Search Results for author: Jiann-Shiun Yuan

Found 3 papers, 2 papers with code

Self-Supervised Graph Transformer for Deepfake Detection

no code implementations27 Jul 2023 Aminollah Khormali, Jiann-Shiun Yuan

To assess the effectiveness of the proposed framework, several challenging experiments are conducted, including in-data distribution performance, cross-dataset, cross-manipulation generalization, and robustness against common post-production perturbations.

Contrastive Learning DeepFake Detection +2

Security Protection for Magnetic Tunnel Junction

1 code implementation27 Apr 2017 Shayan Taheri, Jiann-Shiun Yuan

Also, a general identification technique is presented to investigate the behaviour and activities of the employed circuitries within this MTJ testing architecture.

Cryptography and Security

Security Analysis of Tunnel Field-Effect Transistor for Low Power Hardware

1 code implementation25 Apr 2017 Shayan Taheri, Jiann-Shiun Yuan

Security and energy are considered as the most important parameters for designing and building a computing system nowadays.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.