Search

Your search keyword '"D Fiore"' showing total 110 results

Search Constraints

Start Over You searched for: "D Fiore" Remove constraint "D Fiore" Publication Type Academic Journals Remove constraint Publication Type: Academic Journals Publisher ieee Remove constraint Publisher: ieee
110 results on '"D Fiore"'

Search Results

1. List of Reviewers.

2. Efficient Defenses Against Output Poisoning Attacks on Local Differential Privacy.

3. Learning-Based Cooperative Multiagent Formation Control With Collision Avoidance.

4. Authenticated and Prunable Dictionary for Blockchain-Based VNF Management.

5. Shaping Impedances to Comply With Constrained Task Dynamics.

6. Electrically Small Piezocomposite Strain Antennas.

7. PPDDS: A Privacy-Preserving Disease Diagnosis Scheme Based on the Secure Mahalanobis Distance Evaluation Model.

8. Fair Outsourcing Polynomial Computation Based on the Blockchain.

9. A Perspective on Time Toward Wireless 6G.

10. Anonymous Privacy-Preserving Consensus via Mixed Encryption Communication.

12. Info-Commit : Information-Theoretic Polynomial Commitment.

13. Cybergenetics: Theory and Applications of Genetic Control Systems.

14. Metabolic Networks, Microbial Consortia, and Analogies to Smart Grids.

15. Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization.

16. Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus.

17. In-Band Full-Duplex Operation in High-Speed Mobile Environments: Not So Fast!.

18. Evolution of Circular Mode Phasing for In-Band Full-Duplex Omnidirectional Antennas.

19. State-of-the-Art Integrated Guidance and Control Systems in Unmanned Vehicles: A Review.

20. Resilient Consensus of Multi-Agent Systems With Switching Topologies: A Trusted-Region-Based Sliding-Window Weighted Approach.

21. Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs.

22. Multichannel Esophageal Heart Rate Monitoring of Preterm Infants.

23. Privacy-Preserving Leader-Following Consensus via Node-Augment Mechanism.

24. Displacement Damage Characterization of CMOS Single-Photon Avalanche Diodes: Alpha-Particle and Fast-Neutron Measurements.

25. Privacy-Preserving Hierarchical State Estimation in Untrustworthy Cloud Environments.

26. Transparent and Accountable Vehicular Local Advertising With Practical Blockchain Designs.

27. Robotized Additive Manufacturing of Funicular Architectural Geometries Based on Building Materials.

28. A Programmable SoC-Based Accelerator for Privacy-Enhancing Technologies and Functional Encryption.

29. A Portable System With 0.1-ppm RMSE Resolution for 1–10 MHz Resonant MEMS Frequency Measurement.

30. Practical Privacy-Preserving Face Authentication for Smartphones Secure Against Malicious Clients.

31. VerifyNet: Secure and Verifiable Federated Learning.

32. Identifying the Structure of Cities by Clustering Using a New Similarity Measure Based on Smart Card Data.

33. Evaluation of an Operational Concept for Improving Radiation Tolerance of Single-Photon Avalanche Diode (SPAD) Arrays.

34. Elements Failure Robust Compensation in 2D Phased Arrays for DOA Estimation With M-ary PSK Signals.

35. Re-weighting and 1-Point RANSAC-Based P$n$nP Solution to Handle Outliers.

36. A Portable System With 0.1-ppm RMSE Resolution for 1–10 MHz Resonant MEMS Frequency Measurement.

37. Industrial Communication Systems and Their Future Challenges: Next-Generation Ethernet, IIoT, and 5G.

38. $\mathcal {L}_{2}$–$\mathcal {L}_{\infty }$Output Feedback Controller Design for Fuzzy Systems Over Switching Parameters.

39. Comments on “Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources”.

40. A 10-MHz Bandwidth Two-Path Third-Order $\Sigma\Delta$ Modulator With Cross-Coupling Branches.

41. Cloud-Assisted Key Distribution in Batch for Secure Real-Time Mobile Services.

42. Auditing Big Data Storage in Cloud Computing Using Divide and Conquer Tables.

43. Hardware/Software Co-Design of an Accelerator for FV Homomorphic Encryption Scheme Using Karatsuba Algorithm.

44. Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation.

46. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments.

47. Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing.

48. Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs.

49. Enhanced Precision Analysis for Accuracy-Aware Bit-Width Optimization Using Affine Arithmetic.

50. Exhaustive Linearization for Robust Camera Pose and Focal Length Estimation.

Catalog

Books, media, physical & digital resources