Abstract: Elliptic curve cryptography (ECC) is widely used in modern security protocols due to its strong security guarantees and compact key sizes. However, scalar multiplication, the core operation ...
Current black-box backdoor attacks in convolutional neural networks formulate attack objective(s) as single-objective optimization problems in single domain. Designing triggers in single domain harms ...
Abstract: This article presents a novel knowledge-based genetic algorithm (GA) to generate a collision-free path in complex environments. The proposed algorithm infuses specific domain knowledge into ...