Search alternatives:
"generate" » "generated" (Expand Search), "general" (Expand Search)
Showing 1 - 20 results of 95,060 for search '"generate"', query time: 0.27s Refine Results
  1. 1
  2. 2
  3. 3

    An efficient method to generate elliptic curves by ZHOU Chang-ying1, Kwok-Yan-Lam1, ZHOU Zheng-ou2

    Published 2001-01-01
    Subjects: “…public key cryptosystem;elliptic curve generation…”
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    An Algorithm to Automatically Generate the Combinatorial Orbit Counting Equations. by Ine Melckenbeeck, Pieter Audenaert, Tom Michoel, Didier Colle, Mario Pickavet

    Published 2016-01-01
    “…The first allows to generate the equations needed in an automatic way. …”
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Générations démographiques, générations familiales by Daniel Devolder

    Published 2004-06-01
    “…Demographers can help define the concept of generation, and specifically why people feel they belong to a group based on their age. …”
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Method to generate cyber deception traffic based on adversarial sample by Yongjin HU, Yuanbo GUO, Jun MA, Han ZHANG, Xiuqing MAO

    Published 2020-09-01
    “…In order to prevent attacker traffic classification attacks,a method for generating deception traffic based on adversarial samples from the perspective of the defender was proposed.By adding perturbation to the normal network traffic,an adversarial sample of deception traffic was formed,so that an attacker could make a misclassification when implementing a traffic analysis attack based on a deep learning model,achieving deception effect by causing the attacker to consume time and energy.Several different methods for crafting perturbation were used to generate adversarial samples of deception traffic,and the LeNet-5 deep convolutional neural network was selected as a traffic classification model for attackers to deceive.The effectiveness of the proposed method is verified by experiments,which provides a new method for network traffic obfuscation and deception.…”
    Get full text
    Article