Artículos de revistas sobre el tema "Code-based masking"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Code-based masking".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Xiao, Yisheng, Ruiyang Xu, Lijun Wu, Juntao Li, Tao Qin, Tie-Yan Liu y Min Zhang. "AMOM: Adaptive Masking over Masking for Conditional Masked Language Model". Proceedings of the AAAI Conference on Artificial Intelligence 37, n.º 11 (26 de junio de 2023): 13789–97. http://dx.doi.org/10.1609/aaai.v37i11.26615.
Texto completoCarlet, Claude, Abderrahman Daif, Sylvain Guilley y Cédric Tavernier. "Quasi-linear masking against SCA and FIA, with cost amortization". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, n.º 1 (4 de diciembre de 2023): 398–432. http://dx.doi.org/10.46586/tches.v2024.i1.398-432.
Texto completoLevina, Alla y Gleb Ryaskin. "Robust Code Constructions Based on Bent Functions and Spline Wavelet Decomposition". Mathematics 10, n.º 18 (12 de septiembre de 2022): 3305. http://dx.doi.org/10.3390/math10183305.
Texto completoWang, Weijia, Yu Yu y Francois-Xavier Standaert. "Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations". IEEE Transactions on Information Forensics and Security 14, n.º 11 (noviembre de 2019): 3069–82. http://dx.doi.org/10.1109/tifs.2019.2912549.
Texto completoGoy, Guillaume, Julien Maillard, Philippe Gaborit y Antoine Loiseau. "Single trace HQC shared key recovery with SASCA". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, n.º 2 (12 de marzo de 2024): 64–87. http://dx.doi.org/10.46586/tches.v2024.i2.64-87.
Texto completoYao, Xincheng, Chongyang Zhang, Ruoqi Li, Jun Sun y Zhenyu Liu. "One-for-All: Proposal Masked Cross-Class Anomaly Detection". Proceedings of the AAAI Conference on Artificial Intelligence 37, n.º 4 (26 de junio de 2023): 4792–800. http://dx.doi.org/10.1609/aaai.v37i4.25604.
Texto completoBurke, Colin J., Patrick D. Aleo, Yu-Ching Chen, Xin Liu, John R. Peterson, Glenn H. Sembroski y Joshua Yao-Yu Lin. "Deblending and classifying astronomical sources with Mask R-CNN deep learning". Monthly Notices of the Royal Astronomical Society 490, n.º 3 (10 de octubre de 2019): 3952–65. http://dx.doi.org/10.1093/mnras/stz2845.
Texto completoZhu, Fengmin, Michael Sammler, Rodolphe Lepigre, Derek Dreyer y Deepak Garg. "BFF: foundational and automated verification of bitfield-manipulating programs". Proceedings of the ACM on Programming Languages 6, OOPSLA2 (31 de octubre de 2022): 1613–38. http://dx.doi.org/10.1145/3563345.
Texto completoChen, Ying, Rebekah Wu, James Felton, David M. Rocke y Anu Chakicherla. "A Method to Detect Differential Gene Expression in Cross-Species Hybridization Experiments at Gene and Probe Level". Biomedical Informatics Insights 3 (enero de 2010): BII.S3846. http://dx.doi.org/10.4137/bii.s3846.
Texto completoHarrington, J. Patrick. "Polarized Continuum Radiation from Stellar Atmospheres". Proceedings of the International Astronomical Union 10, S305 (diciembre de 2014): 395–400. http://dx.doi.org/10.1017/s1743921315005116.
Texto completoMak, Lesley y Pooya Taheri. "An Automated Tool for Upgrading Fortran Codes". Software 1, n.º 3 (13 de agosto de 2022): 299–315. http://dx.doi.org/10.3390/software1030014.
Texto completoLiva, Gianluigi, Shumei Song, Lan Lan, Yifei Zhang, Shu Lin y William E. Ryan. "Design of LDPC Codes: A Survey and New Results". Journal of Communications Software and Systems 2, n.º 3 (5 de abril de 2017): 191. http://dx.doi.org/10.24138/jcomss.v2i3.283.
Texto completoLiu, Yongxu, Yinghui Quan, Guoyao Xiao, Aobo Li y Jinjian Wu. "Scaling and Masking: A New Paradigm of Data Sampling for Image and Video Quality Assessment". Proceedings of the AAAI Conference on Artificial Intelligence 38, n.º 4 (24 de marzo de 2024): 3792–801. http://dx.doi.org/10.1609/aaai.v38i4.28170.
Texto completoLi, Daixun, Weiying Xie, Jiaqing Zhang y Yunsong Li. "MDFL: Multi-Domain Diffusion-Driven Feature Learning". Proceedings of the AAAI Conference on Artificial Intelligence 38, n.º 8 (24 de marzo de 2024): 8653–60. http://dx.doi.org/10.1609/aaai.v38i8.28710.
Texto completoVakulenko, S. P., N. K. Volosova y D. F. Pastukhov. "METHODS OF QR CODE TRANSMISSION IN COMPUTER STEGANOGRAPHY". World of Transport and Transportation 16, n.º 5 (28 de octubre de 2018): 14–25. http://dx.doi.org/10.30932/1992-3252-2018-16-5-2.
Texto completoSemenova, Elizaveta, Maria Luisa Guerriero, Bairu Zhang, Andreas Hock, Philip Hopcroft, Ganesh Kadamur, Avid M. Afzal y Stanley E. Lazic. "Flexible Fitting of PROTAC Concentration–Response Curves with Changepoint Gaussian Processes". SLAS DISCOVERY: Advancing the Science of Drug Discovery 26, n.º 9 (20 de septiembre de 2021): 1212–24. http://dx.doi.org/10.1177/24725552211028142.
Texto completoKurtin, Danielle L., Daniel A. J. Parsons y Scott M. Stagg. "VTES: a stochastic Python-based tool to simulate viral transmission". F1000Research 9 (5 de octubre de 2020): 1198. http://dx.doi.org/10.12688/f1000research.26786.1.
Texto completoCui, Jianming, Wenxiu Kong, Xiaojun Zhang, Da Chen y Qingtian Zeng. "DLSTM-Based Successive Cancellation Flipping Decoder for Short Polar Codes". Entropy 23, n.º 7 (6 de julio de 2021): 863. http://dx.doi.org/10.3390/e23070863.
Texto completoSinex, D. G. y D. C. Havey. "Neural mechanisms of tone-on-tone masking: patterns of discharge rate and discharge synchrony related to rates of spontaneous discharge in the chinchilla auditory nerve". Journal of Neurophysiology 56, n.º 6 (1 de diciembre de 1986): 1763–80. http://dx.doi.org/10.1152/jn.1986.56.6.1763.
Texto completoWang, Liang, Xiang Tao, Qiang Liu, Shu Wu y Liang Wang. "Rethinking Graph Masked Autoencoders through Alignment and Uniformity". Proceedings of the AAAI Conference on Artificial Intelligence 38, n.º 14 (24 de marzo de 2024): 15528–36. http://dx.doi.org/10.1609/aaai.v38i14.29479.
Texto completoWu, Cong, Xiao-Jun Wu, Josef Kittler, Tianyang Xu, Sara Ahmed, Muhammad Awais y Zhenhua Feng. "SCD-Net: Spatiotemporal Clues Disentanglement Network for Self-Supervised Skeleton-Based Action Recognition". Proceedings of the AAAI Conference on Artificial Intelligence 38, n.º 6 (24 de marzo de 2024): 5949–57. http://dx.doi.org/10.1609/aaai.v38i6.28409.
Texto completoThompson, William, Jensen Lawrence, Dori Blakely, Christian Marois, Jason Wang, Mosé Giordano, Timothy Brandt et al. "Octofitter: Fast, Flexible, and Accurate Orbit Modeling to Detect Exoplanets". Astronomical Journal 166, n.º 4 (20 de septiembre de 2023): 164. http://dx.doi.org/10.3847/1538-3881/acf5cc.
Texto completoZhao, Zhuoran, Jinbin Bai, Delong Chen, Debang Wang y Yubo Pan. "Taming Diffusion Models for Music-Driven Conducting Motion Generation". Proceedings of the AAAI Symposium Series 1, n.º 1 (3 de octubre de 2023): 40–44. http://dx.doi.org/10.1609/aaaiss.v1i1.27474.
Texto completoZhang, Nan, Liam O’Neill, Gautam Das, Xiuzhen Cheng y Heng Huang. "No Silver Bullet". International Journal of Healthcare Information Systems and Informatics 7, n.º 4 (octubre de 2012): 48–58. http://dx.doi.org/10.4018/jhisi.2012100104.
Texto completoZeng, Fan-Gang, Ying-Yee Kong, Henry J. Michalewski y Arnold Starr. "Perceptual Consequences of Disrupted Auditory Nerve Activity". Journal of Neurophysiology 93, n.º 6 (junio de 2005): 3050–63. http://dx.doi.org/10.1152/jn.00985.2004.
Texto completoNechaeva, Anastasia L. "<i>Otherness</i> as Basis of Artistic Chronotope: Script vs. Film". SibScript 25, n.º 4 (28 de septiembre de 2023): 567–76. http://dx.doi.org/10.21603/sibscript-2023-25-4-567-576.
Texto completoLin, Zhiwei, Yongtao Wang, Shengxiang Qi, Nan Dong y Ming-Hsuan Yang. "BEV-MAE: Bird’s Eye View Masked Autoencoders for Point Cloud Pre-training in Autonomous Driving Scenarios". Proceedings of the AAAI Conference on Artificial Intelligence 38, n.º 4 (24 de marzo de 2024): 3531–39. http://dx.doi.org/10.1609/aaai.v38i4.28141.
Texto completoFan, Deng-Ping, Ziling Huang, Peng Zheng, Hong Liu, Xuebin Qin y Luc Van Gool. "Facial-sketch Synthesis: A New Challenge". Machine Intelligence Research 19, n.º 4 (30 de julio de 2022): 257–87. http://dx.doi.org/10.1007/s11633-022-1349-9.
Texto completoZhao, Jianwei, Qiang Zhai, Pengbo Zhao, Rui Huang y Hong Cheng. "Co-Visual Pattern-Augmented Generative Transformer Learning for Automobile Geo-Localization". Remote Sensing 15, n.º 9 (22 de abril de 2023): 2221. http://dx.doi.org/10.3390/rs15092221.
Texto completoChayka, Larysa. "STRUCTURE AND DYNAMICS OF VERBAL CONFLICT SITUATION (BASED ON THE ENGLISH LANGUAGE DISCOURSE)". Odessa Linguistic Journal, n.º 12 (2018): 39–46. http://dx.doi.org/10.32837/2312-3192/12/6.
Texto completoLin, Yuqi, Minghao Chen, Kaipeng Zhang, Hengjia Li, Mingming Li, Zheng Yang, Dongqin Lv, Binbin Lin, Haifeng Liu y Deng Cai. "TagCLIP: A Local-to-Global Framework to Enhance Open-Vocabulary Multi-Label Classification of CLIP without Training". Proceedings of the AAAI Conference on Artificial Intelligence 38, n.º 4 (24 de marzo de 2024): 3513–21. http://dx.doi.org/10.1609/aaai.v38i4.28139.
Texto completoTsmots, I. G., V. M. Teslyuk, Yu V. Opotiak y I. V. Pikh. "MODELS AND TOOLS FOR DEBUGGING AND TESTING MOBILE SYSTEMS FOR NEURO-LIKE CRYPTOGRAPHIC PROTECTION OF DATA TRANSMISSION". Ukrainian Journal of Information Technology 4, n.º 2 (2022): 45–55. http://dx.doi.org/10.23939/ujit2022.02.045.
Texto completoCayuso, Juan, Richard Bloch, Selim C. Hotinli, Matthew C. Johnson y Fiona McCarthy. "Velocity reconstruction with the cosmic microwave background and galaxy surveys". Journal of Cosmology and Astroparticle Physics 2023, n.º 02 (1 de febrero de 2023): 051. http://dx.doi.org/10.1088/1475-7516/2023/02/051.
Texto completoKonduri, Raja Rajeswari, Nagireddi Roopavathi, Balantrapu Vijaya Lakshmi y Putrevu Venkata Krishna Chaitanya. "Mitigating Peak Sidelobe Levels in Pulse Compression Radar using Artificial Neural Networks". Indian Journal of Artificial Intelligence and Neural Networking 3, n.º 6 (30 de marzo de 2024): 12–20. http://dx.doi.org/10.54105/ijainn.f9517.03061023.
Texto completoMarin, Maximillian, Roger Vargas, Michael Harris, Brendan Jeffrey, L. Elaine Epperson, David Durbin, Michael Strong et al. "Benchmarking the empirical accuracy of short-read sequencing across the M. tuberculosis genome". Bioinformatics 38, n.º 7 (10 de enero de 2022): 1781–87. http://dx.doi.org/10.1093/bioinformatics/btac023.
Texto completoDreifeld, O. V. "Pragmatic and Semantic Analysis of Anti-War Protest Utterances (on the Data of Public Opinion Discourse in the Spring of 2022 in Russia)". Discourse 9, n.º 6 (21 de diciembre de 2023): 116–27. http://dx.doi.org/10.32603/2412-8562-2023-9-6-116-127.
Texto completoRognes, Torbjørn, Tomáš Flouri, Ben Nichols, Christopher Quince y Frédéric Mahé. "VSEARCH: a versatile open source tool for metagenomics". PeerJ 4 (18 de octubre de 2016): e2584. http://dx.doi.org/10.7717/peerj.2584.
Texto completoHan, Changho, Youngjae Song, Hong-Seok Lim, Yunwon Tae, Jong-Hwan Jang, Byeong Tak Lee, Yeha Lee, Woong Bae y Dukyong Yoon. "Automated Detection of Acute Myocardial Infarction Using Asynchronous Electrocardiogram Signals—Preview of Implementing Artificial Intelligence With Multichannel Electrocardiographs Obtained From Smartwatches: Retrospective Study". Journal of Medical Internet Research 23, n.º 9 (10 de septiembre de 2021): e31129. http://dx.doi.org/10.2196/31129.
Texto completoStratonov, Vasyl. ""Computer crimes": some features and characteristics". Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 2, n.º 2 (3 de junio de 2020): 134–41. http://dx.doi.org/10.31733/2078-3566-2020-2-134-141.
Texto completoZhang, Liang, Jinsong Su, Zijun Min, Zhongjian Miao, Qingguo Hu, Biao Fu, Xiaodong Shi y Yidong Chen. "Exploring Self-Distillation Based Relational Reasoning Training for Document-Level Relation Extraction". Proceedings of the AAAI Conference on Artificial Intelligence 37, n.º 11 (26 de junio de 2023): 13967–75. http://dx.doi.org/10.1609/aaai.v37i11.26635.
Texto completoDrozd, Oleksandr V., Andrzej Rucinski, Kostiantyn V. Zashcholkin, Myroslav O. Drozd y Yulian Yu Sulima. "IMPROVING FPGA COMPONENTS OF CRITICAL SYSTEMS BASED ON NATURAL VERSION REDUNDANCY". Applied Aspects of Information Technology 4, n.º 2 (30 de junio de 2021): 168–77. http://dx.doi.org/10.15276/aait.02.2021.4.
Texto completoCostes, Nicolas y Martijn Stam. "Redundant Code-based Masking Revisited". IACR Transactions on Cryptographic Hardware and Embedded Systems, 3 de diciembre de 2020, 426–50. http://dx.doi.org/10.46586/tches.v2021.i1.426-450.
Texto completoWang, Weijia, Pierrick Méaux, Gaëtan Cassiers y François-Xavier Standaert. "Efficient and Private Computations with Code-Based Masking". IACR Transactions on Cryptographic Hardware and Embedded Systems, 2 de marzo de 2020, 128–71. http://dx.doi.org/10.46586/tches.v2020.i2.128-171.
Texto completoCheng, Wei, Sylvain Guilley, Claude Carlet, Jean-Luc Danger y Sihem Mesnager. "Information Leakages in Code-based Masking: A Unified Quantification Approach". IACR Transactions on Cryptographic Hardware and Embedded Systems, 9 de julio de 2021, 465–95. http://dx.doi.org/10.46586/tches.v2021.i3.465-495.
Texto completoWu, Qianmei, Wei Cheng, Sylvain Guilley, Fan Zhang y Wei Fu. "On Efficient and Secure Code-based Masking: A Pragmatic Evaluation". IACR Transactions on Cryptographic Hardware and Embedded Systems, 8 de junio de 2022, 192–222. http://dx.doi.org/10.46586/tches.v2022.i3.192-222.
Texto completoDemange, Loïc y Mélissa Rossi. "A provably masked implementation of BIKE Key Encapsulation Mechanism". IACR Communications in Cryptology, 9 de abril de 2024. http://dx.doi.org/10.62056/aesgvua5v.
Texto completoTang, Peng, Cheng Xie y Haoran Duan. "Node and edge dual-masked self-supervised graph representation". Knowledge and Information Systems, 23 de diciembre de 2023. http://dx.doi.org/10.1007/s10115-023-01950-2.
Texto completoCheng, Wei, Sylvain Guilley y Jean-Luc Danger. "Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks". IEEE Transactions on Information Forensics and Security, 2022, 1. http://dx.doi.org/10.1109/tifs.2022.3167914.
Texto completo"Higher-Order Masking Scheme against DPA Attack in Practice: McEliece Cryptosystem Based on QD-MDPC Code". KSII Transactions on Internet and Information Systems 13, n.º 2 (28 de febrero de 2019). http://dx.doi.org/10.3837/tiis.2019.02.033.
Texto completoZhou, Zhecheng, Zhenya Du, Xin Jiang, Linlin Zhuo, Yixin Xu, Xiangzheng Fu, Mingzhe Liu y Quan Zou. "GAM-MDR: probing miRNA–drug resistance using a graph autoencoder based on random path masking". Briefings in Functional Genomics, 22 de febrero de 2024. http://dx.doi.org/10.1093/bfgp/elae005.
Texto completo