Search results
From iis-projects
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]6 KB (869 words) - 14:47, 7 July 2023
- ...sable pillar of modern infrastructure, jamming attacks turn into a crucial security threat. The widespread adoption of safety-critical technologies such as aut3 KB (385 words) - 16:23, 20 September 2023
- [[Category:HW/SW Safety and Security]]3 KB (454 words) - 14:59, 25 October 2023
- ...ach leads to accurate classification of the streamed data, it also poses a security risk, since surveillance data is highly sensitive.3 KB (433 words) - 15:36, 4 August 2022
- [[File:5G-Security.jpg|thumb|400px|5G Security, Source: https://5g.security]]3 KB (404 words) - 10:05, 9 February 2021
- ...information, protecting their privacy while enabling better information to security personnel.3 KB (408 words) - 13:17, 5 February 2016
- ...mislabeling them during run time. It is clear that this shows the issue of security and safety in the use of DNNs in the real world applications. The student4 KB (509 words) - 15:41, 10 November 2020
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]8 KB (1,127 words) - 19:54, 1 March 2023
- ...ure ranging procedures require a microcontroller core on-chip and a set of security functions including secure storage, key generation, key exchange, encryptio ...AC layer secure ranging procedures in the IEEE 802.15.4z and elaborate the security requirements for the RISC-V core.8 KB (1,139 words) - 19:10, 29 January 2021
- ...eby a signal is weakened on the way to its destination, as well as causing security worries due to the distance the signal travels around the user being suscep4 KB (576 words) - 16:58, 28 July 2017
- ...ysical systems (CPS) applications in environmental monitoring, healthcare, security, and industrial domains, among others, due to the flexible distribution of4 KB (613 words) - 19:54, 9 February 2015
- * [[HW/SW Safety and Security]]5 KB (540 words) - 12:31, 8 May 2024
- ...dard is a promising candidate in terms of its excellent power consumption, security, range, and reliability. The goal of this semester project is to perform a5 KB (586 words) - 15:34, 11 July 2022
- ...for energy-demanding transmission links while addressing data privacy and security concerns. Thanks to its modular design, the system can be easily tailored t4 KB (579 words) - 14:14, 16 May 2024
- [[Category:HW/SW Safety and Security]]4 KB (497 words) - 14:15, 29 June 2023
- ...e identification to be built into autonomous systems, which can be used in security and surveillance applications. Due to the complexity of the task, the proje4 KB (602 words) - 10:45, 31 January 2023
- ...interference cancellation." IEEE Transactions on Information Forensics and Security 11(7), 2016, 1486-1499.5 KB (662 words) - 13:31, 10 May 2023
- ...nfigurations for higher performance (3.13 CoreMark/MHz) or with additional security features.6 KB (835 words) - 12:52, 27 April 2021
- Imaging sensor networks, UAVs, smartphones, and embedded industrial and security computer vision systems require power-efficient, low-cost and high-speed im5 KB (747 words) - 18:04, 29 August 2016
- ...or autonomous IoT systems or data which should not be sent to a server for security or privacy reason (e.g. Siri could be trained on a server and fine-tuned wi6 KB (842 words) - 08:37, 20 January 2021