Search alternatives:
attack inversion » attack intension, stack inversion, attack version

1
by Chen, Jinyin, Zhang, Ximin, Zheng, Haibin
Published 2024
Springer Nature Singapore
Table of Contents: ... on Critical Areas -- Neuron-level Inverse Perturbation Against Adversarial Attacks -- Adaptive Channel...

2
by Sun, Kun, Wang, Shu
Published 2024
Springer Nature Switzerland
Table of Contents: ...: Parameters in Detection Methods -- Appendix 2.C: Inverse Filter Implementation -- Appendix 2.D: Classifiers...

3
by Creaco, Enrico
Published 2021
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...inverse transient analysis (ITA)...

4
by Gasparetto, Alessandro
Published 2022
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...terrorist attacks...

5
by Reinoso Garcia, Oscar
Published 2020
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...inverse compositional Gauss-Newton algorithm...

6
by Sidorov, Denis N.
Published 2020
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...inverse problems...

7
Published 2014
Springer International Publishing
Table of Contents: ... Threatening my Hazards? -- Complicating Process Identification by Replacing Process Information for Attack...

8
by Deb, Dipankar, Burkholder, Jason, Tao, Gang
Published 2022
Springer Nature Singapore
Table of Contents: ...Introduction -- Active Flow Control -- Adaptive Compensation at Low Angles of Attack: Linear...

9
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Attack of SNOW 2.0 with Linear Masking Method -- Cryptographic Primitives -- On the Use of GF-Inversion...

10
by van Tilborg, Henk C.A.
Published 1988
Springer US
Table of Contents: ... attack -- 11.3. The Lagarias and Odlyzko attack -- 12. Threshold Schemes -- 13. Other Directions...

11
Published 1992
Springer Berlin Heidelberg
Table of Contents: ... with Space Bounded Provers -- Functional Inversion and Communication Complexity -- The Use of Interaction...

12
Published 2022
Springer International Publishing
Table of Contents: ... Polynomial Inversion at Arbitrary Order -- A Power Side-Channel Attack on the Reed-Muller Reed-Solomon...

13
by Todd, J.
Published 1977
Birkhäuser
Table of Contents: ... -- 4. The Inversion Problem I: Theoretical Arithmetic -- 5. The Inversion Problem II: Practical...

14
Published 2005
Springer Berlin Heidelberg
Table of Contents: ...Cryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES – A Brief Survey...

15
Published 2024
Springer Nature Singapore
Table of Contents: ... Quantum Multi collision Distinguishers and Rebound Attacks with Triangulation Algorithm -- Lattice based...

16
by Eggers, Joachim, Girod, Bernd
Published 2002
Springer US
Table of Contents: ... attacks -- A.3 Derivation Details for Inverse SCS Mapping -- A.4 SCS Watermarking Facing Scalar...

17
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... -- Efficient Techniques for High-Speed Elliptic Curve Cryptography -- Side-Channel Attacks and Countermeasures...

18
Published 1999
Springer Berlin Heidelberg
Table of Contents: ...-Permutation Protection Scheme against Modification Attack -- Inversion Attack and Branching -- Signatures...

19
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... -- Attacking the Inverse Electromagnetic Problem of the Heart with Computationally Compatible Anatomical...

20
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Modular Multiplication -- Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography...