Sökning: "Trustworthy Algorithm Design"

Hittade 3 avhandlingar innehållade orden Trustworthy Algorithm Design.

  1. 1. Towards trustworthy intelligent vehicle technology development

    Författare :Kaspar Raats; Vaike Fors; Magnus Bergquist; Jesper Lund; Robert Broström; Johan Redström; Högskolan i Halmstad; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; Trustworthy Algorithm Design; Trust; Design Ethnography; Autonomous Vehicles;

    Sammanfattning : This thesis addresses the unresolved issues of responsibility and accountability in autonomous vehicle (AV) development, advocating for human-centred approaches to enhance trustworthiness. While AVs hold the potential for improved safety, mobility, and environmental impact, poorly designed algorithms pose risks, leading to public distrust. LÄS MER

  2. 2. Engineering Trustworthy Self-Adaptive Autonomous Systems

    Författare :Piergiuseppe Mallozzi; Chalmers tekniska högskola; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Machine Learning; Monitoring and enforcement.; Automotive; System Trustworthiness; Autonomous Systems; Runtime verification; Formal Verification;

    Sammanfattning : Autonomous Systems (AS) are becoming ubiquitous in our society. Some examples are autonomous vehicles, unmanned aerial vehicles (UAV), autonomous trading systems, self-managing Telecom networks and smart factories. LÄS MER

  3. 3. Deep Learning Side-Channel Attacks on Advanced Encryption Standard

    Författare :Huanyu Wang; Elena Dubrova; Mark Smith; Francesco Regazzoni; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Side-channel attack; Deep learning; Advanced Encryption Standard; Hardware security; Informations- och kommunikationsteknik; Information and Communication Technology;

    Sammanfattning : Side-channel attacks (SCAs) have become one of the most realistic threats to implementations of cryptographic algorithms. By exploiting the nonprime, unintentional physical leakage, such as different amount of power consumed by the device during the execution of the cryptographic algorithm, SCAs are able to bypass the theoretical strength of cryptography and extract the secret key. LÄS MER