Artykuły w czasopismach na temat „Code-based masking”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Code-based masking”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Xiao, Yisheng, Ruiyang Xu, Lijun Wu, Juntao Li, Tao Qin, Tie-Yan Liu i Min Zhang. "AMOM: Adaptive Masking over Masking for Conditional Masked Language Model". Proceedings of the AAAI Conference on Artificial Intelligence 37, nr 11 (26.06.2023): 13789–97. http://dx.doi.org/10.1609/aaai.v37i11.26615.
Pełny tekst źródłaCarlet, Claude, Abderrahman Daif, Sylvain Guilley i Cédric Tavernier. "Quasi-linear masking against SCA and FIA, with cost amortization". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, nr 1 (4.12.2023): 398–432. http://dx.doi.org/10.46586/tches.v2024.i1.398-432.
Pełny tekst źródłaLevina, Alla, i Gleb Ryaskin. "Robust Code Constructions Based on Bent Functions and Spline Wavelet Decomposition". Mathematics 10, nr 18 (12.09.2022): 3305. http://dx.doi.org/10.3390/math10183305.
Pełny tekst źródłaWang, Weijia, Yu Yu i Francois-Xavier Standaert. "Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations". IEEE Transactions on Information Forensics and Security 14, nr 11 (listopad 2019): 3069–82. http://dx.doi.org/10.1109/tifs.2019.2912549.
Pełny tekst źródłaGoy, Guillaume, Julien Maillard, Philippe Gaborit i Antoine Loiseau. "Single trace HQC shared key recovery with SASCA". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, nr 2 (12.03.2024): 64–87. http://dx.doi.org/10.46586/tches.v2024.i2.64-87.
Pełny tekst źródłaYao, Xincheng, Chongyang Zhang, Ruoqi Li, Jun Sun i Zhenyu Liu. "One-for-All: Proposal Masked Cross-Class Anomaly Detection". Proceedings of the AAAI Conference on Artificial Intelligence 37, nr 4 (26.06.2023): 4792–800. http://dx.doi.org/10.1609/aaai.v37i4.25604.
Pełny tekst źródłaBurke, Colin J., Patrick D. Aleo, Yu-Ching Chen, Xin Liu, John R. Peterson, Glenn H. Sembroski i Joshua Yao-Yu Lin. "Deblending and classifying astronomical sources with Mask R-CNN deep learning". Monthly Notices of the Royal Astronomical Society 490, nr 3 (10.10.2019): 3952–65. http://dx.doi.org/10.1093/mnras/stz2845.
Pełny tekst źródłaZhu, Fengmin, Michael Sammler, Rodolphe Lepigre, Derek Dreyer i Deepak Garg. "BFF: foundational and automated verification of bitfield-manipulating programs". Proceedings of the ACM on Programming Languages 6, OOPSLA2 (31.10.2022): 1613–38. http://dx.doi.org/10.1145/3563345.
Pełny tekst źródłaChen, Ying, Rebekah Wu, James Felton, David M. Rocke i Anu Chakicherla. "A Method to Detect Differential Gene Expression in Cross-Species Hybridization Experiments at Gene and Probe Level". Biomedical Informatics Insights 3 (styczeń 2010): BII.S3846. http://dx.doi.org/10.4137/bii.s3846.
Pełny tekst źródłaHarrington, J. Patrick. "Polarized Continuum Radiation from Stellar Atmospheres". Proceedings of the International Astronomical Union 10, S305 (grudzień 2014): 395–400. http://dx.doi.org/10.1017/s1743921315005116.
Pełny tekst źródłaMak, Lesley, i Pooya Taheri. "An Automated Tool for Upgrading Fortran Codes". Software 1, nr 3 (13.08.2022): 299–315. http://dx.doi.org/10.3390/software1030014.
Pełny tekst źródłaLiva, Gianluigi, Shumei Song, Lan Lan, Yifei Zhang, Shu Lin i William E. Ryan. "Design of LDPC Codes: A Survey and New Results". Journal of Communications Software and Systems 2, nr 3 (5.04.2017): 191. http://dx.doi.org/10.24138/jcomss.v2i3.283.
Pełny tekst źródłaLiu, Yongxu, Yinghui Quan, Guoyao Xiao, Aobo Li i Jinjian Wu. "Scaling and Masking: A New Paradigm of Data Sampling for Image and Video Quality Assessment". Proceedings of the AAAI Conference on Artificial Intelligence 38, nr 4 (24.03.2024): 3792–801. http://dx.doi.org/10.1609/aaai.v38i4.28170.
Pełny tekst źródłaLi, Daixun, Weiying Xie, Jiaqing Zhang i Yunsong Li. "MDFL: Multi-Domain Diffusion-Driven Feature Learning". Proceedings of the AAAI Conference on Artificial Intelligence 38, nr 8 (24.03.2024): 8653–60. http://dx.doi.org/10.1609/aaai.v38i8.28710.
Pełny tekst źródłaVakulenko, S. P., N. K. Volosova i D. F. Pastukhov. "METHODS OF QR CODE TRANSMISSION IN COMPUTER STEGANOGRAPHY". World of Transport and Transportation 16, nr 5 (28.10.2018): 14–25. http://dx.doi.org/10.30932/1992-3252-2018-16-5-2.
Pełny tekst źródłaSemenova, Elizaveta, Maria Luisa Guerriero, Bairu Zhang, Andreas Hock, Philip Hopcroft, Ganesh Kadamur, Avid M. Afzal i Stanley E. Lazic. "Flexible Fitting of PROTAC Concentration–Response Curves with Changepoint Gaussian Processes". SLAS DISCOVERY: Advancing the Science of Drug Discovery 26, nr 9 (20.09.2021): 1212–24. http://dx.doi.org/10.1177/24725552211028142.
Pełny tekst źródłaKurtin, Danielle L., Daniel A. J. Parsons i Scott M. Stagg. "VTES: a stochastic Python-based tool to simulate viral transmission". F1000Research 9 (5.10.2020): 1198. http://dx.doi.org/10.12688/f1000research.26786.1.
Pełny tekst źródłaCui, Jianming, Wenxiu Kong, Xiaojun Zhang, Da Chen i Qingtian Zeng. "DLSTM-Based Successive Cancellation Flipping Decoder for Short Polar Codes". Entropy 23, nr 7 (6.07.2021): 863. http://dx.doi.org/10.3390/e23070863.
Pełny tekst źródłaSinex, D. G., i D. C. Havey. "Neural mechanisms of tone-on-tone masking: patterns of discharge rate and discharge synchrony related to rates of spontaneous discharge in the chinchilla auditory nerve". Journal of Neurophysiology 56, nr 6 (1.12.1986): 1763–80. http://dx.doi.org/10.1152/jn.1986.56.6.1763.
Pełny tekst źródłaWang, Liang, Xiang Tao, Qiang Liu, Shu Wu i Liang Wang. "Rethinking Graph Masked Autoencoders through Alignment and Uniformity". Proceedings of the AAAI Conference on Artificial Intelligence 38, nr 14 (24.03.2024): 15528–36. http://dx.doi.org/10.1609/aaai.v38i14.29479.
Pełny tekst źródłaWu, Cong, Xiao-Jun Wu, Josef Kittler, Tianyang Xu, Sara Ahmed, Muhammad Awais i Zhenhua Feng. "SCD-Net: Spatiotemporal Clues Disentanglement Network for Self-Supervised Skeleton-Based Action Recognition". Proceedings of the AAAI Conference on Artificial Intelligence 38, nr 6 (24.03.2024): 5949–57. http://dx.doi.org/10.1609/aaai.v38i6.28409.
Pełny tekst źródłaThompson, William, Jensen Lawrence, Dori Blakely, Christian Marois, Jason Wang, Mosé Giordano, Timothy Brandt i in. "Octofitter: Fast, Flexible, and Accurate Orbit Modeling to Detect Exoplanets". Astronomical Journal 166, nr 4 (20.09.2023): 164. http://dx.doi.org/10.3847/1538-3881/acf5cc.
Pełny tekst źródłaZhao, Zhuoran, Jinbin Bai, Delong Chen, Debang Wang i Yubo Pan. "Taming Diffusion Models for Music-Driven Conducting Motion Generation". Proceedings of the AAAI Symposium Series 1, nr 1 (3.10.2023): 40–44. http://dx.doi.org/10.1609/aaaiss.v1i1.27474.
Pełny tekst źródłaZhang, Nan, Liam O’Neill, Gautam Das, Xiuzhen Cheng i Heng Huang. "No Silver Bullet". International Journal of Healthcare Information Systems and Informatics 7, nr 4 (październik 2012): 48–58. http://dx.doi.org/10.4018/jhisi.2012100104.
Pełny tekst źródłaZeng, Fan-Gang, Ying-Yee Kong, Henry J. Michalewski i Arnold Starr. "Perceptual Consequences of Disrupted Auditory Nerve Activity". Journal of Neurophysiology 93, nr 6 (czerwiec 2005): 3050–63. http://dx.doi.org/10.1152/jn.00985.2004.
Pełny tekst źródłaNechaeva, Anastasia L. "<i>Otherness</i> as Basis of Artistic Chronotope: Script vs. Film". SibScript 25, nr 4 (28.09.2023): 567–76. http://dx.doi.org/10.21603/sibscript-2023-25-4-567-576.
Pełny tekst źródłaLin, Zhiwei, Yongtao Wang, Shengxiang Qi, Nan Dong i Ming-Hsuan Yang. "BEV-MAE: Bird’s Eye View Masked Autoencoders for Point Cloud Pre-training in Autonomous Driving Scenarios". Proceedings of the AAAI Conference on Artificial Intelligence 38, nr 4 (24.03.2024): 3531–39. http://dx.doi.org/10.1609/aaai.v38i4.28141.
Pełny tekst źródłaFan, Deng-Ping, Ziling Huang, Peng Zheng, Hong Liu, Xuebin Qin i Luc Van Gool. "Facial-sketch Synthesis: A New Challenge". Machine Intelligence Research 19, nr 4 (30.07.2022): 257–87. http://dx.doi.org/10.1007/s11633-022-1349-9.
Pełny tekst źródłaZhao, Jianwei, Qiang Zhai, Pengbo Zhao, Rui Huang i Hong Cheng. "Co-Visual Pattern-Augmented Generative Transformer Learning for Automobile Geo-Localization". Remote Sensing 15, nr 9 (22.04.2023): 2221. http://dx.doi.org/10.3390/rs15092221.
Pełny tekst źródłaChayka, Larysa. "STRUCTURE AND DYNAMICS OF VERBAL CONFLICT SITUATION (BASED ON THE ENGLISH LANGUAGE DISCOURSE)". Odessa Linguistic Journal, nr 12 (2018): 39–46. http://dx.doi.org/10.32837/2312-3192/12/6.
Pełny tekst źródłaLin, Yuqi, Minghao Chen, Kaipeng Zhang, Hengjia Li, Mingming Li, Zheng Yang, Dongqin Lv, Binbin Lin, Haifeng Liu i Deng Cai. "TagCLIP: A Local-to-Global Framework to Enhance Open-Vocabulary Multi-Label Classification of CLIP without Training". Proceedings of the AAAI Conference on Artificial Intelligence 38, nr 4 (24.03.2024): 3513–21. http://dx.doi.org/10.1609/aaai.v38i4.28139.
Pełny tekst źródłaTsmots, I. G., V. M. Teslyuk, Yu V. Opotiak i I. V. Pikh. "MODELS AND TOOLS FOR DEBUGGING AND TESTING MOBILE SYSTEMS FOR NEURO-LIKE CRYPTOGRAPHIC PROTECTION OF DATA TRANSMISSION". Ukrainian Journal of Information Technology 4, nr 2 (2022): 45–55. http://dx.doi.org/10.23939/ujit2022.02.045.
Pełny tekst źródłaCayuso, Juan, Richard Bloch, Selim C. Hotinli, Matthew C. Johnson i Fiona McCarthy. "Velocity reconstruction with the cosmic microwave background and galaxy surveys". Journal of Cosmology and Astroparticle Physics 2023, nr 02 (1.02.2023): 051. http://dx.doi.org/10.1088/1475-7516/2023/02/051.
Pełny tekst źródłaKonduri, Raja Rajeswari, Nagireddi Roopavathi, Balantrapu Vijaya Lakshmi i Putrevu Venkata Krishna Chaitanya. "Mitigating Peak Sidelobe Levels in Pulse Compression Radar using Artificial Neural Networks". Indian Journal of Artificial Intelligence and Neural Networking 3, nr 6 (30.03.2024): 12–20. http://dx.doi.org/10.54105/ijainn.f9517.03061023.
Pełny tekst źródłaMarin, Maximillian, Roger Vargas, Michael Harris, Brendan Jeffrey, L. Elaine Epperson, David Durbin, Michael Strong i in. "Benchmarking the empirical accuracy of short-read sequencing across the M. tuberculosis genome". Bioinformatics 38, nr 7 (10.01.2022): 1781–87. http://dx.doi.org/10.1093/bioinformatics/btac023.
Pełny tekst źródłaDreifeld, O. V. "Pragmatic and Semantic Analysis of Anti-War Protest Utterances (on the Data of Public Opinion Discourse in the Spring of 2022 in Russia)". Discourse 9, nr 6 (21.12.2023): 116–27. http://dx.doi.org/10.32603/2412-8562-2023-9-6-116-127.
Pełny tekst źródłaRognes, Torbjørn, Tomáš Flouri, Ben Nichols, Christopher Quince i Frédéric Mahé. "VSEARCH: a versatile open source tool for metagenomics". PeerJ 4 (18.10.2016): e2584. http://dx.doi.org/10.7717/peerj.2584.
Pełny tekst źródłaHan, Changho, Youngjae Song, Hong-Seok Lim, Yunwon Tae, Jong-Hwan Jang, Byeong Tak Lee, Yeha Lee, Woong Bae i Dukyong Yoon. "Automated Detection of Acute Myocardial Infarction Using Asynchronous Electrocardiogram Signals—Preview of Implementing Artificial Intelligence With Multichannel Electrocardiographs Obtained From Smartwatches: Retrospective Study". Journal of Medical Internet Research 23, nr 9 (10.09.2021): e31129. http://dx.doi.org/10.2196/31129.
Pełny tekst źródłaStratonov, Vasyl. ""Computer crimes": some features and characteristics". Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 2, nr 2 (3.06.2020): 134–41. http://dx.doi.org/10.31733/2078-3566-2020-2-134-141.
Pełny tekst źródłaZhang, Liang, Jinsong Su, Zijun Min, Zhongjian Miao, Qingguo Hu, Biao Fu, Xiaodong Shi i Yidong Chen. "Exploring Self-Distillation Based Relational Reasoning Training for Document-Level Relation Extraction". Proceedings of the AAAI Conference on Artificial Intelligence 37, nr 11 (26.06.2023): 13967–75. http://dx.doi.org/10.1609/aaai.v37i11.26635.
Pełny tekst źródłaDrozd, Oleksandr V., Andrzej Rucinski, Kostiantyn V. Zashcholkin, Myroslav O. Drozd i Yulian Yu Sulima. "IMPROVING FPGA COMPONENTS OF CRITICAL SYSTEMS BASED ON NATURAL VERSION REDUNDANCY". Applied Aspects of Information Technology 4, nr 2 (30.06.2021): 168–77. http://dx.doi.org/10.15276/aait.02.2021.4.
Pełny tekst źródłaCostes, Nicolas, i Martijn Stam. "Redundant Code-based Masking Revisited". IACR Transactions on Cryptographic Hardware and Embedded Systems, 3.12.2020, 426–50. http://dx.doi.org/10.46586/tches.v2021.i1.426-450.
Pełny tekst źródłaWang, Weijia, Pierrick Méaux, Gaëtan Cassiers i François-Xavier Standaert. "Efficient and Private Computations with Code-Based Masking". IACR Transactions on Cryptographic Hardware and Embedded Systems, 2.03.2020, 128–71. http://dx.doi.org/10.46586/tches.v2020.i2.128-171.
Pełny tekst źródłaCheng, Wei, Sylvain Guilley, Claude Carlet, Jean-Luc Danger i Sihem Mesnager. "Information Leakages in Code-based Masking: A Unified Quantification Approach". IACR Transactions on Cryptographic Hardware and Embedded Systems, 9.07.2021, 465–95. http://dx.doi.org/10.46586/tches.v2021.i3.465-495.
Pełny tekst źródłaWu, Qianmei, Wei Cheng, Sylvain Guilley, Fan Zhang i Wei Fu. "On Efficient and Secure Code-based Masking: A Pragmatic Evaluation". IACR Transactions on Cryptographic Hardware and Embedded Systems, 8.06.2022, 192–222. http://dx.doi.org/10.46586/tches.v2022.i3.192-222.
Pełny tekst źródłaDemange, Loïc, i Mélissa Rossi. "A provably masked implementation of BIKE Key Encapsulation Mechanism". IACR Communications in Cryptology, 9.04.2024. http://dx.doi.org/10.62056/aesgvua5v.
Pełny tekst źródłaTang, Peng, Cheng Xie i Haoran Duan. "Node and edge dual-masked self-supervised graph representation". Knowledge and Information Systems, 23.12.2023. http://dx.doi.org/10.1007/s10115-023-01950-2.
Pełny tekst źródłaCheng, Wei, Sylvain Guilley i Jean-Luc Danger. "Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks". IEEE Transactions on Information Forensics and Security, 2022, 1. http://dx.doi.org/10.1109/tifs.2022.3167914.
Pełny tekst źródła"Higher-Order Masking Scheme against DPA Attack in Practice: McEliece Cryptosystem Based on QD-MDPC Code". KSII Transactions on Internet and Information Systems 13, nr 2 (28.02.2019). http://dx.doi.org/10.3837/tiis.2019.02.033.
Pełny tekst źródłaZhou, Zhecheng, Zhenya Du, Xin Jiang, Linlin Zhuo, Yixin Xu, Xiangzheng Fu, Mingzhe Liu i Quan Zou. "GAM-MDR: probing miRNA–drug resistance using a graph autoencoder based on random path masking". Briefings in Functional Genomics, 22.02.2024. http://dx.doi.org/10.1093/bfgp/elae005.
Pełny tekst źródła