Skip to main content
TudRepo
Research repository
Education Repository
Cultural Heritage
About
·
How to search
·
How to upload
Include full text
Search results
Back
Searched for: +
(1 - 20 of 66)
Document type
Date
Pages
1
2
3
4
List view
Grid view
Print
Email
export CSV
export Excel
Ablation Analysis for Multi-device Deep Learning-based Physical Side-channel Analysis
On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight
Backdoor Pony: Evaluating backdoor attacks and defenses in different domains
SoK: Deep Learning-based Physical Side-channel Analysis
No (good) loss no gain: Systematic evaluation of loss functions in deep learning-based side-channel analysis
Rethinking the Trigger-injecting Position in Graph Backdoor Attack
Watermarking Graph Neural Networks based on Backdoor Attacks
FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning
Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions
Going in Style: Audio Backdoors Through Stylistic Transformations
Label Correlation in Deep Learning-Based Side-Channel Analysis
On the exponents of APN power functions and Sidon sets, SUM-free sets, and Dickson Polynomials
Modeling Strong Physically Unclonable Functions with Metaheuristics
The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-Based SCA
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers
The Best of Two Worlds: Deep Learning-assisted Template Attack
On the feasibility of crawling-based attacks against recommender systems
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand
NeuroSCA: Evolving Activation Functions for Side-Channel Analysis
The More You Know: Improving Laser Fault Injection with Prior Knowledge
Searched for: +
(1 - 20 of 66)
Document type
Date
Pages
1
2
3
4
List view
Grid view
Print
Email
export CSV
export Excel