Abstract: We propose a general attack framework based on evolutionary algorithms to quickly and efficiently generate low-perturbation adversarial samples for 3D point cloud data. Specifically, we ...
Abstract: Elliptic curve cryptography (ECC) is widely used in security applications such as public key cryptography (PKC) and zero-knowledge proofs (ZKP). ECC is composed of modular arithmetic, where ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results