Zobrazeno 1 - 10
of 239
pro vyhledávání: '"Zamani, Mahdi"'
Autor:
Arora, Sunpreet, Beams, Andrew, Chatzigiannis, Panagiotis, Meiser, Sebastian, Patel, Karan, Raghuraman, Srinivasan, Rindal, Peter, Shah, Harshal, Wang, Yizhen, Wu, Yuhang, Yang, Hao, Zamani, Mahdi
One of the main goals of financial institutions (FIs) today is combating fraud and financial crime. To this end, FIs use sophisticated machine-learning models trained using data collected from their customers. The output of machine learning models ma
Externí odkaz:
http://arxiv.org/abs/2310.04546
Autor:
Chatzigiannis, Panagiotis, Gu, Wanyun Catherine, Raghuraman, Srinivasan, Rindal, Peter, Zamani, Mahdi
Today, financial institutions (FIs) store and share consumers' financial data for various reasons such as offering loans, processing payments, and protecting against fraud and financial crime. Such sharing of sensitive data have been subject to data
Externí odkaz:
http://arxiv.org/abs/2306.10200
Autor:
Christodorescu, Mihai, English, Erin, Gu, Wanyun Catherine, Kreissman, David, Kumaresan, Ranjit, Minaei, Mohsen, Raghuraman, Srinivasan, Sheffield, Cuy, Wijeyekoon, Arjuna, Zamani, Mahdi
With the innovation of distributed ledger technology (DLT), often known as blockchain technology, there has been significant growth of digital tokens in the form of cryptocurrencies, stablecoins, and central bank digital currencies. As the number of
Externí odkaz:
http://arxiv.org/abs/2109.12194
With the rise of digital currency systems that rely on blockchain to ensure ledger security, the ability to perform cross-chain transactions is becoming a crucial interoperability requirement. Such transactions allow not only funds to be transferred
Externí odkaz:
http://arxiv.org/abs/2101.06000
Autor:
Christodorescu, Mihai, Gu, Wanyun Catherine, Kumaresan, Ranjit, Minaei, Mohsen, Ozdayi, Mustafa, Price, Benjamin, Raghuraman, Srinivasan, Saad, Muhammad, Sheffield, Cuy, Xu, Minghua, Zamani, Mahdi
Digital payments traditionally rely on online communications with several intermediaries such as banks, payment networks, and payment processors in order to authorize and process payment transactions. While these communication networks are designed t
Externí odkaz:
http://arxiv.org/abs/2012.08003
Autor:
Steinvall, Simon Escobar, Ghisalberti, Lea, Zamani, Reza R., Tappy, Nicolas, Hage, Fredrik S., Stutz, Elias, Zamani, Mahdi, Paul, Rajrupa, Leran, Jean-Baptiste, Ramasse, Quentin M., Carter, W. Craig, Morral, Anna Fontcuberta i
Zinc phosphide, Zn3P2, nanowires constitute prospective building blocks for next generation solar cells due to the combination of suitable optoelectronic properties and an abundance of the constituting elements in the Earths crust. The generation of
Externí odkaz:
http://arxiv.org/abs/2009.01533
Autor:
Paul, Rajrupa, Tabernig, Stefan W., Reñé Sapera, Joel, Hurni, Julien, Tiede, Anja, Liu, Xinyun, Damry, Djamshid A., Conti, Vanessa, Zamani, Mahdi, Escobar Steinvall, Simon, Dimitrievska, Mirjana, Alarcon-Lladó, Esther, Piazza, Valerio, Boland, Jessica, Haug, Franz-Josef, Polman, Albert, Fontcuberta i Morral, Anna
Publikováno v:
In Solar Energy Materials and Solar Cells 1 July 2023 256
Autor:
Friedl, Martin, Cerveny, Kris, Weigele, Pirmin, Tutuncuoglu, Gozde, Martí-Sánchez, Sara, Huang, Chunyi, Patlatiuk, Taras, Potts, Heidi, Sun, Zhiyuan, Hill, Megan O., Güniat, Lucas, Kim, Wonjong, Zamani, Mahdi, Dubrovskii, Vladimir G., Arbiol, Jordi, Lauhon, Lincoln J., Zumbuhl, Dominik, Morral, Anna Fontcuberta i
Topological qubits based on Majorana fermions have the potential to revolutionize the emerging field of quantum computing by making information processing significantly more robust to decoherence. Nanowires (NWs) are a promising medium for hosting th
Externí odkaz:
http://arxiv.org/abs/1803.00647
Autor:
Barman, Ludovic, Dacosta, Italo, Zamani, Mahdi, Zhai, Ennan, Pyrgelis, Apostolos, Ford, Bryan, Hubaux, Jean-Pierre, Feigenbaum, Joan
Organizational networks are vulnerable to traffic-analysis attacks that enable adversaries to infer sensitive information from the network traffic - even if encryption is used. Typical anonymous communication networks are tailored to the Internet and
Externí odkaz:
http://arxiv.org/abs/1710.10237
Imagine that a malicious hacker is trying to attack a server over the Internet and the server wants to block the attack packets as close to their point of origin as possible. However, the security gateway ahead of the source of attack is untrusted. H
Externí odkaz:
http://arxiv.org/abs/1709.04569