Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
white box cryptography
biblio
A HES for Low Speed Processors
Submitted by grigby1 on Thu, 05/20/2021 - 11:55am
Program processors
white box cryptography
HES
DES
decryption
security services
Robustness
Task Analysis
Memory management
Ciphers
composability
standards
security mechanisms
Resiliency
resilience
Metrics
pubcrawl
encryption
biblio
Dynamic vs Static Encryption Tables in DES Key Schedules
Submitted by grigby1 on Thu, 05/20/2021 - 11:54am
encryption
Schedules
Adaptation models
pubcrawl
Metrics
resilience
Resiliency
Mathematical model
Cryptography
composability
Memory management
Dynamic scheduling
Context modeling
DES
Key schedule
white box cryptography
biblio
Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels
Submitted by grigby1 on Thu, 05/20/2021 - 11:54am
pubcrawl
Metrics
resilience
Resiliency
composability
white box cryptography
biblio
Blockchain-Anchored Failure Responsibility Management in Disaggregated Optical Networks
Submitted by grigby1 on Thu, 05/20/2021 - 11:54am
pubcrawl
Metrics
resilience
Resiliency
composability
white box cryptography
biblio
Killing EM Side-Channel Leakage at its Source
Submitted by grigby1 on Thu, 05/20/2021 - 11:53am
Probes
white box cryptography
White-box modeling
Signature Suppression
Low-overhead countermeasure
Local lower metal routing
attenuation
Metals
EM Side-channel attack
pubcrawl
Switches
Routing
composability
Cryptography
Resiliency
resilience
Metrics
biblio
Black-box Attacks on DNN Classifier Based on Fuzzy Adversarial Examples
Submitted by grigby1 on Thu, 05/20/2021 - 11:53am
fuzzy adversarial examples
white box cryptography
Training
security
resilience
pubcrawl
Knowledge engineering
Image Processing
generative adversarial networks
Black Box Attacks
functionally equivalent network
Entropy
deep learning
black-box attack
Resiliency
Metrics
composability
biblio
Physical Adversarial Attacks Against Deep Learning Based Channel Decoding Systems
Submitted by aekwall on Mon, 03/15/2021 - 11:57am
Jamming
wireless security
telecommunication security
Resiliency
pubcrawl
private key cryptography
physical white-box
physical adversarial attacks
Perturbation methods
Noise measurement
Neural networks
modulation
Metrics
learning (artificial intelligence)
white box cryptography
huge success
deep learning channel
deep learning
Decoding
conventional jamming attacks
composability
classical decoding schemes
channel decoding systems
channel decoding
channel coding
black-box adversarial attacks
Artificial Neural Networks
adversarial attacks
biblio
Automating the BGE Attack on White-Box Implementations of AES with External Encodings
Submitted by grigby1 on Thu, 03/04/2021 - 2:34pm
reverse engineering
white-box cryptography
White Box Security
white box cryptography
white box
test equipment
standards
Software systems
security
secure software
Automated Secure Software Engineering
Resiliency
resilience
pubcrawl
Metrics
Manuals
encoding
Consumer electronics
composability
biblio
Implementation White Box Cryptography in Substitution-Permutation network
Submitted by grigby1 on Thu, 03/04/2021 - 2:33pm
resilience
white-box cryptography
White Box Security
white box
substitution-permutation network
side-channel attacks
Side-channel attack
security
Resiliency
white box cryptography
pubcrawl
privacy
Metrics
leak channels
Information Leakage
Cryptography
composability
biblio
Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 2:33pm
pubcrawl
Logic gates
machine learning
machine learning as a service
machine learning programs
Metrics
program confidentiality
program obfuscation
provable program obfuscation solution
learning (artificial intelligence)
range membership programs
resilience
security
traditional cryptographic program obfuscation model
white box
white box cryptography
White Box Security
white-box attacks
cloud services
Resiliency
Predictive Metrics
Compositionality
Black Box Attacks
black box encryption
black-box attacks
Cloud Computing
cloud programs
provable security
composability
Computational modeling
Cryptography
data privacy
Decision trees
encrypted-input program obfuscation
encryption
equivalent unobfuscated program
« first
‹ previous
1
2
3
4
5
6
next ›
last »