Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Ata de Congresso
|
Multi-task Correlation Particle Filter for Robust Object TrackingTianzhu Zhang ; Changsheng Xu ; Ming-Hsuan Yang2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017, p.4819-4827IEEESem texto completo |
|
2 |
Material Type: Ata de Congresso
|
Adversarial Sensor Attack on LiDAR-based Perception in Autonomous DrivingCao, Yulong ; Xiao, Chaowei ; Cyr, Benjamin ; Zhou, Yimeng ; Park, Won ; Rampazzi, Sara ; Chen, Qi Alfred ; Fu, Kevin ; Mao, Z. MorleyProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, p.2267-2281New York, NY, USA: ACMTexto completo disponível |
|
3 |
Material Type: Artigo
|
Fixed-parameter algorithms for graph constraint logicHatanaka, Tatsuhiko ; Hommelsheim, Felix ; Ito, Takehiro ; Kobayashi, Yusuke ; Mühlenthaler, Moritz ; Suzuki, AkiraTheoretical computer science, 2023-05, Vol.959, p.113863, Article 113863 [Periódico revisado por pares]Elsevier B.VTexto completo disponível |
|
4 |
Material Type: Ata de Congresso
|
EV-Gait: Event-Based Robust Gait Recognition Using Dynamic Vision SensorsWang, Yanxiang ; Du, Bowen ; Shen, Yiran ; Wu, Kai ; Zhao, Guangrong ; Sun, Jianguo ; Wen, Hongkai2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2019, p.6351-6360IEEESem texto completo |
|
5 |
Material Type: Ata de Congresso
|
Max-SIFT: Flipping invariant descriptors for Web logo searchLingxi Xie ; Qi Tian ; Bo Zhang2014 IEEE International Conference on Image Processing (ICIP), 2014, p.5716-5720IEEESem texto completo |
|
6 |
Material Type: Ata de Congresso
|
Modeling attacks on physical unclonable functionsRührmair, Ulrich ; Sehnke, Frank ; Sölter, Jan ; Dror, Gideon ; Devadas, Srinivas ; Schmidhuber, JürgenProceedings of the 17th ACM conference on Computer and communications security, 2010, p.237-249New York, NY, USA: ACMTexto completo disponível |
|
7 |
Material Type: Artigo
|
BlobSeer: Next-generation data management for large scale infrastructuresNicolae, Bogdan ; Antoniu, Gabriel ; Bougé, Luc ; Moise, Diana ; Carpen-Amarie, AlexandraJournal of parallel and distributed computing, 2011-02, Vol.71 (2), p.169-184 [Periódico revisado por pares]Elsevier IncTexto completo disponível |
|
8 |
Material Type: Ata de Congresso
|
Model inversion attacks against collaborative inferenceHe, Zecheng ; Zhang, Tianwei ; Lee, Ruby B.Proceedings of the 35th Annual Computer Security Applications Conference, 2019, p.148-162New York, NY, USA: ACMTexto completo disponível |
|
9 |
Material Type: Artigo
|
Kerckhoffs-Based Embedding Security Classes for WOA Data HidingCayre, F. ; Bas, P.IEEE transactions on information forensics and security, 2008-03, Vol.3 (1), p.1-15 [Periódico revisado por pares]New York: IEEETexto completo disponível |
|
10 |
Material Type: Ata de Congresso
|
Attacks on Java Card 3.0 Combining Fault and Logical AttacksBarbu, Guillaume ; Thiebeauld, Hugues ; Guerin, Vincent Iguchi-Cartigny, Julien ; Gollmann, Dieter ; Lanet, Jean-LouisSmart Card Research and Advanced Application, 2010, Vol.6035, p.148-163 [Periódico revisado por pares]Berlin, Heidelberg: Springer Berlin HeidelbergSem texto completo |