Results 91 to 100 of about 1,595,306 (239)

Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions

open access: yesIEEE Access
This paper analyzes the security and performance of the isogeny-based hash functions. The isogeny-based hash function was first proposed by Charles, Goren, and Lauter, and is referred to as the CGL hash function.
Donghoe Heo   +4 more
doaj   +1 more source

Design of distributed guidance laws for multi-UAV cooperative attacking a moving target based on reducing surrounding area [PDF]

open access: yesarXiv, 2019
In this paper, two cooperative guidance laws based on the area around the target of multiattackers are designed to deal with the problem of cooperative encirclement or simultaneous attack in the case of known target acceleration and unknown target acceleration.
arxiv  

Distributed Optimal Guidance Laws for Multiple Unmanned Aerial Vehicles Attacking A Moving Target [PDF]

open access: yesarXiv, 2019
In this paper, two cooperative guidance laws based on two-point boundary value are designed to deal with the problem of cooperative encirclement and simultaneous attack under condition of both known target acceleration and unknown target acceleration.
arxiv  

On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting [PDF]

open access: bronze, 2011
Amir Moradi   +5 more
openalex   +1 more source

Demo: Sequential Attacks on Kalman Filter-based Forward Collision Warning Systems

open access: bronze, 2021
Yuzhe Ma   +4 more
openalex   +1 more source

Defense Strategies for Autonomous Multi-agent Systems: Ensuring Safety and Resilience Under Exponentially Unbounded FDI Attacks [PDF]

open access: yesarXiv
False data injection attacks pose a significant threat to autonomous multi-agent systems (MASs). Existing attack-resilient control strategies generally have strict assumptions on the attack signals and overlook safety constraints, such as collision avoidance.
arxiv  

Home - About - Disclaimer - Privacy