Results 51 to 60 of about 12,815 (252)
Seeing Is Not Always Believing: Invisible Collision Attack and Defence on Pre-Trained Models [PDF]
Large-scale pre-trained models (PTMs) such as BERT and GPT have achieved great success in diverse fields. The typical paradigm is to pre-train a big deep learning model on large-scale data sets, and then fine-tune the model on small task-specific data sets for downstream tasks.
arxiv
A comparative study of Message Digest 5(MD5) and SHA256 algorithm
The document is a collection of written or printed data containing information. The more rapid advancement of technology, the integrity of a document should be kept.
D. Rachmawati, J. Tarigan, A. Ginting
semanticscholar +1 more source
Marek’s disease (MD) virus (MDV) has been evolving continuously, leading to increasing vaccination failure. Here, the MDV field strain BS/15 was isolated from a severely diseased Chinese chicken flock previously vaccinated with CVI988.
Guo-rong Sun+12 more
doaj +1 more source
Authentication method in SWIM based on improved Diameter/EAP-MD5
System wide information management (SWIM) provides the civil aviation information exchange and data sharing function by using service-oriented architecture (SOA).
Zhi-jun WU, Ting ZHAO, Jin LEI
doaj +2 more sources
PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification
Recent studies have shown that phishers are using phishing kits to deploy phishing attacks faster, easier and more massive. Detecting phishing kits in deployed websites might help to detect phishing campaigns earlier.
Felipe Castano+3 more
doaj +1 more source
To evaluate the effect of the vaccine and differentiate vaccine from virulent MDV, a new quadruplex real-time PCR assay based on TaqMan probes was developed to differentiate and accurately quantify HVT, CVI988 and virulent MDV-1.
Shaopeng Wu+17 more
doaj +1 more source
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 [PDF]
This paper presents key recovery attacks on Sandwich-MAC instantiating MD5, where Sandwich-MAC is an improved variant of HMAC and achieves the same provable security level and better performance especially for short messages. The increased interest in lightweight cryptography motivates us to analyze such a MAC scheme. We first improve a distinguishing-
Lei Wang, Yu Sasaki
openaire +2 more sources
ABSTRACT Objectives To report on soft tissue contour changes at pontic sites with or without soft tissue grafting over an observation period of 15 years. Methods Fourteen patients received a fixed dental prosthesis (FDP) in the posterior zone in a controlled clinical study and were available at the 15‐year follow‐up.
Stefan P. Bienz+5 more
wiley +1 more source
Penelitian ini membantu dalam melalukan proses Keamanan data atau informasi untuk menjamin kerahasiaan dan keaslian data atau informasi. Dalam perancangan ini menggunakan Kriptografi sebagai salah satu solusi dalam mengamankan data atau informasi. Metode
Maulyanda Az+2 more
doaj +1 more source
PCOT: An open‐source toolkit for multispectral image processing
PCOT is a Python program and library which allows users to manipulate multispectral images and associated data, while processing uncertainty. It is in active development in support of the ExoMars mission and intended to be used on data from the Rosalind Franklinrover, but it has much greater potential for use beyond this specific context.
James Finnis+3 more
wiley +1 more source