Hybrid GNN-LSTM defense with differential privacy and secure multi-party computation for edge-optimized neuromorphic autonomous systems. [PDF]
Rekik S, Mehmood S.
europepmc +1 more source
Threats and vulnerabilities in artificial intelligence and agentic AI models. [PDF]
Radanliev P, Santos O, Maple C.
europepmc +1 more source
Quantum deep learning-enhanced ethereum blockchain for cloud security: intrusion detection, fraud prevention, and secure data migration. [PDF]
Nagarjun AV, Rajkumar S.
europepmc +1 more source
A Survey on Directed Acyclic Graph-Based Blockchain in Smart Mobility. [PDF]
Bai Y, Lee S, Seo SH.
europepmc +1 more source
Aircraft Sensor Fault Diagnosis Based on GraphSage and Attention Mechanism. [PDF]
Li Z, Ma J, Fan R, Zhao Y, Ai J, Dong Y.
europepmc +1 more source
A Review: The Beauty of Serendipity Between Integrated Circuit Security and Artificial Intelligence. [PDF]
Dong C +7 more
europepmc +1 more source
Related searches:
SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2020Fault attacks are potent physical attacks on crypto-devices. A single fault injected during encryption can reveal the cipher's secret key. In a hardware realization of an encryption algorithm, only a tiny fraction of the gates is exploitable by such an attack.
Milind Srivastava +5 more
openaire +1 more source
Bitstream Fault Injections (BiFI)–Automated Fault Attacks Against SRAM-Based FPGAs
IEEE Transactions on Computers, 2018zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Pawel Swierczynski +3 more
openaire +1 more source

