Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 306
1.
  • Privacy Risks of Securing M... Privacy Risks of Securing Machine Learning Models against Adversarial Examples
    Song, Liwei; Shokri, Reza; Mittal, Prateek Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 11/2019
    Conference Proceeding
    Open access

    The arms race between attacks and defenses for machine learning models has come to a forefront in recent years, in both the security community and the privacy community. However, one big limitation ...
Full text
Available for: NUK, UL

PDF
2.
  • Comparative study of surrog... Comparative study of surrogate approaches while optimizing computationally expensive reaction networks
    Miriyala, Srinivas Soumitri; Mittal, Prateek; Majumdar, Saptarshi ... Chemical engineering science, 02/2016, Volume: 140
    Journal Article
    Peer reviewed

    Process modeling and optimization of polymerization processes with long chain branching is currently an area of extensive research owing to the advantages and growing popularity of branched polymers. ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
3.
Full text

PDF
4.
  • Website Fingerprinting in t... Website Fingerprinting in the Age of QUIC
    Smith, Jean-Pierre; Mittal, Prateek; Perrig, Adrian Proceedings on Privacy Enhancing Technologies, 04/2021, Volume: 2021, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    With the meteoric rise of the QUIC protocol, the supremacy of TCP as the de facto transport protocol underlying web traffic will soon cease. HTTP/3, the next version of the HTTP protocol, will not ...
Full text
Available for: NUK, UL, UM, UPUK
5.
  • Optical Signal Processing a... Optical Signal Processing and Stealth Transmission for Privacy
    Ben Wu; Shastri, Bhavin J.; Mittal, Prateek ... IEEE journal of selected topics in signal processing, 10/2015, Volume: 9, Issue: 7
    Journal Article
    Peer reviewed

    Optical encryption, key generation, and optical stealth transmission techniques for protecting the privacy of communication in optical networks are proposed and summarized. The signal processing ...
Full text
Available for: IJS, NUK, UL
6.
  • In search of flexible and r... In search of flexible and robust wind farm layouts considering wind state uncertainty
    Mittal, Prateek; Mitra, Kishalay Journal of cleaner production, 03/2020, Volume: 248
    Journal Article
    Peer reviewed

    Variations in wind states are generally ignored while designing the wind farm layouts. As a result, given the highly uncertain nature of wind the ability of the wind farms to produce power on a ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
7.
  • Determining layout of a win... Determining layout of a wind farm with optimal number of turbines: A decomposition based approach
    Mittal, Prateek; Mitra, Kishalay Journal of cleaner production, 11/2018, Volume: 202
    Journal Article
    Peer reviewed

    A novel suite of algorithms, exploiting the concept of Space And Variable decomposition based Evolutionary (SAVE) formulations, has been proposed while addressing the wind farm micro-siting. The ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
8.
  • DetectorGuard: Provably Sec... DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks
    Xiang, Chong; Mittal, Prateek Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 11/2021
    Conference Proceeding
    Open access

    State-of-the-art object detectors are vulnerable to localized patch hiding attacks, where an adversary introduces a small adversarial patch to make detectors miss the detection of salient objects. ...
Full text
Available for: NUK, UL

PDF
9.
  • Investigating Statistical P... Investigating Statistical Privacy Frameworks from the Perspective of Hypothesis Testing
    Liu, Changchang; He, Xi; Chanyaswad, Thee ... Proceedings on Privacy Enhancing Technologies, 07/2019, Volume: 2019, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Over the last decade, differential privacy (DP) has emerged as the gold standard of a rigorous and provable privacy framework. However, there are very few practical guidelines on how to apply ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
10.
  • Micrositing under practical... Micrositing under practical constraints addressing the energy‐noise‐cost trade‐off
    Mittal, Prateek; Mitra, Kishalay Wind energy (Chichester, England), October 2020, Volume: 23, Issue: 10
    Journal Article
    Peer reviewed

    Wind energy is running well ahead of its peers to deal with the demand–supply and environmental crisis due to fossil fuels. However, continuous exploitation of land led wind farms built in close ...
Full text
Available for: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
1 2 3 4 5
hits: 306

Load filters