Search alternatives:
ceers » cheers (Expand Search), peers (Expand Search), beers (Expand Search)
sheers » sheets (Expand Search), sheer (Expand Search), shears (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
trackers » tracker (Expand Search), traces (Expand Search), tracks (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
checks » check (Expand Search)
ceers » cheers (Expand Search), peers (Expand Search), beers (Expand Search)
sheers » sheets (Expand Search), sheer (Expand Search), shears (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
trackers » tracker (Expand Search), traces (Expand Search), tracks (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
checks » check (Expand Search)
-
41
Counter-checking uncertainty calculations in Bayesian operational modal analysis with EM techniques
Published 2024“…While the existing semi-analytical approach is still preferred for Hessian calculations in applications for its high definitive accuracy and speed, the proposed Monte Carlo solution offers a convenient means for counter-checking during code development. Theoretical implications of the identity will be discussed and numerical examples will be given to illustrate implementation aspects.…”
Get full text
Journal Article -
42
A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems
Published 2013“…The extant RFID security protocols have serious insufficiency and flaws to resistance trace attacks and desynchronization attacks. In this paper, we propose a security protocol that can against the intermittent position trace attacks and desynchronization attacks. …”
Get full text
Get full text
Journal Article -
43
Web-based application development for EEE peer tutoring scheme
Published 2024Get full text
Final Year Project (FYP) -
44
Gradient-Based Adversarial Training on Transformer Networks for Detecting Check-Worthy Factual Claims
Published 2024“…s claim-spotting model, which tackles the critical task of identifying check-worthy claims from large streams of information. …”
Get full text
Article -
45
-
46
US trade policy on PV panels is a reality check for Southeast Asia ties
Published 2023Get full text
Commentary -
47
Demonstration of attacks on SSL-TLS protocols
Published 2022“…What is the impact of this attack? 5. What are some strategies to mitigate this attack?…”
Get full text
Final Year Project (FYP) -
48
Study on attacks against federated learning
Published 2022“…The focus is on the coordinated backdoor attack with model-dependant triggers for attack methodology and robust learning rates for defence methodology. …”
Get full text
Final Year Project (FYP) -
49
Differential privacy and membership inference attacks
Published 2023“…Membership inference is a type of attack that identifies the members of the training dataset. …”
Get full text
Final Year Project (FYP) -
50
The political economy of FDI location : why don't political checks and balances and treaty constraints matter?
Published 2009“…I ask whether domestic political checks and balances and international legal instruments that aim to protect FDI enable governments to commit credibly to avoid future policies that diminish the value of suck FDI. …”
Get full text
Get full text
Working Paper -
51
Toward human-centered automated driving: a novel spatiotemporal vision transformer-enabled head tracker
Published 2022“…By analyzing the error distribution of the estimation model and the user experience of the head tracker, the proposed AKF includes an adaptive observation noise coefficient; this can adaptively moderate the smoothness of the curve. …”
Get full text
Journal Article -
52
-
53
Developing student feedback literacy through self and peer assessment interventions
Published 2021Subjects: Get full text
Journal Article -
54
2020 Jolo suicide attack : evolving tactics
Published 2020“…The 24 August 2020 suicide bombing in Jolo which involved female attackers has brought attention to the emergence of the pro-Islamic State (IS) Hatib Hajan Sawadjaan faction of the Abu Sayyaf Group and its tactic of engaging women for this role.…”
Get full text
Commentary -
55
Class-based attack on graph convolution network
Published 2022“…Recent study has been shown that graph convolutional networks are vulnerable to adversary attacks, causing a severe threat to real world application. …”
Get full text
Final Year Project (FYP) -
56
Protecting neural networks from adversarial attacks
Published 2024“…This project investigates how Searchable Symmetric Encryption (SSE) can be applied to neural networks as a form of protection from adversarial attacks and the viability of such an implementation. …”
Get full text
Final Year Project (FYP) -
57
Leveraging imperfect restoration for data availability attack
Published 2024Subjects: Get full text
Get full text
Conference Paper -
58
Collusion attacks for digital fingerprinting of image and video
Published 2008“…In this thesis, three existing linear and non-linear collusion attacks on image/video fingerprinting, namely averaging collusion attack, maximum-minimum collusion attack, and Stone's zero-correlation collusion attack, are studied and analysed. …”
Get full text
Thesis -
59
Investigation on effective solutions against insider attacks
Published 2018Get full text
Final Year Project (FYP) -
60
Co-resident attacks on public cloud infrastructures
Published 2019“…This report proposes a novel virtual machine (VM) placement technique called "Grouped Instance" in response to the rise of co-location side-channel attack in public cloud infrastructure. This is a simple yet effective algorithm, of which origin is to limit the spreading area of malicious users by restricting the VM placement area of a user into a small group of users. …”
Get full text
Final Year Project (FYP)