Hybrid GNN-LSTM defense with differential privacy and secure multi-party computation for edge-optimized neuromorphic autonomous systems. [PDF]
Rekik S, Mehmood S.
europepmc +1 more source
RNA Modifications: Current Understandings and Future Perspectives
Types of RNA modification. We have summarized the currently common types of RNA modifications, including ac4C, m6A, m1A, m5C, m3C, m7G, and ψ, and visually characterized their features through structural formulas. The characteristic structures are marked with a background color different from the background color.
Shiyu Xiao +7 more
wiley +1 more source
How online studies must increase their defences against AI. [PDF]
Anders G, Buder J, Papenmeier F, Huff M.
europepmc +1 more source
Defenses against adversarial attacks on neural networks for graph data via encryption and disturbing [PDF]
Jessica Livingston +3 more
openalex +1 more source
A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca +6 more
wiley +1 more source
Federated reinforcement learning-driven multi-task optimization for robust and ethical edge internet of things security. [PDF]
Li Y, Wang H, Xu G.
europepmc +1 more source
Quaternion-Hadamard Network: A Novel Defense Against Adversarial Attacks with a New Dataset [PDF]
Vladimir Frants, Sos С. Agaian
openalex +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
Data Poisoning Vulnerabilities Across Health Care Artificial Intelligence Architectures: Analytical Security Framework and Defense Strategies. [PDF]
Abtahi F +3 more
europepmc +1 more source
Abstract Research Summary Firm technological research has the potential to spawn multiple applications. Despite recognizing such potential, past literature disagrees on the process through which firms discover and grow new applications out of their past technological research.
Xirong (Subrina) Shen
wiley +1 more source

