Abstract: Deep learning-based image watermarking algorithms have been widely studied as an important technology for copyright protection. These methods utilize an end-to-end architecture with an ...
Abstract: As a combination of algebraic attacks and side-channel attacks, the ASCA (Algebraic Side-Channel Attack) has become a very effective attack against block ciphers. From cryptographic ...
Functions in this package provide solution to classical problem in survey methodology - an optimum sample allocation in stratified sampling. In this context, the optimal allocation is in the classical ...
Introducing UNITILITY - the Java library designed to simplify physics unit conversions and provide intuitive business types that represent aggregated physical quantities, including their type, value, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results