Neural Language Models

Get Complete Project Material File(s) Now! » Open Domain Question Answering Question Answering (QA) aims to provide precise answers in response to the user’s questions in natural language. QA can be divided into two types: Knowledge Base KB-QA and Textual...

Work Environment, Ransomware Samples and Evasion 

Get Complete Project Material File(s) Now! » Signature Based Detection (SBD) The static analysis enables a signature-based code classification. For example, if a malicious piece of code is found within the executable, an antivirus will drop the complete package. Nevertheless,...

Redefining the relationship between safety and security

Get Complete Project Material File(s) Now! » The difficulty of mixing safety and security Historically, safety and security models are monolithic: they only consider safety or security but not both. This is another by-product of a separation by design between...

Privacy-preserving classification based on quadratic polynomial functional encryption

Get Complete Project Material File(s) Now! » Decisional Diffie-Hellman assumption The Decisional Diffie-Hellman assumption (DDH) has been used to prove that the Diffie-Hellman protocol [DH76a] was useful for practical crypto-graphic purposes. It speaks about groups and in practice those are...

Security and privacy consequences of flow transformations

Get Complete Project Material File(s) Now! » Protection of user privacy thanks to address obfuscation Since IP addresses are also used to identify and to track users of the Internet, it is important to provide solutions to obfuscate their addresses....

Privacy-enhanced RFID Middleware in the EPCglobal Networks 

Get Complete Project Material File(s) Now! » The Solitaire Keystream Algorithm Solitaire generates its keystream using a deck of cards. Each card in the deck (54 cards, including the 2 jokers) corresponds to a number 1 to 54. We could...

A study of general and security Stackelberg game formulations 

Get Complete Project Material File(s) Now! » General Stackelberg games{GSGs Let K be the set of p followers. We denote by I the set of leader pure strategies and by J the set of follower pure strategies. The leader has...

Security assumptions and analysis with standard imperfections.

Get Complete Project Material File(s) Now! » Mathematical Preliminaries In this Section we will present some basic notions of linear algebra that we will be using during the rest of the thesis. Two readings that provide a more detailed introduction...

Practical security for trusted and untrusted payment terminals 

Get Complete Project Material File(s) Now! » Second resource: quantum entanglement The second crucial resource of quantum information is quantum entanglement, which arises when considering composite Hilbert spaces and multi-partite quantum states (shared between different parties). This property is a...

Impact of AQM policy and LPCC protocol

Get Complete Project Material File(s) Now! » Active Queue Management (AQM) Traditional routers use drop-tail discipline in queues holding packets to be scheduled on each interface, and drop packets only when the queue is full. This mechanism tends to cause...