Results 1 to 10 of about 160,167 (287)
Die Trusted Computing Initiative ist ein Zusammenschluss mehrerer Soft- und Hardwarehersteller, die sich zum Ziel gesetzt haben, Computersysteme sicherer zu machen. Es wird allgemein angenommen, dass Hardware schwerer zu manipulieren ist als Software. Vorhandene hardwaregestützte Sicherheitsmechanismen, wie z.B.
Hoffmann, Johannes, Neubauer, Johannes
openaire +4 more sources
Research on digital copyright protection based on the hyperledger fabric blockchain network technology [PDF]
With the recent development in network technology over a few years, digital works can be easily published online. One of the main issues in the field of digital technology is the infringement of digital works, which can seriously damage the data owners ...
Yanhui Liu +3 more
doaj +2 more sources
Similarity Property and Slide Attack of Block Cipher FESH
This paper focuses on similarity properties and extension of the classical slide property of block ciphers. Taking FESH, an award-winning block cipher of the National Cryptographic Algorithm Design Competition 2019, as an example, similarity properties ...
Yafei Zheng, Wenling Wu
doaj +1 more source
An End-to-End Rumor Detection Model Based on Feature Aggregation
The social network has become the primary medium of rumor propagation. Moreover, manual identification of rumors is extremely time-consuming and laborious. It is crucial to identify rumors automatically.
Aoshuang Ye +5 more
doaj +1 more source
Application progress of SGX in trusted computing area
The trusted computing technology SGX protects the confidentiality and integrity of key codes and data by isolating a trusted execution environment, which can help prevent all kinds of attacks.Firstly, the research background and working principle of SGX ...
Bo ZHAO, Anqi YUAN, Yang AN
doaj +3 more sources
HSM-QA: Question Answering System Based on Hierarchical Semantic Matching
In recent years, Question Answering (QA) systems have gained popularity as a means of acquiring knowledge. However, the prevalent approach of matching question-answer pairs still suffers from low precision and efficiency due to the inherent ambiguity of ...
Jinlu Zhang +4 more
doaj +1 more source
ELAA: An Ensemble-Learning-Based Adversarial Attack Targeting Image-Classification Model
The research on image-classification-adversarial attacks is crucial in the realm of artificial intelligence (AI) security. Most of the image-classification-adversarial attack methods are for white-box settings, demanding target model gradients and ...
Zhongwang Fu, Xiaohui Cui
doaj +1 more source
A novel GAN-based regression model for predicting frying oil deterioration
Frying is a common food processing method because fried food is popular with consumers for its attractive colour and crisp taste. What’s concerning is that the complex physical and chemical reactions occurring during deep frying are harmful to the well ...
Kai Ye +7 more
doaj +1 more source
Cyber Security for Multi-Station Integrated Smart Energy Stations: Architecture and Solutions
Multi-station integration is motivated by the requirements of distributed energies interconnection and improvements in the efficiency of energy systems.
Yangrong Chen +5 more
doaj +1 more source
Bert-Enhanced Text Graph Neural Network for Classification
Text classification is a fundamental research direction, aims to assign tags to text units. Recently, graph neural networks (GNN) have exhibited some excellent properties in textual information processing. Furthermore, the pre-trained language model also
Yiping Yang, Xiaohui Cui
doaj +1 more source

