Searched for: subject%3A%22analysis%22
(1 - 16 of 16)
document
van Nuland, T.D.H. (author)
The universal approximation theorem is generalised to uniform convergence on the (noncompact) input space R<sup>n</sup>. All continuous functions that vanish at infinity can be uniformly approximated by neural networks with one hidden layer, for all activation functions φ that are continuous, nonpolynomial, and asymptotically polynomial at ±∞...
journal article 2024
document
Karayalçin, Sengim (author)
Some of the most prominent types of attacks against modern cryptographic implementations are side-channel attacks. These attacks leverage some unintended, often physical, leakage of the implementation to retrieve secret information. In recent times, a large part of the focus of side-channel research has been on deep learning methods. These...
master thesis 2022
document
Wang, Dandan (author), Xu, Jinlan (author), Gao, Fei (author), Wang, C.C. (author), Gu, Renshu (author), Lin, Fei (author), Rabczuk, Timon (author), Xu, Gang (author)
In this paper, a deep learning framework combined with isogeometric analysis (IGA for short) called IGA-Reuse-Net is proposed for efficient reuse of numerical simulation on a set of topology-consistent models. Compared with previous data-driven numerical simulation methods only for simple computational domains, our method can predict high...
journal article 2022
document
Wu, L. (author), Perin, G. (author), Picek, S. (author)
In the last decade, machine learning-based side-channel attacks have become a standard option when investigating profiling side-channel attacks. At the same time, the previous state-of-the-art technique, template attack, started losing its importance and was more considered a baseline to compare against. As such, most of the results reported...
journal article 2022
document
Perin, G. (author), Wu, L. (author), Picek, S. (author)
One of the main promoted advantages of deep learning in profiling side-channel analysis is the possibility of skipping the feature engineering process. Despite that, most recent publications consider feature selection as the attacked interval from the side-channel measurements is pre-selected. This is similar to the worst-case security...
journal article 2022
document
Jeon, Jaemin (author), Kim, Jaeyong (author), Lee, Jong Jun (author), Shin, D. (author), Kim, Yoon Young (author)
This study presents a new modeling technique to estimate the stiffness matrix of a thin-walled beam-joint structure using deep learning. When thin-walled beams meet at joints, significant sectional deformations occur, such as warping and distortion. These deformations should be considered in the one-dimensional beam analysis, but it is...
journal article 2022
document
Kerkhof, Maikel (author), Wu, L. (author), Perin, G. (author), Picek, S. (author)
The deep learning-based side-channel analysis represents one of the most powerful side-channel attack approaches. Thanks to its capability in dealing with raw features and countermeasures, it becomes the de facto standard approach for the SCA community. The recent works significantly improved the deep learning-based attacks from various...
conference paper 2022
document
Rezaeezade, A. (author), Perin, G. (author), Picek, S. (author)
Profiling side-channel analysis allows evaluators to estimate the worst-case security of a target. When security evaluations relax the assumptions about the adversary’s knowledge, profiling models may easily be sub-optimal due to the inability to extract the most informative points of interest from the side-channel measurements. When used for...
conference paper 2022
document
Rijsdijk, Jorai (author), Wu, L. (author), Perin, G. (author)
Deep learning-based side-channel attacks are capable of breaking targets protected with countermeasures. The constant progress in the last few years makes the attacks more powerful, requiring fewer traces to break a target. Unfortunately, to protect against such attacks, we still rely solely on methods developed to protect against generic...
conference paper 2022
document
Ewald, Vincentius (author), Sridaran Venkat, Ramanan (author), Asokkumar, Aadhik (author), Benedictus, R. (author), Boller, Christian (author), Groves, R.M. (author)
Predictive maintenance, as one of the core components of Industry 4.0, takes a proactive approach to maintain machines and systems in good order to keep downtime to a minimum and the airline maintenance industry is not an exception to this. To achieve this goal, practices in Structural Health Monitoring (SHM) complement the existing Non...
journal article 2021
document
Wu, L. (author), Perin, G. (author)
In recent years, the advent of deep neural networks opened new perspectives for security evaluations with side-channel analysis. Profiling attacks now benefit from capabilities offered by convolutional neural networks, such as dimensionality reduction and the inherent ability to reduce the trace desynchronization effects. These neural...
conference paper 2021
document
Wu, L. (author), Picek, S. (author)
In the profiled side-channel analysis, deep learning-based techniques proved to be very successful even when attacking targets protected with countermeasures. Still, there is no guarantee that deep learning attacks will always succeed. Various countermeasures make attacks significantly more complex, and such countermeasures can be further...
journal article 2020
document
Weissbart, L.J.A. (author), Chmielewski, Łukasz (author), Picek, S. (author), Batina, Lejla (author)
Profiling attacks, especially those based on machine learning, proved to be very successful techniques in recent years when considering the side-channel analysis of symmetric-key crypto implementations. At the same time, the results for implementations of asymmetric-key cryptosystems are very sparse. This paper considers several machine learning...
journal article 2020
document
Bonsignorio, Fabio (author), Hsu, David (author), Johnson-Roberson, Matthew (author), Kober, J. (author)
Deep learning has gone through massive growth in recent years. In many fields—computer vision, speech recognition, machine translation, game playing, and others—deep learning has brought unprecedented progress and become the method of choice. Will the same happen in robotics and automation? In a sense, it is already happening. Today, deep...
contribution to periodical 2020
document
Al-Rahbi, Mohammed (author)
Human Activity Recognition (HAR) is a key enabler of various applications, including smart homes, health care, Internet of Things (IoT), and virtual reality games. A large number of HAR systems are based on wearable sensors and computer vision. However, a challenge that has emerged in the last few years entails recognizing human activities using...
master thesis 2019
document
Paltrinieri, Nicola (author), Comfort, Louise (author), Reniers, G.L.L.M.E. (author)
Risk assessment has a primary role in safety-critical industries. However, it faces a series of overall challenges, partially related to technology advancements and increasing needs. There is currently a call for continuous risk assessment, improvement in learning past lessons and definition of techniques to process relevant data, which are...
journal article 2019
Searched for: subject%3A%22analysis%22
(1 - 16 of 16)