Treffer 1 - 20 von 121.515

1

Indiscriminate disruption of conditional inference on multivariate Gaussians
William N. Caballero ; Matthew LaRosa ; Alexander A. Fisher ; et al.
European Journal of Operational Research. 327:191-202

FOS: Computer and inform... Computer Science - Machi... Computer Science - Crypt... Statistics - Machine Lea... Machine Learning (stat.M... Applications (stat.AP)
Fachzeitschrift
Zu den Favoriten
2

Chameleon: An Efficient FHE Scheme Switching Acceleration on GPUs
Zhiwei Wang ; Haoqi He ; Lutan Zhao ; et al.
IEEE Transactions on Parallel and Distributed Systems. 36:2264-2280

FOS: Computer and inform... Computer Science - Crypt... Cryptography and Securit...
Fachzeitschrift
Zu den Favoriten
3

On Non-Interactive Simulation of Distributed Sources With Finite Alphabets
Hojat Allah Salehi ; Farhad Shirani
IEEE Transactions on Information Theory. 71:8048-8079

Computer Science - Crypt... Computer Science - Infor... Electrical Engineering a... Mathematics - Probabilit...
Fachzeitschrift
Zu den Favoriten
4

Privacy Bills of Materials (PriBOM): A Transparent Privacy Information Inventory for Collaborative Privacy Notice Generation in Mobile App Development
Tao, Zhen ; Pan, Shidong ; Xing, Zhenchang ; et al.
Proceedings on Privacy Enhancing Technologies. 2025:392-409

Software Engineering (cs... FOS: Computer and inform... Computer Science - Softw... Computer Science - Crypt... Cryptography and Securit...
Fachzeitschrift
Zu den Favoriten
5

Generative AI-Driven Cross-Layer Covert Communication: Fundamentals, Framework, and Case Study
Liu, Tianhao ; Liu, Jiqiang ; Zhang, Tao ; et al.
IEEE Communications Magazine. 63:128-134

Computer Science - Crypt...
Fachzeitschrift
Zu den Favoriten
6

Unveiling Client Privacy Leakage from Public Dataset Usage in Federated Distillation
Shi, Haonan ; Ouyang, Tu ; Wang, An
Proceedings on Privacy Enhancing Technologies. 2025:201-215

FOS: Computer and inform... Computer Science - Machi... Computer Science - Crypt... Cryptography and Securit... Machine Learning (cs.LG)
Fachzeitschrift
Zu den Favoriten
7

ICMarks: A Robust Watermarking Framework for Integrated Circuit Physical Design IP Protection
Ruisi Zhang ; Rachel Selina Rajarathnam ; David Z. Pan ; et al.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 44:3910-3923

FOS: Computer and inform... Computer Science - Crypt... Hardware Architecture (c... Computer Science - Hardw... Cryptography and Securit...
Fachzeitschrift
Zu den Favoriten
8

TeleSparse: Practical Privacy-Preserving Verification of Deep Neural Networks
Maheri, Mohammad M ; Haddadi, Hamed ; Davidson, Alex
Proceedings on Privacy Enhancing Technologies. 2025:861-880

FOS: Computer and inform... Computer Science - Machi... Computer Science - Crypt... Artificial Intelligence... Computer Science - Artif... Cryptography and Securit...
Fachzeitschrift
Zu den Favoriten
9

SignCRF: Scalable Channel-Agnostic Data-Driven Radio Authentication System
Amani Al-Shawabka ; Philip Pietraski ; Sudhir B Pattar ; et al.
IEEE Transactions on Mobile Computing. 24:9383-9394

Computer Science - Netwo... Networking and Internet... FOS: Computer and inform... Computer Science - Machi... Computer Science - Crypt... Artificial Intelligence...
Fachzeitschrift
Zu den Favoriten
10

Compressed Private Aggregation for Scalable and Robust Federated Learning Over Massive Networks
Natalie Lang ; Nir Shlezinger ; Rafael G. L. D’Oliveira ; et al.
IEEE Transactions on Mobile Computing. 24:9934-9950

FOS: Computer and inform... Computer Science - Crypt... Cryptography and Securit...
Fachzeitschrift
Zu den Favoriten
11

RV-CURE: A RISC-V Capability Architecture for Full Memory Safety
Yonghae Kim ; Anurag Kar ; Jaewon Lee ; et al.
IEEE Transactions on Computers. 74:3291-3304

FOS: Computer and inform... Computer Science - Crypt... Hardware Architecture (c... Computer Science - Hardw... Cryptography and Securit...
Fachzeitschrift
Zu den Favoriten
12

Blockchain-Empowered Federated Learning: Benefits, Challenges, and Solutions
Zeju Cai ; Jianguo Chen ; Yuting Fan ; et al.
IEEE Transactions on Big Data. 11:2244-2263

FOS: Computer and inform... Computer Science - Machi... Computer Science - Crypt... Cryptography and Securit... Machine Learning (cs.LG)
Fachzeitschrift
Zu den Favoriten
13

Cross-Layer Encrypted Semantic Communication Framework for Panoramic Video Transmission
Haixiao Gao ; Mengying Sun ; Xiaodong Xu ; et al.
IEEE Internet of Things Journal. 12:40545-40562

FOS: Computer and inform... Computer Science - Crypt... Image and Video Processi... FOS: Electrical engineer... Electrical Engineering a... Cryptography and Securit...
Fachzeitschrift
Zu den Favoriten
14

JailbreakLens: Visual Analysis of Jailbreak Attacks Against Large Language Models
Yingchaojie Feng ; Zhizhang Chen ; Zhining Kang ; et al.
IEEE Transactions on Visualization and Computer Graphics. 31:8668-8682

FOS: Computer and inform... Computer Science - Crypt... Computer Science - Compu... Computer Science - Human... Cryptography and Securit... Computation and Language...
Fachzeitschrift
Zu den Favoriten
15

Use of simple arithmetic operations to construct efficiently implementable Boolean functions possessing high nonlinearity and good resistance to algebraic attacks
Claude Carlet ; Palash Sarkar
Discrete Applied Mathematics. 373:256-270

FOS: Computer and inform... Computer Science - Crypt... Cryptography and Securit...
Fachzeitschrift
Zu den Favoriten
16

Hypersphere Secure Sketch Revisited: Probabilistic Linear Regression Attack on IronMask in Multiple Usage
Zhu, Pengxu ; Wang, Lei
Proceedings on Privacy Enhancing Technologies. 2025:728-744

FOS: Computer and inform... Computer Science - Crypt... Computer Vision and Patt... Computer Science - Compu... Cryptography and Securit...
Fachzeitschrift
Zu den Favoriten
17

An LLM-Based Self-Evolving Security Framework for 6G Space-Air-Ground Integrated Networks
Qin, Qi ; Cao, Xinye ; Nan, Guoshun ; et al.
IEEE Communications Magazine. 63:110-116

FOS: Computer and inform... Computer Science - Crypt... Cryptography and Securit...
Fachzeitschrift
Zu den Favoriten
18

TeeRollup: Efficient Rollup Design Using Heterogeneous TEE
Xiaoqing Wen ; Quanbi Feng ; Hanzheng Lyu ; et al.
IEEE Transactions on Computers. 74:3546-3558

FOS: Computer and inform... Computer Science - Crypt... Cryptography and Securit...
Fachzeitschrift
Zu den Favoriten
19

SimProcess: High Fidelity Simulation of Noisy ICS Physical Processes
Denis Donadel ; Gabriele Crestanello ; Giulio Morandini ; et al.
Proceedings of the 11th ACM Cyber-Physical System Security Workshop. :6-18

Industrial Control Syste... FOS: Computer and inform... Computer Science - Machi... Power grid Computer Science - Crypt... Honeypot
Fachzeitschrift
Zu den Favoriten
20

Ruling the Unruly: Designing Effective, Low-Noise Network Intrusion Detection Rules for Security Operations Centers: Designing Effective, Low-Noise Network Intrusion Detection Rules for Security Operations Centers
Koen T. W. Teuwen ; Tom Mulders ; Emmanuele Zambon ; et al.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security. :1428-1441

Computer Science - Netwo... Networking and Internet... FOS: Computer and inform... rechtvaardigheid en ster... SDG 16 - Peace Computer Science - Crypt...
Fachzeitschrift
Zu den Favoriten

Filter