Abstract: Recently, Physically Unclonable Functions (PUFs) received considerable attention in order to developing security mechanisms for applications such as Internet of Things (IoT) by exploiting ...
Notifications You must be signed in to change notification settings This project demonstrates two types of covert network communications channels: a Covert Timing Channel (CTC) and a Covert Storage ...
Abstract: The scoring function, which measures the plausibility of triplets in knowledge graphs (KGs), is the key to ensure the excellent performance of KG embedding, and its design is also an ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results