Constant-round Blind Classical Verification of Quantum Sampling Authors: Kai-Min Chung, Yi Lee, Han-Hsuan Lin, Xiaodi Wu | Published: 2020-12-09 | Updated: 2021-10-25 Protocol ProcedureQuantum Cryptography TechnologyFunction Definition 2020.12.09 2025.05.28 Literature Database
TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies Authors: Zakwan Jaroucheh, Mohamad Alissa, William J Buchanan | Published: 2020-08-28 Protocol ProcedureTrust Evaluation ModuleInformation Gathering Methods 2020.08.28 2025.05.28 Literature Database
DeepWiFi: Cognitive WiFi with Deep Learning Authors: Kemal Davaslioglu, Sohraab Soltani, Tugba Erpek, Yalin E. Sagduyu | Published: 2019-10-29 Simulation EnvironmentData GenerationProtocol Procedure 2019.10.29 2025.05.28 Literature Database
Secure Evaluation of Quantized Neural Networks Authors: Anders Dalskov, Daniel Escudero, Marcel Keller | Published: 2019-10-28 | Updated: 2021-03-01 Protocol ProcedureModel ArchitectureEvaluation Method 2019.10.28 2025.05.28 Literature Database
Detecting Malignant TLS Servers Using Machine Learning Techniques Authors: Sankalp Bagaria, R. Balaji, B. S. Bindhumadhava | Published: 2017-05-25 Protocol ProcedureMalicious ClientFeature Selection 2017.05.25 2025.05.28 Literature Database