-
141
PK-Judge: Enhancing IP Protection of Neural Network Models Using an Asymmetric Approach
Published 2025-03-01“…Unlike symmetric approaches, PK-Judge employs a public key infrastructure (PKI) to decouple ownership validation from the extraction process, significantly increasing its resilience against adversarial attacks. Additionally, it incorporates a robust challenge-response mechanism to mitigate replay attacks and leverages error correction codes (ECC) to achieve an Effective Bit Error Rate (EBER) of zero, ensuring watermark integrity even under conditions such as fine-tuning, pruning, and overwriting. …”
Get full text
Article -
142
An Analytical Model for Dynamic Spectrum Sensing in Cognitive Radio Networks Using Blockchain Management
Published 2024-01-01Get full text
Article -
143
Adversarial Sample Generation Method Based on Frequency Domain Transformation and Channel Awareness
Published 2025-06-01“…The experimental results show that SDRNet is superior to traditional algorithms (such as the least square method, minimum mean square error estimation, etc.) in both mean square error and bit error rate. …”
Get full text
Article -
144
Tactical and statistical analysis of spiking efficiency by type, zone and set phase in women's volleyball
Published 2025-08-01“…Tip shots had the lowest efficiency (EI = 0.22) but the highest continuation rate (61%). Side zone attacks exhibited higher kill rates (25.2%) and efficiency (EI = 0.227) than central zone attacks (14.1% kill rate, EI = 0.106). …”
Get full text
Article -
145
Benchmarking Spiking Neural Network Learning Methods With Varying Locality
Published 2025-01-01Get full text
Article -
146
CoPaD-Mark: A Coded Parallelizable Deep Learning-Based Scheme for Robust Image Watermarking
Published 2025-01-01“…The information bits embedded in the image are derived from the parity bits of an error-correcting code. This code’s message is constructed by combining a chaotic binary sequence with the original watermark bits. …”
Get full text
Article -
147
Demand-Driven Resilient Control for Generation Unit of Local Power Plant Under Unreliable Communication
Published 2025-01-01“…The closed-loop performance is analyzed for the GU system in the input-to-state stable framework with or without attack. According to the DoS attack model, which is described by the assumptions of frequency and duration, the conservativeness of the tolerable DoS attack index is reduced by using the thought of robustness to the maximum disturbance-induced error. …”
Get full text
Article -
148
Verification of color characteristics of document images captured in uncontrolled conditions
Published 2024-08-01“…This paper examines a presentation attack when a color photo of a gray copy of a document is presented instead of the original color document during remote user identification. …”
Get full text
Article -
149
Machine Learning Approach to Aerodynamic Analysis of NACA0005 Airfoil: ANN and CFD Integration
Published 2025-01-01“…Data generated by computational fluid dynamics (CFD) is used to train the model for Reynolds numbers <inline-formula> <tex-math notation="LaTeX">$Re \in [{1000-5000}]$ </tex-math></inline-formula> and angles of attack ranging from 9° to 11°. A robust Scaled Conjugate Gradient (SCG) algorithm is employed for efficient training of data. …”
Get full text
Article -
150
Optimizing Solid Oxide Fuel Cell Performance Using Advanced Meta-Heuristic Algorithms
Published 2024-06-01“…The models are evaluated against a comprehensive set of performance metrics: Root Mean Square Error (RMSE), Mean Squared Error (MSE), coefficient of determination (R²), correlation coefficient (R), Mean Absolute Error (MAE), Relative Absolute Error (RAE), Squared Error (SE), Mean Absolute Percentage Error (MAPE), and Normalized Mean Squared Error (NMSE). …”
Get full text
Article -
151
Information Theoretic Analysis of PUF-Based Tamper Protection
Published 2025-03-01“…We apply zero leakage output quantization to existing quantization schemes and minimize the reconstruction error probability under zero leakage. We apply wiretap coding within a helper data algorithm to enable a reliable key reconstruction for the legitimate user while guaranteeing a selectable reconstruction complexity for an attacker, analogously to the security level for a cryptographic algorithm for the attacker models considered in this work. …”
Get full text
Article -
152
Acute hepatic porphyrias for the neurologist: current concepts and perspectives
Published 2021-01-01“…ABSTRACT Background: Acute hepatic porphyrias represent an expanding group of complex inherited metabolic disorders due to inborn errors of metabolism involving heme biosynthesis. …”
Get full text
Article -
153
Reversible Adversarial Examples with Minimalist Evolution for Recognition Control in Computer Vision
Published 2025-01-01“…To achieve zero-bit error restoration, we utilize the differential evolution algorithm to optimize adversarial perturbations while minimizing distortion. …”
Get full text
Article -
154
Enhancing Secure Medical Data Communication Through Integration of LSB and DCT for Robust Analysis in Image Steganography
Published 2025-01-01“…The overall analysis of proposed work significantly improves result in terms of the security and robustness under various attacks.…”
Get full text
Article -
155
A compact public key encryption with equality test for lattice in cloud computing
Published 2025-07-01“…With those efforts, our scheme can withstand the chosen ciphertext attacks as long as the learning with errors (LWE) assumption holds. …”
Get full text
Article -
156
Anti-Jamming RIS Communications Using DQN-Based Algorithm
Published 2022-01-01“…As a result, the optimal resource allocation is achieved through trial-and-error interactions with environment by observing the predefined rewards and the network state transition. …”
Get full text
Article -
157
False data intrusion detection method for power grid based on deep machine learning
Published 2025-06-01“…False data injection attacks (FDIAs) are obtained by continuously adding error measurement vectors in PMU to judge whether the power grid has been attacked by false information and predict the location value of possible attacks. …”
Get full text
Article -
158
Estimation of Fractal Dimension and Detection of Fake Finger-Vein Images for Finger-Vein Recognition
Published 2024-10-01“…Furthermore, experiments conducted with the proposed spoof detector yielded average classification error rates of 0.4% and 0.12% on the two aforementioned open databases, respectively, outperforming existing SOTA methods for spoof detection.…”
Get full text
Article -
159
CFD-Modeling of the Airfoil of the Blades of a Wind Power Plant with a Vertical Axis in the Ansys Fluent System
Published 2024-04-01“…In assessing the compatibility of the model and the experimental results of the DU-06-W-200 airfoil, the conformity criterion χ2, root mean square error (RMSE), coefficient of determination (R2), and average bias error (ABE) were used. …”
Get full text
Article -
160
Controllable Blind AC FDIA via Physics-Informed Extrapolative AVAE
Published 2025-02-01“…Current machine learning-based approaches struggle to effectively control state estimation errors and are confined to the data distribution of training sets. …”
Get full text
Article