Zobrazeno 1 - 10
of 405
pro vyhledávání: '"Fuller, Benjamin"'
Risk-limiting audits (RLAs) are techniques for verifying the outcomes of large elections. While they provide rigorous guarantees of correctness, widespread adoption has been impeded by both efficiency concerns and the fact they offer statistical, rat
Externí odkaz:
http://arxiv.org/abs/2402.06515
Authentication systems are vulnerable to model inversion attacks where an adversary is able to approximate the inverse of a target machine learning model. Biometric models are a prime candidate for this type of attack. This is because inverting a bio
Externí odkaz:
http://arxiv.org/abs/2209.11020
Autor:
Amaro, Alessio, Fuller, Benjamin T., Fornaciari, Antonio, Giuffra, Valentina, Olsen, Jesper, Mannino, Marcello A.
Publikováno v:
In Journal of Archaeological Science: Reports September 2024 57
Risk-limiting audits (RLAs) are rigorous statistical procedures meant to detect invalid election results. RLAs examine paper ballots cast during the election to statistically assess the possibility of a disagreement between the winner determined by t
Externí odkaz:
http://arxiv.org/abs/2202.02607
Autor:
Fuller, Benjamin T.1 (AUTHOR) Benjamin.fuller@sthughs-oxford.com, Riehl, Simone2 (AUTHOR) Benjamin.fuller@sthughs-oxford.com, Linseele, Veerle1,3 (AUTHOR), Marinova, Elena1,3 (AUTHOR), De Cupere, Bea3 (AUTHOR), Bretschneider, Joachim4 (AUTHOR), Richards, Michael P.5 (AUTHOR), Van Neer, Wim1,3 (AUTHOR)
Publikováno v:
PLoS ONE. 6/12/2024, Vol. 19 Issue 6, p1-37. 37p.
Publikováno v:
In Journal of Archaeological Science: Reports April 2024 54
Autor:
Van Neer, Wim, Fuller, Benjamin T., Fahy, Geraldine E., De Cupere, Bea, Bouillon, Steven, Uytterhoeven, Inge, Richards, Michael P.
Publikováno v:
In Journal of Archaeological Science: Reports February 2024 53
Iris recognition systems transform an iris image into a feature vector. The seminal pipeline segments an image into iris and non-iris pixels, normalizes this region into a fixed-dimension rectangle, and extracts features which are stored and called a
Externí odkaz:
http://arxiv.org/abs/2007.15850
Autor:
Callahan, Devon, Curry, Timothy, Davidson, Hazel, Zitoun, Heytem, Fuller, Benjamin, Michel, Laurent
Maintaining a resilient computer network is a delicate task with conflicting priorities. Flows should be served while controlling risk due to attackers. Upon publication of a vulnerability, administrators scramble to manually mitigate risk while wait
Externí odkaz:
http://arxiv.org/abs/1910.07921
Autor:
Cachet, Chloe, Ahmad, Sohaib, Demarest, Luke, Riback, Serena, Hamlin, Ariel, Fuller, Benjamin
Publikováno v:
In Information and Computation August 2023 293