings highlight SGNN's promise as a practical and scalable approach to email spam detection in the real world, providing enhanced classification accuracy without the hassle of embedding layers.
This paper aims to automatically augment numerical tabular data by using the variational autoencoder model. For this, we try to solve the problem of class imbalance in numerical data and to improve the performance of ...
详细信息
The increasing penetration of Distributed Renewable Energy Sources (DRES) has caused several issues to the electric grid, e.g., frequency instability. The Transmission System Operators (TSOs) try to solve these issues...
详细信息
Internet and other networks provide a consistent stage for individuals and items to interface and communicate with each other. This continuous interaction results in automatic cooperation of millions of various applia...
详细信息
Speaking hatefully is an antisocial conduct. Hate can be expressed on the basis of gender, race, or religion, ethnic, etc. The definition of 'hate speech' is ambiguous. The Hate speech is defined by the Counci...
详细信息
Hairstyles contribute majorly to an individual's physical appearance. It is commonly observed that there is a huge gap between customer's expectations and the barber's understanding leading to post-haircut...
详细信息
暂无评论