Results 251 to 260 of about 96,849 (322)
ABSTRACT Conventional software‐based encryption faces mounting limitations in power efficiency and security, inspiring the development of emerging neuromorphic computing hardware encryption. This study presents a hardware‐level multi‐dimensional encryption paradigm utilizing optoelectronic neuromorphic devices with low energy consumption of 3.3 fJ ...
Bo Sun +3 more
wiley +1 more source
When collaboration fails: persuasion driven adversarial influence in multi agent large language model debate. [PDF]
Kraidia I +4 more
europepmc +1 more source
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source
Enhanced cybersecurity threat detection using novel tri-metaheuristic loss functions in generative adversarial networks with adaptive attention preservation for network traffic augmentation. [PDF]
Khalil HM, Elrefaiy A, Elbaz M, Loey M.
europepmc +1 more source
EcoSecure‐Phish is an explainable, energy‐aware ensemble framework for detecting phishing and impersonation in online social networks. By integrating optimized boosting models with feature selection and sustainability metrics, it achieves high detection accuracy while reducing latency, energy consumption, and carbon impact for scalable, real‐time ...
Romil Rawat +5 more
wiley +1 more source
Threats and vulnerabilities in artificial intelligence and agentic AI models. [PDF]
Radanliev P, Santos O, Maple C.
europepmc +1 more source
Maintaining power quality (PQ) and minimizing carbon emissions are crucial for sustainable smart grids, especially with increasing renewable energy integration. This paper proposes a novel method combining Adaptive Q‐Wavelet Transform (AQWT) and Kalman Filtering (KF) to predict PQ disturbances and faults while analyzing their impact on carbon emissions.
Abhishek Raj +9 more
wiley +1 more source
A Spatially Distributed Perturbation Strategy with Smoothed Gradient Sign Method for Adversarial Analysis of Image Classification Systems. [PDF]
Xu Y, Li J, Chang D, Dong Y.
europepmc +1 more source
Caught in the fire: An accidental ethnography of discomfort in researching sex work
Abstract Drawing on fifteen years of engagement with researching Israel's sex industry, this article uses accidental ethnography to propose discomfort‐as‐method for feminist anthropology. I argue that discomfort is not a by‐product of fieldwork but a constitutive condition that disciplines researchers and shapes what can be known.
Yeela Lahav‐Raz
wiley +1 more source
Visual security defense for industrial inspection based on computer vision. [PDF]
Jiang Z, Yuan H, Zeng C, Fu L.
europepmc +1 more source

