Search alternatives:
attackers » attacker (Expand Search), attacks (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
cers » ceres (Expand Search), cerys (Expand Search), cars (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
cers » ceres (Expand Search), cerys (Expand Search), cars (Expand Search)
-
201
HVS-inspired adversarial image generation with high perceptual quality
Published 2023Subjects: Get full text
Journal Article -
202
Spoofing detection from a feature representation perspective
Published 2018Subjects: Get full text
Get full text
Conference Paper -
203
Fully converged integral cross sections of collision induced dissociation, four-center, and single exchange reactions, and accuracy of the centrifugal sudden approximation in H2 + D2 reaction
Published 2013“…With a full-dimensional model, the first fully converged coupled-channel (CC) cross sections for different competitive processes from the ground rotational state were obtained: collision induced dissociation (CID), four-center (4C) reaction and single exchange (SE) reaction. …”
Get full text
Get full text
Journal Article -
204
Empirical studies on director shareholdings of SGX-listed companies.
Published 2008Get full text
Final Year Project (FYP) -
205
The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations
Published 2022Subjects: “…Profiled Side-Channel Attacks…”
Get full text
Journal Article -
206
Gobo: A System for Exploring User Control of Invisible Algorithms in Social Media
Published 2020Subjects: “…Computing methodologies, Artificial intelligence, Human-centered computing, Field studies, Information systems , Open source software, Human-centered computing, Social media, Algorithmic Transparency, Algorithmic Accountability…”
Get full text
Article -
207
Centering Patient and Clinician Voices in Developing Tools to Address Pain Related School Impairment: A Phase I Study of a Virtual Reality School Simulation for Children and Adolescents with Chronic Pain
Published 2023“…Following guidelines for developing user-centered VR interventions, initial phases of intervention development focus on understanding and incorporating patient and clinician perspectives when designing this digital health tool. …”
Get full text
Article -
208
A formal methodology for verifying side-channel vulnerabilities in cache architectures
Published 2023Subjects: Get full text
Conference Paper -
209
Loss of dignity : social dangers of a computerized society
Published 2024Subjects: Get full text
Academic theses. -
210
-
211
Fully automated differential fault analysis on software implementations of block ciphers
Published 2020Subjects: Get full text
Journal Article -
212
Enhanced hidden moving target defense in smart grids
Published 2019Subjects: Get full text
Get full text
Journal Article -
213
21A.100 Introduction to Anthropology, Fall 2004
Published 2004Subjects: Get full text
Learning Object -
214
Two sides of the same coin : boons and banes of machine learning in hardware security
Published 2022Subjects: Get full text
Journal Article -
215
-
216
-
217
-
218
Evaluation of the music collection at the National Institute of Education Library
Published 2011“…However, the Library fared relatively better, with 71.5% holdings, when a list of "Recommended Readings/References" drawn up by the Institute's academic staff was list-checked.…”
Get full text
Thesis -
219
Cost of the national malaria control program and cost-effectiveness of indoor residual spraying and insecticide-treated bed net interventions in two districts of Madagascar
Published 2024“…The cost-effectiveness ratio (CER) of ITN intervention was then compared to the CER of IRS intervention to identify the most cost-effective intervention. …”
Journal article -
220
ZkRep: a privacy-preserving scheme for reputation-based blockchain system
Published 2022“…Hence, they are vulnerable to slowly adaptive attackers, who can target validators with high reputation value to severely degrade the system performance. …”
Get full text
Journal Article