暂无分享,去创建一个
Pei-Chi Huang | Xin Zhong | Spyridon Mastorakis | Reza Tourani | Spyridon Mastorakis | R. Tourani | Pei-Chi Huang | Xin Zhong
[1] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[2] Xiaojiang Du,et al. A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security , 2018, IEEE Communications Surveys & Tutorials.
[3] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[4] Gorthi R. K. Sai Subrahmanyam,et al. Exploring the learning capabilities of convolutional neural networks for robust image watermarking , 2017, Comput. Secur..
[5] Sergey Ioffe,et al. Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning , 2016, AAAI.
[6] Yi Zhou,et al. Understanding the Mirai Botnet , 2017, USENIX Security Symposium.
[7] Boubakr Nour,et al. Compute-Less Networking: Perspectives, Challenges, and Opportunities , 2020, IEEE Network.
[8] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[9] Michael M. Stark. QR Codes: The Technical Guide , 2021 .
[10] P. Alam. ‘G’ , 2021, Composites Engineering: An A–Z Guide.
[11] Pietro Perona,et al. Microsoft COCO: Common Objects in Context , 2014, ECCV.
[12] P. Alam. ‘S’ , 2021, Composites Engineering: An A–Z Guide.
[13] Bernard Aboba,et al. Extensible Authentication Protocol (EAP) , 2004, RFC.
[14] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[15] Tuomas Aura,et al. Evaluation of Out-of-Band Channels for IoT Security , 2020, SN Comput. Sci..
[16] J. Isern,et al. Technical Guide , 2020, Definitions.
[17] Tapio Seppänen,et al. CAMERA BASED WATERMARK EXTRACTION – PROBLEMS AND EXAMPLES , 2007 .
[18] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[19] Klaus-Robert Müller,et al. Efficient BackProp , 2012, Neural Networks: Tricks of the Trade.
[20] Jie Tang,et al. Enabling Deep Learning on IoT Devices , 2017, Computer.
[21] Walid Saad,et al. Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things , 2017, 2018 IEEE International Conference on Communications (ICC).
[22] Heung-Kyu Lee,et al. Finding robust domain from attacks: A learning framework for blind watermarking , 2017, Neurocomputing.
[23] Danna Zhou,et al. d. , 1840, Microbial pathogenesis.
[24] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[25] W. Hager,et al. and s , 2019, Shallow Water Hydraulics.
[26] Tsuyoshi Murata,et al. {m , 1934, ACML.
[27] Frank Y. Shih,et al. A Robust Image Watermarking System Based on Deep Neural Networks , 2019, ArXiv.
[28] Teddy Furon,et al. Are Deep Neural Networks good for blind image watermarking? , 2018, 2018 IEEE International Workshop on Information Forensics and Security (WIFS).
[29] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[30] Charlie Kaufman,et al. Internet Key Exchange (IKEv2) Protocol , 2005, RFC.
[31] Saman A. Zonouz,et al. CloudID: Trustworthy cloud-based and cross-enterprise biometric identification , 2015, Expert Syst. Appl..
[32] Satyajayant Misra,et al. ICedge: When Edge Computing Meets Information-Centric Networking , 2020, IEEE Internet of Things Journal.
[33] Mianxiong Dong,et al. Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing , 2018, IEEE Network.
[34] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[35] Héctor M. Pérez Meana,et al. A Robust Image Zero-watermarking using Convolutional Neural Networks , 2019, 2019 7th International Workshop on Biometrics and Forensics (IWBF).
[36] Kim-Kwang Raymond Choo,et al. Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond , 2018, IEEE Cloud Computing.