Provable

Results: 110



#Item
1Artificial neural networks / Mathematics / Computational neuroscience / Applied mathematics / Mathematical analysis / Lipschitz continuity / operator / Continuous function / Gradient descent / Convolutional neural network / Rectifier / Deep learning

Reachability Analysis of Deep Neural Networks with Provable Guarantees Wenjie Ruan1 , Xiaowei Huang2 , Marta Kwiatkowska1 Department of Computer Science, University of Oxford, UK 2 Department of Computer Science, Univers

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2018-05-14 04:41:41
2Computing / Internet / Internet security / Secure communication / Free software / Transmission Control Protocol / Tor / Support vector machine

Effective Attacks and Provable Defenses for Website Fingerprinting Tao Wang, University of Waterloo; Xiang Cai, Rishab Nithyanand, and Rob Johnson, Stony Brook University; Ian Goldberg, University of Waterloo https://www

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-20 08:19:38
3

Scalable Anonymous Communication with Provable Security Prateek Mittal, Nikita Borisov∗ Dept. of Electrical and Computer Engineering, U. of Illinois at Urbana-Champaign, Carmela Troncoso, Alfredo Rial†

Add to Reading List

Source URL: carmelatroncoso.com

Language: English - Date: 2015-11-19 22:20:42
    4

    Axiomatizing provable 1-provability Evgeny Kolmakov Lomonosov Moscow State University Joint with Lev D. Beklemishev

    Add to Reading List

    Source URL: wrm17.mi.ras.ru

    Language: English - Date: 2017-10-24 13:14:02
      5

      Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks Dan Boneh1 , Henry Corrigan-Gibbs1 , and Stuart Schechter2 1 2

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2017-05-12 13:08:27
        6

        Effective Attacks and Provable Defenses for Website Fingerprinting Tao Wang 1 Xiang Cai 2 Rishab Nithyanand 2

        Add to Reading List

        Source URL: www.cypherpunks.ca

        Language: English - Date: 2014-07-23 16:02:24
          7

          Provable post-quantum security Renato Renner Institute for Theoretical Physics

          Add to Reading List

          Source URL: pqc2010.cased.de

          Language: English - Date: 2010-06-02 01:48:25
            8

            A Provable-Security Treatment of the Key-Wrap Problem Phillip Rogaway1 and Thomas Shrimpton2 1 2

            Add to Reading List

            Source URL: www.iacr.org

            - Date: 2008-06-01 02:58:21
              9

              princeton univ. F’14 cos 521: Advanced Algorithm Design Lecture 7: Provable Approximation via Linear Programming Lecturer: Sanjeev Arora

              Add to Reading List

              Source URL: www.cs.princeton.edu

              - Date: 2014-10-14 20:29:59
                10

                Provable Non-convex Phase Retrieval with Outliers: Median Truncated Wirtinger Flow

                Add to Reading List

                Source URL: jmlr.org

                - Date: 2016-10-08 19:36:42
                  UPDATE