搜索结果: 1-15 共查到“channel”相关记录799条 . 查询时间(0.168 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Prandtl Boundary Layer in An Infinitely Long Convergent Channel
无穷长 收敛通道 Prandtl边界层
2023/11/7
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Some progress on steady Navier-Stokes system in a channel
通道 稳定 纳维-斯托克斯系统
2023/4/27
中国地质大学科学技术发展院童伟(硕士研究生),陈伟涛*,王力哲* 等,计算机学院. Journal of Selected Topics in Applied Earth Observations and Remote Sensing(2020). Channel-Attention-Based DenseNet Network for Remote Sensing Image Scene Classification
智能;获取;遥感敏感特征;遥感;场景分类;关键技术;瓶颈
2021/10/15
近日,对地观测领域国际重要期刊《Journal of Selected Topics in Applied Earth Observations and Remote Sensing》刊发了中国地质大学计算机学院遥感智能解译团队的研究成果——“Channel-Attention-Based DenseNet Network for Remote Sensing Image Scene Classi...
中国地质大学科学技术发展院唐厂 等,计算机学院. IEEE Transactions on Multimedia (2020), BR2Net: Defocus Blur Detection via a Bi-directional Channel Attention Residual Refining Network
双向;特征;通道;加权;残差;修正;神经网络;图像模糊
2021/10/15
2020年4月,多媒体领域顶级期刊《IEEE Transactions on Multimedia》刊发了中国地质大学计算机学院唐厂副教授与国防科技大学、京东AI研究院以及阿里巴巴达摩院合作完成的研究成果——BR2Net: Defocus Blur Detection via a Bi-directional Channel Attention Residual Refining Network ...
Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations
Side-Channel Attacks Security Evaluations Certification
2019/9/16
We take advantage of a recently published open source implementation of the AES protected with a mix of countermeasures against side-channel attacks to discuss both the challenges in protecting COTS d...
Deep Learning Model Generalization in Side-Channel Analysis
Side-Channel Analysis Deep Learning Model Generalization
2019/8/30
The adoption of deep neural networks for profiled side-channel attacks provides different capabilities for leakage detection of secure products. Research papers provide a variety of arguments with res...
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes
Lattice based cryptography side-channel attacks CCA transformation
2019/8/21
In this article, we demonstrate practical side-channel assisted chosen-ciphertext attacks (CCA) over multiple CCA-secure lattice-based public-key encryption schemes (PKE) and key-encapsulation mechani...
Machine learning and side channel analysis in a CTF competition
key recovery deep learning machine learning
2019/7/25
Machine learning is nowadays supplanting or extending human expertise in many domains ranging from board games to text translation. Correspondingly, the use of such tools is also on the rise in comput...
Stronger and Faster Side-Channel Protections for CSIDH
CSIDH Isogeny-based post-quantum cryptography key exchange
2019/7/22
CSIDH is a recent quantum-resistant primitive based on the difficulty of finding isogeny paths between supersingular curves. Recently, two constant-time versions of CSIDH have been proposed: first by ...
Optimal Collision Side-Channel Attacks
Side-channel analysis side-channel security evaluation collision attacks
2019/7/18
Collision side-channel attacks are efficient attacks against cryptographic implementations, however, optimal collision side-channel attacks and how to compute them efficiently is an open question. In ...
Optimal Collision Side-Channel Attacks
Side-channel analysis side-channel security evaluation collision attacks
2019/7/18
Collision side-channel attacks are efficient attacks against cryptographic implementations, however, optimal collision side-channel attacks and how to compute them efficiently is an open question. In ...
X-DeepSCA: Cross-Device Deep Learning Side Channel Attack
Side-channel Attacks Profiling attacks Cross-device Attack
2019/7/17
This article, for the first time, demonstrates Cross-device Deep Learning Side-Channel Attack (X-DeepSCA), achieving an accuracy of >99.9%>99.9%, even in presence of significantly higher inter-device ...
SKIVA: Flexible and Modular Side-channel and Fault Countermeasures
Bitslicing Side-channel attacks Fault attacks
2019/7/8
We describe SKIVA, a customized 32-bit processor enabling the design of software countermeasures for a broad range of implementation attacks covering fault injection and side-channel analysis of timin...
SPQCop: Side-channel protected Post-Quantum Cryptoprocessor
cryptography post-quantum key-exchange cryptoprocessor
2019/7/8
The past few decades have seen significant progress in practically realizable quantum technologies. It is well known since the work of Peter Shor that large scale quantum computers will threaten the s...
Neural Network Model Assessment for Side-Channel Analysis
Side-Channel Analysis Neural Networks Model Assessment
2019/6/19
Leakage assessment of cryptographic implementations with side-channel analysis relies on two important assumptions: leakage model and the number of side-channel traces. In the context of profiled side...