نتایج جستجو برای: attack

تعداد نتایج: 80818  

Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated to linear equations with high probability. The probabilistic equations could be considered as l...

اسماعیلی , روانبخش, جعفری , هدایت, رهنما , نیلوفر, شفیع پور , ویدا, مختارپور , راضیه, نصیری , ابراهیم,

Background and purpose:Coronary artery disease (CAD) particularly of the acute myocardial infraction (MI) is one of the main causes of mortality in the developing countries. Considering the complication of the disease, the aim of this study was to investigate risk and accelerating factors of heart attack and the reason of the patients' delay in referring to Mazandaran Cardiac Center in 2009. ...

Journal: :Hong Kong Journal of Emergency Medicine 2010

Journal: :PS: Political Science & Politics 2000

Journal: :journal of advances in computer research 0

binary decision diagram (in short bdd) is an efficient data structure which has been used widely in computer science and engineering. bdd-based attack in key stream cryptanalysis is one of the best forms of attack in its category. in this paper, we propose a new key stream attack which is based on zdd(zero-suppressed bdd). we show how a zdd-based key stream attack is more efficient in time and ...

Journal: :Royal United Services Institution. Journal 1910

Journal: :Computer Vision and Image Understanding 2021

Many recent studies have shown that deep neural models are vulnerable to adversarial samples: images with imperceptible perturbations, for example, can fool image classifiers. In this paper, we present the first type-specific approach generating examples object detection, which entails detecting bounding boxes around multiple objects in and classifying them at same time, making it a harder task...

An extensive experimental investigation to study the flow structure over the wing of a fighter type configuration model has been conducted. The model used for this study was similar to the High Alpha Research Vehicle (HARV) that has been used in various European research centers for studying its force and moment characteristics. Tests were conducted at two subsonic speeds and at low to moderate...

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید