Sciweavers

3556 search results - page 6 / 712
» Can machine learning be secure
Sort
View
CHES
2011
Springer
240views Cryptology» more  CHES 2011»
14 years 20 days ago
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
A lightweight and secure key storage scheme using silicon Physical Unclonable Functions (PUFs) is described. To derive stable PUF bits from chip manufacturing variations, a lightwe...
Meng-Day (Mandel) Yu, David M'Raïhi, Richard ...
75
Voted
IJCNN
2007
IEEE
15 years 7 months ago
Range Data Approximation for Mobile Robot by Using CAN2
— In this article, we apply the competitive associative net called CAN2 to the processing of the range data of indoor environment acquired by a mobile robot, where the CAN2 is a ...
Takeshi Nishida, Shuichi Kurogi, Yuji Takemura, Hi...
127
Voted
FORTE
2008
15 years 2 months ago
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning
Network-based fuzz testing has become an effective mechanism to ensure the security and reliability of communication protocol systems. However, fuzz testing is still conducted in a...
Guoqiang Shu, Yating Hsu, David Lee
COLT
2006
Springer
15 years 2 months ago
Can Entropic Regularization Be Replaced by Squared Euclidean Distance Plus Additional Linear Constraints
There are two main families of on-line algorithms depending on whether a relative entropy or a squared Euclidean distance is used as a regularizer. The difference between the two f...
Manfred K. Warmuth
SIGOPS
2008
146views more  SIGOPS 2008»
15 years 18 days ago
Vigilant: out-of-band detection of failures in virtual machines
What do our computer systems do all day? How do we make sure they continue doing it when failures occur? Traditional approaches to answering these questions often involve inband m...
Dan Pelleg, Muli Ben-Yehuda, Richard Harper, Lisa ...