61
Bhasin, Shivam
2024
Table of Contents:
“... -- PQ.V.ALU.E: Post-Quantum RISC-V Custom ALU Extensions on Dilithium and Kyber -- Side-Channel & Neural Networks: Keep it unsupervised: Horizontal attacks meet simple classifiers -- Deep Stacking Ensemble Learning applied to Profiling Side-Channel Attacks -- Like...”2024
Full text
62
Ge, Chunpeng
2024
Table of Contents:
“...-Based Indoor Localization Scheme with Bilateral Privacy -- A Practical Multi-Candidate Voting Protocol on Quantum Blockchain Adapted for Various Tally Principles -- Quantum Augmented Lattice Attack on NTRU with Side Information -- Quantum Attacks: A View...”2024
Full text
63
Ge, Chunpeng
2024
Table of Contents:
“... -- Compact Ring Signatures with Post-Quantum Security in Standard Model -- Secure Multi-Party SM2 Signature based on SPDZ Protocol -- Blockchain: Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption -- A General Federated Learning...”2024
Full text
64
Choi, Bong Jun
2024
Table of Contents:
“... in endoscopic images -- Exploring Quantum Machine Learning for Early Disease Detection: Perspectives, Challenges, and Opportunities -- Human-Robot Interaction and Intelligent Interfaces -- Subject-Independent Brain-Computer Interfaces: A Comparative Study...”2024
Full text
65
Choi, Bong Jun
2024
Table of Contents:
“... -- Wearable-based SLAM with Sensor Fusion in Firefighting Operations -- The Novel Electrocardiograph Sensor and Algorithm for Arrhythmia Computer Aided Detection -- Optimizing Sensor Subset Selection with Quantum Annealing: A Large-Scale Indoor Temperature...”2024
Full text
66
Kim, Suhri
2024
Table of Contents:
“...Cryptanalysis & Quantum Cryptanalysis -- Enhancing the Related-Key Security of PIPO through New Key Schedules -- Distinguisher and Related-Key Attack on HALFLOOP 96 -- Revisiting Key Switching Techniques with Applications to Light-Key FHE -- Optimized...”2024
Full text
67
Kim, Suhri
2024
Table of Contents:
“... Searchable Encryption with Forward and Backward Privacy -- Finsler Encryption -- Feasibility Analysis and Performance Optimization of the Conflict Test Algorithms for Searching Eviction Set -- Korean Post Quantum Cryptography -- Theoretical and Empirical Analysis...”2024
Full text
68
69
Bhasin, Shivam
2024
Table of Contents:
“... Functions -- Distributed Protocols for Oblivious Transfer and Polynomial Evaluation -- Obfuscating Decision Trees -- Privacy-Preserving Plagiarism Checking -- PURED: A unified framework for resource-hard functions -- Post-quantum cryptography -- Implementing...”2024
Full text
70
71
Singh, Pritpal
2024
Table of Contents:
“... -- Chapter 4 Brain tumor segmentation using type-2 neutrosophic thresholding approach -- Chapter 5 COVID-19 scan image segmentation using quantum-clustering approach -- Chapter 6 Empirical Analyses....”2024
Full text
72
Malhotra, Ruchika
2024
Table of Contents:
“... Convolutional Neural Networks -- Reinforcement Learning Based Spectrum Sensing And Resource Allocation In WSN-IoT Smart Applications -- Planning and Construction of a Quantum Model of the SHA-1 Algorithm Using IBM's Qiskit -- Machine Learning Based Path-loss...”2024
Full text
73
74
75
Conti, Claudio
2024
Table of Contents:
“...Chapter 1: Quantum mechanics and data-driven physics -- Chapter 2: Kernelizing quantum mechanics -- Chapter 3: Qubit maps -- Chapter 4: One qubit transverse-field Ising model and variational quantum algorithms -- Chapter 5: Two-qubit transverse-field...”2024
Full text
76
77
78
79
Debertolis, Maxime
2024
Table of Contents:
“...The Quantum Impurity Problem -- IRLM and Kondo Correlations -- Few-body Nature of Kondo Correlated Ground States -- Recursive generation of Natural Orbitals -- RGNO Study of Screening Clouds in Disordered Environments....”2024
Full text
80