Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
white box cryptography
biblio
An Improvement on “CryptCloud$^\textrm+\$$: Secure and Expressive Data Access Control for Cloud Storage”
Submitted by grigby1 on Tue, 12/20/2022 - 6:30pm
public key cryptography
Authority Accountability
abe
auditing
Traceability
revocation
white box cryptography
Mathematics
Electronic mail
encryption
Computer bugs
composability
Access Control
Resiliency
resilience
Metrics
pubcrawl
Cloud Computing
biblio
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories
Submitted by grigby1 on Tue, 12/20/2022 - 6:30pm
Computational modeling
rowhammer
bit leakage
white box cryptography
adversarial attack
model extraction
Clustering algorithms
Training data
composability
deep learning
privacy
Resiliency
resilience
Metrics
pubcrawl
Neural networks
Training
biblio
Powerful Physical Adversarial Examples Against Practical Face Recognition Systems
Submitted by grigby1 on Tue, 12/20/2022 - 6:30pm
Complexity theory
composability
computer vision
Conferences
face recognition
machine learning
Metrics
Performance gain
pubcrawl
resilience
Resiliency
risk management
white box cryptography
biblio
ARCHIE: A QEMU-Based Framework for Architecture-Independent Evaluation of Faults
Submitted by aekwall on Sun, 10/16/2022 - 5:30pm
Fault injection
white box cryptography
Tiny Code Generator
QEMU
fault analysis
embedded system security
automatic fault simulation
codes
Random access memory
embedded systems
Inspection
Manuals
Registers
composability
Resiliency
Metrics
pubcrawl
tools
biblio
Ensemble of Key-Based Models: Defense Against Black-Box Adversarial Attacks
Submitted by aekwall on Sun, 10/16/2022 - 5:30pm
Cryptography
Conferences
pubcrawl
Metrics
Resiliency
composability
Consumer electronics
adversarial defense
Ensemble
image classification
image encryption
white box cryptography
biblio
A Nonlinear White-Box SM4 Implementation Applied to Edge IoT Agents
Submitted by aekwall on Sun, 10/16/2022 - 5:29pm
pubcrawl
white-box implementation
white-box cryptography
white box cryptography
system integration
Software algorithms
SM4 algorithm
Resists
Resiliency
composability
Power system dynamics
Metrics
Memory management
Heuristic algorithms
evaluation indicators
encoding
edge IOT agents
biblio
Analysis of public-key cryptography using a 3-regular graph with a perfect dominating set
Submitted by aekwall on Mon, 01/31/2022 - 3:13pm
NP-hard problem
White Box Security
Resiliency
quantum computing
Pur
public-key cryptography
public key cryptography
pubcrawl
performance evaluation
perfect dominating set
white box cryptography
NP-complete
NIST
minus dominating function
encryption
Computers
3-regular graph
Metrics
resilience
composability
biblio
An Efficient Structural Analysis of SAS and its Application to White-Box Cryptography
Submitted by aekwall on Mon, 01/31/2022 - 3:11pm
Resiliency
white-box
White Box Security
Time complexity
Table lookup
Synthetic aperture sonar
structural analysis
security
SAS strcuture
white box cryptography
pubcrawl
IEEE Regions
encryption
Cryptography
Metrics
resilience
composability
biblio
Implementation White-Box Cryptography for Elliptic Curve Cryptography
Submitted by aekwall on Mon, 01/31/2022 - 3:10pm
white box cryptography
composability
resilience
Metrics
Elliptic curve cryptography
embedded computing
encryption
information processing
information security
Monitoring
Program processors
pubcrawl
Resiliency
White Box Security
white-box cryptography
biblio
Encryption Inspired Adversarial Defense For Visual Classification
Submitted by grigby1 on Thu, 05/20/2021 - 10:55am
encryption
Training
machine learning
pubcrawl
Metrics
resilience
Resiliency
composability
Perturbation methods
computer vision
Transforms
Adversarial Machine Learning
adversarial defense
perceptual image encryption
white box cryptography
1
2
3
4
5
6
next ›
last »