|
|
|
Yoo-Jin Baek
With the growing threat of the side-channel attack (SCA) to the cryptographic algorithm?s implementations, the masking method has become one of the most promising SCA countermeasures for securely implementing, for example, block ciphers. The basic princi...
ver más
|
|
|
|
|
|
|
S. V. Shmakov
Pág. 38 - 41
The problem of reduction of the long-term traffic noise effect on the person in coach passenger spaces is examined. The method of solving the problem is offered. The corresponding calculations and analysis of results are performed. The functional diagram...
ver más
|
|
|
|
|
|
|
Xiangwei Mou, Yongfu Song, Rijun Wang, Yuanbin Tang and Yu Xin
In the research of Facial Expression Recognition (FER), the inter-class of facial expression data is not evenly distributed, the features extracted by networks are insufficient, and the FER accuracy and speed are relatively low for practical applications...
ver más
|
|
|
|
|
|
|
Weizhen Xu, Chenyi Zhang, Fangzhen Zhao and Liangda Fang
Adversarial attacks hamper the functionality and accuracy of deep neural networks (DNNs) by meddling with subtle perturbations to their inputs. In this work, we propose a new mask-based adversarial defense scheme (MAD) for DNNs to mitigate the negative e...
ver más
|
|
|
|
|
|
|
Durkhyun Cho, Jin Han Lee and Il Hong Suh
We live in an era of privacy concerns. As smart devices such as smartphones, service robots and surveillance cameras spread, preservation of our privacy becomes one of the major concerns in our daily life. Traditionally, the problem was resolved by simpl...
ver más
|
|
|
|
|
|
|
Jose Luis Vieira Sobrinho, Flavio Henrique Teles Vieira and Alisson Assis Cardoso
The high dimensionality of real-life datasets is one of the biggest challenges in the machine learning field. Due to the increased need for computational resources, the higher the dimension of the input data is, the more difficult the learning task will ...
ver más
|
|
|
|
|
|
|
Tao Jiang, Yize Sun, Hai Huang, Hongde Qin, Xi Chen, Lingyu Li, Zongyu Zhang and Xinyue Han
Autonomous underwater manipulation is very important for the robotic and intelligence operations of oceanic engineering. However, a small target often involves limited features and results in inaccurate visual matching. In order to improve visual measure...
ver más
|
|
|
|
|
|
|
Amit Rotem, Alexander Vidal, Katharina Pfaff, Luis Tenorio, Matthias Chung, Erik Tharalson and Thomas Monecke
Understanding the mineralogy and geochemistry of the subsurface is key when assessing and exploring for mineral deposits. To achieve this goal, rapid acquisition and accurate interpretation of drill core data are essential. Hyperspectral shortwave infrar...
ver más
|
|
|
|
|
|
|
Ali Akbar Kekha Javan, Assef Zare and Roohallah Alizadehsani
This study investigates multiple synchronizations of distributed fractional-order chaotic systems. These systems consider unknown parameters, disturbance, and time delays. A robust adaptive control method is designed for multistage distributed fractional...
ver más
|
|
|
|
|
|
|
Ali Akbar Kekha Javan, Assef Zare, Roohallah Alizadehsani and Saeed Balochian
This paper investigates the robust adaptive synchronization of multi-mode fractional-order chaotic systems (MMFOCS). To that end, synchronization was performed with unknown parameters, unknown time delays, the presence of disturbance, and uncertainty wit...
ver más
|
|
|
|
|
|
|
Steven Cooper and Christopher Chan
An issue exists around the world of wind farms that comply with permit conditions giving rise to noise complaints. Approval limits are normally expressed in A-weighted levels (dB(A)) external to residential receivers. The distance from the wind farm to r...
ver más
|
|
|
|
|
|
|
Vitalii Yesin, Mikolaj Karpinski, Maryna Yesina, Vladyslav Vilihura and Kornel Warwas
The objective of the article is to reveal an approach to hiding the code of stored programs stored in the database. The essence of this approach is the complex use of the method of random permutation of code symbols related to a specific stored program, ...
ver más
|
|
|
|
|
|
|
Widodo, Eko Kuswardono Budiardjo and Wahyu Catur Wibowo
Investigation into privacy preserving data publishing with multiple sensitive attributes is performed to reduce probability of adversaries to guess the sensitive values. Masking the sensitive values is usually performed by anonymizing data by using gener...
ver más
|
|
|
|
|
|
|
Esmaeil Zahedi, Mohamad Saraee, Fatemeh Sadat Masoumi and Mohsen Yazdinejad
Unsupervised anomalous sound detection, especially self-supervised methods, plays a crucial role in differentiating unknown abnormal sounds of machines from normal sounds. Self-supervised learning can be divided into two main categories: Generative and C...
ver más
|
|
|
|
|
|
|
Jigang Wang, Liang Chen and Rui Wang
In the actual operation of the machine, due to a large number of operating conditions and a wide range of operating conditions, the data under many operating conditions cannot be obtained. However, the different data distributions between different opera...
ver más
|
|
|
|
|
|
|
Erica Corradini, Stefan Dreibrodt, Ercan Erkul, Daniel Groß, Harald Lübke, Diana Panning, Natalie Pickartz, Martin Thorwart, Andreas Vött, Timo Willershäuser, Dennis Wilken, Tina Wunderlich, Marco Zanon and Wolfgang Rabbel
We present a case study of a bog showing how an integrated approach of multi-method geophysical sounding and local soil sampling can be used to identify, differentiate, and map organic sediments. Our study is based on ground-penetrating radar (GPR), elec...
ver más
|
|
|
|
|
|
|
Umberto Iemma
The advent, during the first decade of the 21st century, of the concept of acoustic metamaterial has disclosed an incredible potential of development for breakthrough technologies. Unfortunately, the extension of the same concepts to aeroacoustics has tu...
ver más
|
|
|
|
|
|
|
Alvin Lee, Suet-Peng Yong, Witold Pedrycz and Junzo Watada
Drones play a pivotal role in various industries of Industry 4.0. For achieving the application of drones in a dynamic environment, finding a clear path for their autonomous flight requires more research. This paper addresses the problem of finding a nav...
ver más
|
|
|
|
|
|
|
Shiqian Guo, Yansun Huang, Baohua Huang, Linda Yang and Cong Zhou
This paper proposed a method for improving the XLNet model to address the shortcomings of segmentation algorithm for processing Chinese language, such as long sub-word lengths, long word lists and incomplete word list coverage. To address these issues, w...
ver más
|
|
|
|
|
|
|
Raz Lapid, Zvika Haramaty and Moshe Sipper
Deep neural networks (DNNs) are sensitive to adversarial data in a variety of scenarios, including the black-box scenario, where the attacker is only allowed to query the trained model and receive an output. Existing black-box methods for creating advers...
ver más
|
|
|
|