Networks and Security
11 – 20 of 261
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
CCA Security with Short AEAD Tags
- Contribution to journal › Article
-
Mark
Scalable Intelligent Traffic Balancing: Advancing Efficiency, Safety, and Sustainability in Urban Transportation Through Machine Learning and AIM Integration
(2024) 2023 IEEE Global Conference on Artificial Intelligence and Internet of Things, GCAIoT
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Interpretable machine learning for predicting the fate and transport of pentachlorophenol in groundwater
- Contribution to journal › Article
-
Mark
Non-Fungible Tokens as a Framework for Sustainable Innovation in Pharmaceutical R&D: A Smart Contract-Based Platform for Data Sharing and Rightsholder Protection
- Contribution to journal › Article
-
Mark
Impact of Positioning Uncertainty on Autonomous Intersection Management System
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Scheduling of Industrial Control Traffic for Dynamic RAN Slicing with Distributed Massive MIMO †
- Contribution to journal › Article
-
Mark
Resilient Cloud Control System: Dynamic Frequency Adaptation via Q-learning
(2024) 27th Conference on Innovation in Clouds, Internet and Networks, ICIN
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
LightFF: Lightweight Inference for Forward-Forward Algorithm
(2024) 27th European Conference on Artificial Intelligence, ECAI-2024 In Frontiers in Artificial Intelligence and Applications 392. p.1728-1735
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
