Protocol Procedure

Constant-round Blind Classical Verification of Quantum Sampling

Authors: Kai-Min Chung, Yi Lee, Han-Hsuan Lin, Xiaodi Wu | Published: 2020-12-09 | Updated: 2021-10-25
Protocol Procedure
Quantum Cryptography Technology
Function Definition

TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies

Authors: Zakwan Jaroucheh, Mohamad Alissa, William J Buchanan | Published: 2020-08-28
Protocol Procedure
Trust Evaluation Module
Information Gathering Methods

DeepWiFi: Cognitive WiFi with Deep Learning

Authors: Kemal Davaslioglu, Sohraab Soltani, Tugba Erpek, Yalin E. Sagduyu | Published: 2019-10-29
Simulation Environment
Data Generation
Protocol Procedure

Secure Evaluation of Quantized Neural Networks

Authors: Anders Dalskov, Daniel Escudero, Marcel Keller | Published: 2019-10-28 | Updated: 2021-03-01
Protocol Procedure
Model Architecture
Evaluation Method

Detecting Malignant TLS Servers Using Machine Learning Techniques

Authors: Sankalp Bagaria, R. Balaji, B. S. Bindhumadhava | Published: 2017-05-25
Protocol Procedure
Malicious Client
Feature Selection