Showing 41 - 60 results of 12,718 for search '(((beens OR shears) OR (cheaters OR (attackers OR check))) OR peer)', query time: 0.17s Refine Results
  1. 41

    Biometric efficient identification algorithm and network authentication system with robust liveness check by Zhu, Jiaqi

    Published 2010
    “…Few people like it, as username plus password is neither easy to remember nor strong against attacks. Biometrics offers an alternative to the traditional authentication techniques. …”
    Get full text
    Thesis
  2. 42

    Counter-checking uncertainty calculations in Bayesian operational modal analysis with EM techniques by Ma, Xinda, Au, Siu-Kui

    Published 2024
    “…While the existing semi-analytical approach is still preferred for Hessian calculations in applications for its high definitive accuracy and speed, the proposed Monte Carlo solution offers a convenient means for counter-checking during code development. Theoretical implications of the identity will be discussed and numerical examples will be given to illustrate implementation aspects.…”
    Get full text
    Journal Article
  3. 43

    A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems by Shu, Yantai, Gao, Lijun, Ma, Maode, Wei, Yuhua

    Published 2013
    “…The extant RFID security protocols have serious insufficiency and flaws to resistance trace attacks and desynchronization attacks. In this paper, we propose a security protocol that can against the intermittent position trace attacks and desynchronization attacks. …”
    Get full text
    Get full text
    Journal Article
  4. 44
  5. 45

    Localised and bifurcating structures in planar shear flows by Wang, Zhe

    Published 2020
    “…In the present thesis, those flow structures, i.e. quadrupolar flows and streamwise vortices have been treated analytically : By exploiting the geometric scale separation inscribed in all planar shear flows, equations governing the large-scale flow surrounding turbulent spots has been derived from the Navier-Stokes equations and solved analytically. …”
    Get full text
    Thesis-Doctor of Philosophy
  6. 46

    Wearable bioadhesive ultrasound shear wave elastography by Liu, Hsiao-Chuan, Zeng, Yushun, Gong, Chen, Chen, Xiaoyu, Kijanka, Piotr, Zhang, Junhang, Genyk, Yuri, Tchelepi, Hisham, Wang, Chonghe, Zhou, Qifa, Zhao, Xuanhe

    Published 2024
    “…In this study, we introduce wearable bioadhesive ultrasound elastography (BAUS-E), which can generate acoustic radiation force impulse (ARFI) to induce shear waves for the continuous monitoring of modulus changes. …”
    Get full text
    Article
  7. 47

    Shear annealing of a self-interacting sheet by Funkenbusch, William T, Silmore, Kevin S, Doyle, Patrick S

    Published 2024
    “…Previous computational studies have observed 2D sheets in shear and extensional flows, but have focused on steady flows, even though the dynamics of these materials might exhibit hysteresis. …”
    Get full text
    Article
  8. 48

    Modified triaxial apparatus for shearing-infiltration test by Rahardjo, Harianto, Leong, Eng Choon, Wong, J. C., Toll, David G.

    Published 2011
    “…A triaxial apparatus was modified and developed for performing shearing-infiltration tests under saturated and unsaturated conditions. …”
    Get full text
    Get full text
    Journal Article
  9. 49

    Shear behaviour of high-strength concrete beams by He, Lihua.

    Published 2008
    “…The rapidly increasing use of high strength concrete as an alternative to the more classical materials (normal strength concrete) requires knowledge by the design engineer of HSC behaviour in shear. The experimental investigation conducted in this project is important to evaluate the current design methods used for shear design of HSC beams, and the theoretical model proposed in this research for reinforced concrete element is capable of predicting not only the ultimate shear strength but also the load-deformation response of concrete elements subjected to in-plane shear and normal stresses.…”
    Get full text
    Thesis
  10. 50
  11. 51
  12. 52

    Gradient-Based Adversarial Training on Transformer Networks for Detecting Check-Worthy Factual Claims by Meng, Kevin, Jimenez, Damian, Devasier, Jacob, Naraparaju, Sai Sandeep, Arslan, Fatma, Obembe, Daniel, Li, Chengkai

    Published 2024
    “…s claim-spotting model, which tackles the critical task of identifying check-worthy claims from large streams of information. …”
    Get full text
    Article
  13. 53
  14. 54

    Demonstration of attacks on SSL-TLS protocols by Iyer Rajagopal Mahadevan

    Published 2022
    “…Over the last decade there have been multiple attacks on SSL-TLS in order to break the encryption and obtain the sensitive information that was encrypted. …”
    Get full text
    Final Year Project (FYP)
  15. 55

    Study on attacks against federated learning by Guo, Feiyan

    Published 2022
    “…The focus is on the coordinated backdoor attack with model-dependant triggers for attack methodology and robust learning rates for defence methodology. …”
    Get full text
    Final Year Project (FYP)
  16. 56

    Differential privacy and membership inference attacks by Ong, Ting Yu

    Published 2023
    “…Membership inference is a type of attack that identifies the members of the training dataset. …”
    Get full text
    Final Year Project (FYP)
  17. 57
  18. 58
  19. 59

    The political economy of FDI location : why don't political checks and balances and treaty constraints matter? by Walter, Andrew

    Published 2009
    “…I ask whether domestic political checks and balances and international legal instruments that aim to protect FDI enable governments to commit credibly to avoid future policies that diminish the value of suck FDI. …”
    Get full text
    Get full text
    Working Paper
  20. 60