Skip to main content
TudRepo
Research repository
Education Repository
Cultural Heritage
About
·
How to search
·
How to upload
Include full text
Search results
Back
Searched for: +
(1 - 7 of 7)
Document type
Date
List view
Grid view
Print
Email
export CSV
export Excel
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay
DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints
A Reconfigurable Cold-Startup SSHI Rectifier with 4X Lower Input Amplitude Requirement for Piezoelectric Energy Harvesting
A PV-assisted 10-mV Startup Boost Converter for Thermoelectric Energy Harvesting
Your Smart Contracts Are Not Secure: Investigating Arbitrageurs and Oracle Manipulators in Ethereum
VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents
No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent
Searched for: +
(1 - 7 of 7)
Document type
Date
List view
Grid view
Print
Email
export CSV
export Excel