Groups of unknown order are of major interest due to their applications including time-lock puzzles, verifiable delay...
Month: November 2022
With the development of decentralized finance (DeFi), the inherent limitations caused by the blockchain system have come...
Groups of unknown order are of major interest due to their applications including time-lock puzzles, verifiable delay...
Model Extraction Attack against Self-supervised Speech Models. (arXiv:2211.16044v1 [cs.SD])
1 min read
Self-supervised learning (SSL) speech models generate meaningful representations of given clips and achieve incredible performance across various...
Be Careful with Rotation: A Uniform Backdoor Pattern for 3D Shape. (arXiv:2211.16192v1 [cs.CV])
1 min read
For saving cost, many deep neural networks (DNNs) are trained on third-party datasets downloaded from internet, which...
Groups of unknown order are of major interest due to their applications including time-lock puzzles, verifiable delay...
Be Careful with Rotation: A Uniform Backdoor Pattern for 3D Shape. (arXiv:2211.16192v1 [cs.CV])
1 min read
For saving cost, many deep neural networks (DNNs) are trained on third-party datasets downloaded from internet, which...
With the development of decentralized finance (DeFi), the inherent limitations caused by the blockchain system have come...
RISC-V is an open instruction set architecture recently developed for embedded real-time systems. To achieve a lasting...
RISC-V is an open instruction set architecture recently developed for embedded real-time systems. To achieve a lasting...