Zeitschriftenartikel zum Thema „Code-based masking“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Code-based masking" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Xiao, Yisheng, Ruiyang Xu, Lijun Wu, Juntao Li, Tao Qin, Tie-Yan Liu und Min Zhang. „AMOM: Adaptive Masking over Masking for Conditional Masked Language Model“. Proceedings of the AAAI Conference on Artificial Intelligence 37, Nr. 11 (26.06.2023): 13789–97. http://dx.doi.org/10.1609/aaai.v37i11.26615.
Der volle Inhalt der QuelleCarlet, Claude, Abderrahman Daif, Sylvain Guilley und Cédric Tavernier. „Quasi-linear masking against SCA and FIA, with cost amortization“. IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, Nr. 1 (04.12.2023): 398–432. http://dx.doi.org/10.46586/tches.v2024.i1.398-432.
Der volle Inhalt der QuelleLevina, Alla, und Gleb Ryaskin. „Robust Code Constructions Based on Bent Functions and Spline Wavelet Decomposition“. Mathematics 10, Nr. 18 (12.09.2022): 3305. http://dx.doi.org/10.3390/math10183305.
Der volle Inhalt der QuelleWang, Weijia, Yu Yu und Francois-Xavier Standaert. „Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations“. IEEE Transactions on Information Forensics and Security 14, Nr. 11 (November 2019): 3069–82. http://dx.doi.org/10.1109/tifs.2019.2912549.
Der volle Inhalt der QuelleGoy, Guillaume, Julien Maillard, Philippe Gaborit und Antoine Loiseau. „Single trace HQC shared key recovery with SASCA“. IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, Nr. 2 (12.03.2024): 64–87. http://dx.doi.org/10.46586/tches.v2024.i2.64-87.
Der volle Inhalt der QuelleYao, Xincheng, Chongyang Zhang, Ruoqi Li, Jun Sun und Zhenyu Liu. „One-for-All: Proposal Masked Cross-Class Anomaly Detection“. Proceedings of the AAAI Conference on Artificial Intelligence 37, Nr. 4 (26.06.2023): 4792–800. http://dx.doi.org/10.1609/aaai.v37i4.25604.
Der volle Inhalt der QuelleBurke, Colin J., Patrick D. Aleo, Yu-Ching Chen, Xin Liu, John R. Peterson, Glenn H. Sembroski und Joshua Yao-Yu Lin. „Deblending and classifying astronomical sources with Mask R-CNN deep learning“. Monthly Notices of the Royal Astronomical Society 490, Nr. 3 (10.10.2019): 3952–65. http://dx.doi.org/10.1093/mnras/stz2845.
Der volle Inhalt der QuelleZhu, Fengmin, Michael Sammler, Rodolphe Lepigre, Derek Dreyer und Deepak Garg. „BFF: foundational and automated verification of bitfield-manipulating programs“. Proceedings of the ACM on Programming Languages 6, OOPSLA2 (31.10.2022): 1613–38. http://dx.doi.org/10.1145/3563345.
Der volle Inhalt der QuelleChen, Ying, Rebekah Wu, James Felton, David M. Rocke und Anu Chakicherla. „A Method to Detect Differential Gene Expression in Cross-Species Hybridization Experiments at Gene and Probe Level“. Biomedical Informatics Insights 3 (Januar 2010): BII.S3846. http://dx.doi.org/10.4137/bii.s3846.
Der volle Inhalt der QuelleHarrington, J. Patrick. „Polarized Continuum Radiation from Stellar Atmospheres“. Proceedings of the International Astronomical Union 10, S305 (Dezember 2014): 395–400. http://dx.doi.org/10.1017/s1743921315005116.
Der volle Inhalt der QuelleMak, Lesley, und Pooya Taheri. „An Automated Tool for Upgrading Fortran Codes“. Software 1, Nr. 3 (13.08.2022): 299–315. http://dx.doi.org/10.3390/software1030014.
Der volle Inhalt der QuelleLiva, Gianluigi, Shumei Song, Lan Lan, Yifei Zhang, Shu Lin und William E. Ryan. „Design of LDPC Codes: A Survey and New Results“. Journal of Communications Software and Systems 2, Nr. 3 (05.04.2017): 191. http://dx.doi.org/10.24138/jcomss.v2i3.283.
Der volle Inhalt der QuelleLiu, Yongxu, Yinghui Quan, Guoyao Xiao, Aobo Li und Jinjian Wu. „Scaling and Masking: A New Paradigm of Data Sampling for Image and Video Quality Assessment“. Proceedings of the AAAI Conference on Artificial Intelligence 38, Nr. 4 (24.03.2024): 3792–801. http://dx.doi.org/10.1609/aaai.v38i4.28170.
Der volle Inhalt der QuelleLi, Daixun, Weiying Xie, Jiaqing Zhang und Yunsong Li. „MDFL: Multi-Domain Diffusion-Driven Feature Learning“. Proceedings of the AAAI Conference on Artificial Intelligence 38, Nr. 8 (24.03.2024): 8653–60. http://dx.doi.org/10.1609/aaai.v38i8.28710.
Der volle Inhalt der QuelleVakulenko, S. P., N. K. Volosova und D. F. Pastukhov. „METHODS OF QR CODE TRANSMISSION IN COMPUTER STEGANOGRAPHY“. World of Transport and Transportation 16, Nr. 5 (28.10.2018): 14–25. http://dx.doi.org/10.30932/1992-3252-2018-16-5-2.
Der volle Inhalt der QuelleSemenova, Elizaveta, Maria Luisa Guerriero, Bairu Zhang, Andreas Hock, Philip Hopcroft, Ganesh Kadamur, Avid M. Afzal und Stanley E. Lazic. „Flexible Fitting of PROTAC Concentration–Response Curves with Changepoint Gaussian Processes“. SLAS DISCOVERY: Advancing the Science of Drug Discovery 26, Nr. 9 (20.09.2021): 1212–24. http://dx.doi.org/10.1177/24725552211028142.
Der volle Inhalt der QuelleKurtin, Danielle L., Daniel A. J. Parsons und Scott M. Stagg. „VTES: a stochastic Python-based tool to simulate viral transmission“. F1000Research 9 (05.10.2020): 1198. http://dx.doi.org/10.12688/f1000research.26786.1.
Der volle Inhalt der QuelleCui, Jianming, Wenxiu Kong, Xiaojun Zhang, Da Chen und Qingtian Zeng. „DLSTM-Based Successive Cancellation Flipping Decoder for Short Polar Codes“. Entropy 23, Nr. 7 (06.07.2021): 863. http://dx.doi.org/10.3390/e23070863.
Der volle Inhalt der QuelleSinex, D. G., und D. C. Havey. „Neural mechanisms of tone-on-tone masking: patterns of discharge rate and discharge synchrony related to rates of spontaneous discharge in the chinchilla auditory nerve“. Journal of Neurophysiology 56, Nr. 6 (01.12.1986): 1763–80. http://dx.doi.org/10.1152/jn.1986.56.6.1763.
Der volle Inhalt der QuelleWang, Liang, Xiang Tao, Qiang Liu, Shu Wu und Liang Wang. „Rethinking Graph Masked Autoencoders through Alignment and Uniformity“. Proceedings of the AAAI Conference on Artificial Intelligence 38, Nr. 14 (24.03.2024): 15528–36. http://dx.doi.org/10.1609/aaai.v38i14.29479.
Der volle Inhalt der QuelleWu, Cong, Xiao-Jun Wu, Josef Kittler, Tianyang Xu, Sara Ahmed, Muhammad Awais und Zhenhua Feng. „SCD-Net: Spatiotemporal Clues Disentanglement Network for Self-Supervised Skeleton-Based Action Recognition“. Proceedings of the AAAI Conference on Artificial Intelligence 38, Nr. 6 (24.03.2024): 5949–57. http://dx.doi.org/10.1609/aaai.v38i6.28409.
Der volle Inhalt der QuelleThompson, William, Jensen Lawrence, Dori Blakely, Christian Marois, Jason Wang, Mosé Giordano, Timothy Brandt et al. „Octofitter: Fast, Flexible, and Accurate Orbit Modeling to Detect Exoplanets“. Astronomical Journal 166, Nr. 4 (20.09.2023): 164. http://dx.doi.org/10.3847/1538-3881/acf5cc.
Der volle Inhalt der QuelleZhao, Zhuoran, Jinbin Bai, Delong Chen, Debang Wang und Yubo Pan. „Taming Diffusion Models for Music-Driven Conducting Motion Generation“. Proceedings of the AAAI Symposium Series 1, Nr. 1 (03.10.2023): 40–44. http://dx.doi.org/10.1609/aaaiss.v1i1.27474.
Der volle Inhalt der QuelleZhang, Nan, Liam O’Neill, Gautam Das, Xiuzhen Cheng und Heng Huang. „No Silver Bullet“. International Journal of Healthcare Information Systems and Informatics 7, Nr. 4 (Oktober 2012): 48–58. http://dx.doi.org/10.4018/jhisi.2012100104.
Der volle Inhalt der QuelleZeng, Fan-Gang, Ying-Yee Kong, Henry J. Michalewski und Arnold Starr. „Perceptual Consequences of Disrupted Auditory Nerve Activity“. Journal of Neurophysiology 93, Nr. 6 (Juni 2005): 3050–63. http://dx.doi.org/10.1152/jn.00985.2004.
Der volle Inhalt der QuelleNechaeva, Anastasia L. „<i>Otherness</i> as Basis of Artistic Chronotope: Script vs. Film“. SibScript 25, Nr. 4 (28.09.2023): 567–76. http://dx.doi.org/10.21603/sibscript-2023-25-4-567-576.
Der volle Inhalt der QuelleLin, Zhiwei, Yongtao Wang, Shengxiang Qi, Nan Dong und Ming-Hsuan Yang. „BEV-MAE: Bird’s Eye View Masked Autoencoders for Point Cloud Pre-training in Autonomous Driving Scenarios“. Proceedings of the AAAI Conference on Artificial Intelligence 38, Nr. 4 (24.03.2024): 3531–39. http://dx.doi.org/10.1609/aaai.v38i4.28141.
Der volle Inhalt der QuelleFan, Deng-Ping, Ziling Huang, Peng Zheng, Hong Liu, Xuebin Qin und Luc Van Gool. „Facial-sketch Synthesis: A New Challenge“. Machine Intelligence Research 19, Nr. 4 (30.07.2022): 257–87. http://dx.doi.org/10.1007/s11633-022-1349-9.
Der volle Inhalt der QuelleZhao, Jianwei, Qiang Zhai, Pengbo Zhao, Rui Huang und Hong Cheng. „Co-Visual Pattern-Augmented Generative Transformer Learning for Automobile Geo-Localization“. Remote Sensing 15, Nr. 9 (22.04.2023): 2221. http://dx.doi.org/10.3390/rs15092221.
Der volle Inhalt der QuelleChayka, Larysa. „STRUCTURE AND DYNAMICS OF VERBAL CONFLICT SITUATION (BASED ON THE ENGLISH LANGUAGE DISCOURSE)“. Odessa Linguistic Journal, Nr. 12 (2018): 39–46. http://dx.doi.org/10.32837/2312-3192/12/6.
Der volle Inhalt der QuelleLin, Yuqi, Minghao Chen, Kaipeng Zhang, Hengjia Li, Mingming Li, Zheng Yang, Dongqin Lv, Binbin Lin, Haifeng Liu und Deng Cai. „TagCLIP: A Local-to-Global Framework to Enhance Open-Vocabulary Multi-Label Classification of CLIP without Training“. Proceedings of the AAAI Conference on Artificial Intelligence 38, Nr. 4 (24.03.2024): 3513–21. http://dx.doi.org/10.1609/aaai.v38i4.28139.
Der volle Inhalt der QuelleTsmots, I. G., V. M. Teslyuk, Yu V. Opotiak und I. V. Pikh. „MODELS AND TOOLS FOR DEBUGGING AND TESTING MOBILE SYSTEMS FOR NEURO-LIKE CRYPTOGRAPHIC PROTECTION OF DATA TRANSMISSION“. Ukrainian Journal of Information Technology 4, Nr. 2 (2022): 45–55. http://dx.doi.org/10.23939/ujit2022.02.045.
Der volle Inhalt der QuelleCayuso, Juan, Richard Bloch, Selim C. Hotinli, Matthew C. Johnson und Fiona McCarthy. „Velocity reconstruction with the cosmic microwave background and galaxy surveys“. Journal of Cosmology and Astroparticle Physics 2023, Nr. 02 (01.02.2023): 051. http://dx.doi.org/10.1088/1475-7516/2023/02/051.
Der volle Inhalt der QuelleKonduri, Raja Rajeswari, Nagireddi Roopavathi, Balantrapu Vijaya Lakshmi und Putrevu Venkata Krishna Chaitanya. „Mitigating Peak Sidelobe Levels in Pulse Compression Radar using Artificial Neural Networks“. Indian Journal of Artificial Intelligence and Neural Networking 3, Nr. 6 (30.03.2024): 12–20. http://dx.doi.org/10.54105/ijainn.f9517.03061023.
Der volle Inhalt der QuelleMarin, Maximillian, Roger Vargas, Michael Harris, Brendan Jeffrey, L. Elaine Epperson, David Durbin, Michael Strong et al. „Benchmarking the empirical accuracy of short-read sequencing across the M. tuberculosis genome“. Bioinformatics 38, Nr. 7 (10.01.2022): 1781–87. http://dx.doi.org/10.1093/bioinformatics/btac023.
Der volle Inhalt der QuelleDreifeld, O. V. „Pragmatic and Semantic Analysis of Anti-War Protest Utterances (on the Data of Public Opinion Discourse in the Spring of 2022 in Russia)“. Discourse 9, Nr. 6 (21.12.2023): 116–27. http://dx.doi.org/10.32603/2412-8562-2023-9-6-116-127.
Der volle Inhalt der QuelleRognes, Torbjørn, Tomáš Flouri, Ben Nichols, Christopher Quince und Frédéric Mahé. „VSEARCH: a versatile open source tool for metagenomics“. PeerJ 4 (18.10.2016): e2584. http://dx.doi.org/10.7717/peerj.2584.
Der volle Inhalt der QuelleHan, Changho, Youngjae Song, Hong-Seok Lim, Yunwon Tae, Jong-Hwan Jang, Byeong Tak Lee, Yeha Lee, Woong Bae und Dukyong Yoon. „Automated Detection of Acute Myocardial Infarction Using Asynchronous Electrocardiogram Signals—Preview of Implementing Artificial Intelligence With Multichannel Electrocardiographs Obtained From Smartwatches: Retrospective Study“. Journal of Medical Internet Research 23, Nr. 9 (10.09.2021): e31129. http://dx.doi.org/10.2196/31129.
Der volle Inhalt der QuelleStratonov, Vasyl. „"Computer crimes": some features and characteristics“. Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 2, Nr. 2 (03.06.2020): 134–41. http://dx.doi.org/10.31733/2078-3566-2020-2-134-141.
Der volle Inhalt der QuelleZhang, Liang, Jinsong Su, Zijun Min, Zhongjian Miao, Qingguo Hu, Biao Fu, Xiaodong Shi und Yidong Chen. „Exploring Self-Distillation Based Relational Reasoning Training for Document-Level Relation Extraction“. Proceedings of the AAAI Conference on Artificial Intelligence 37, Nr. 11 (26.06.2023): 13967–75. http://dx.doi.org/10.1609/aaai.v37i11.26635.
Der volle Inhalt der QuelleDrozd, Oleksandr V., Andrzej Rucinski, Kostiantyn V. Zashcholkin, Myroslav O. Drozd und Yulian Yu Sulima. „IMPROVING FPGA COMPONENTS OF CRITICAL SYSTEMS BASED ON NATURAL VERSION REDUNDANCY“. Applied Aspects of Information Technology 4, Nr. 2 (30.06.2021): 168–77. http://dx.doi.org/10.15276/aait.02.2021.4.
Der volle Inhalt der QuelleCostes, Nicolas, und Martijn Stam. „Redundant Code-based Masking Revisited“. IACR Transactions on Cryptographic Hardware and Embedded Systems, 03.12.2020, 426–50. http://dx.doi.org/10.46586/tches.v2021.i1.426-450.
Der volle Inhalt der QuelleWang, Weijia, Pierrick Méaux, Gaëtan Cassiers und François-Xavier Standaert. „Efficient and Private Computations with Code-Based Masking“. IACR Transactions on Cryptographic Hardware and Embedded Systems, 02.03.2020, 128–71. http://dx.doi.org/10.46586/tches.v2020.i2.128-171.
Der volle Inhalt der QuelleCheng, Wei, Sylvain Guilley, Claude Carlet, Jean-Luc Danger und Sihem Mesnager. „Information Leakages in Code-based Masking: A Unified Quantification Approach“. IACR Transactions on Cryptographic Hardware and Embedded Systems, 09.07.2021, 465–95. http://dx.doi.org/10.46586/tches.v2021.i3.465-495.
Der volle Inhalt der QuelleWu, Qianmei, Wei Cheng, Sylvain Guilley, Fan Zhang und Wei Fu. „On Efficient and Secure Code-based Masking: A Pragmatic Evaluation“. IACR Transactions on Cryptographic Hardware and Embedded Systems, 08.06.2022, 192–222. http://dx.doi.org/10.46586/tches.v2022.i3.192-222.
Der volle Inhalt der QuelleDemange, Loïc, und Mélissa Rossi. „A provably masked implementation of BIKE Key Encapsulation Mechanism“. IACR Communications in Cryptology, 09.04.2024. http://dx.doi.org/10.62056/aesgvua5v.
Der volle Inhalt der QuelleTang, Peng, Cheng Xie und Haoran Duan. „Node and edge dual-masked self-supervised graph representation“. Knowledge and Information Systems, 23.12.2023. http://dx.doi.org/10.1007/s10115-023-01950-2.
Der volle Inhalt der QuelleCheng, Wei, Sylvain Guilley und Jean-Luc Danger. „Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks“. IEEE Transactions on Information Forensics and Security, 2022, 1. http://dx.doi.org/10.1109/tifs.2022.3167914.
Der volle Inhalt der Quelle„Higher-Order Masking Scheme against DPA Attack in Practice: McEliece Cryptosystem Based on QD-MDPC Code“. KSII Transactions on Internet and Information Systems 13, Nr. 2 (28.02.2019). http://dx.doi.org/10.3837/tiis.2019.02.033.
Der volle Inhalt der QuelleZhou, Zhecheng, Zhenya Du, Xin Jiang, Linlin Zhuo, Yixin Xu, Xiangzheng Fu, Mingzhe Liu und Quan Zou. „GAM-MDR: probing miRNA–drug resistance using a graph autoencoder based on random path masking“. Briefings in Functional Genomics, 22.02.2024. http://dx.doi.org/10.1093/bfgp/elae005.
Der volle Inhalt der Quelle