نتایج جستجو برای: composite fingerprinting

تعداد نتایج: 130702  

Journal: :Computer Physics Communications 2021

Significant progress in many classes of materials could be made with the availability experimentally-derived large datasets composed atomic identities and three-dimensional coordinates. Methods for visualizing local structure, such as atom probe tomography (APT), which routinely generate comprised millions atoms, are an important step realizing this goal. However, state-of-the-art APT instrumen...

2003
Christian Collberg Stephen Kobourov Edward Carter

In this paper, we discuss graph-theoretic approaches to software watermarking and fingerprinting. Software watermarking is used to discourage intellectual property theft and software fingerprinting is used to trace intellectual property copyright violations. We focus on two algorithms that encode information in software through the use of graph structures. We then consider the different attack ...

2005
Norzima Elbegbayan Tina Lindkvist

Among digital data, documents are the easiest to copy and remove any signatures or fingerprints embedded, which make the pirating the hardest to detect. Anyone can just retype a document or copy a part of it. Document fingerprinting is concerned with accurately identifying and copying, including small partial copies, within large sets of documents. We will make a literature study of Winnowing, ...

Nowadays, plants have been considered as powerful agents for treatment of disorders regarding to their traditional use. In Iranian Traditional Medicine (ITM), plants have a special role in the treatment of various diseases. Burns with their devastating outcomes have been discussed in ITM as well. In the present study, a polyherbal ointment (PHO), retrieved from ITM, was formulated for burn heal...

Journal: :Annali dell'Istituto superiore di sanita 2007
Paul Johnson Robin Williams

The recent loss of confidence in textual and verbal methods for validating the identity claims of individual subjects has resulted in growing interest in the use of biometric technologies to establish corporeal uniqueness. Once established, this foundational certainty allows changing biographies and shifting category memberships to be anchored to unchanging bodily surfaces, forms or features. O...

2002
Christopher R. Braden Jack T. Crawford Barbara A. Schable

Quality assessment exercises were conducted to evaluate the reproducibility of IS6110 DNA fingerprinting performed by eight laboratories in the National Tuberculosis Genotyping and Surveillance Network. Three panels, each with 8 to 16 isolates, were typed at all laboratories, resulting in 280 images. When the pattern obtained by the majority for each isolate was used as the standard, exact matc...

Journal: :Proceedings on Privacy Enhancing Technologies 2021

Abstract We introduce Generative Adversarial Networks for Data-Limited Fingerprinting (GANDaLF), a new deep-learning-based technique to perform Website (WF) on Tor traffic. In contrast most earlier work deep-learning WF, GANDaLF is intended with few training samples, and achieves this goal through the use of Network generate large set “fake” data that helps train deep neural network in distingu...

Journal: :PoPETs 2016
Tao Wang Ian Goldberg

Website fingerprinting allows a local, passive observer monitoring a web-browsing client’s encrypted channel to determine her web activity. Previous attacks have shown that website fingerprinting could be a threat to anonymity networks such as Tor under laboratory conditions. However, there are significant differences between laboratory conditions and realistic conditions. First, in laboratory ...

Journal: :CoRR 2018
Tao Wang

Traffic analysis attacks to identify which web page a client is browsing, using only her packet metadata — known as website fingerprinting — has been proven effective in closed-world experiments against privacy technologies like Tor. However, due to the base rate fallacy, these attacks have failed in large open-world settings against clients that visit sensitive pages with a low base rate. We f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید