Results 41 to 50 of about 44,786 (250)
Intent vulnerabilities pose a significant threat as they allow attackers to exploit unverified intent messages, leading to sensitive data leaks, privilege escalations, or unauthorized actions that compromise user privacy and system security.
Zhanhui Yuan +4 more
doaj +1 more source
SURVEY AND PROPOSED METHOD TO DETECT ADVERSARIAL EXAMPLES USING AN ADVERSARIAL RETRAINING MODEL
Artificial intelligence (AI) has found applications across various sectors and industries, offering numerous advantages to human beings. One prominent area where AI has made significant contributions is in machine learning models.
Thanh Son Phan +3 more
doaj +1 more source
Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP
In this paper, we present an improved differential-linear cryptanalysis of the ChaCha stream cipher. Our main contributions are new differential-linear distinguishers that we were able to build thanks to the following improvements: a) we considered a ...
Emanuele Bellini +4 more
doaj +1 more source
ABSTRACT Background Chronic kidney disease is a growing public health problem worldwide, and the number of patients requiring renal replacement therapy is steadily increasing. Türkiye has experienced a similar rise in both the incidence and prevalence of renal replacement therapy over the past decades; however, national‐level projections of future ...
Arzu Akgül +2 more
wiley +1 more source
Circuit-noise-resilient virtual distillation
Quantum error mitigation (QEM) is vital for improving quantum algorithms’ accuracy on noisy near-term devices. A typical QEM method, called Virtual Distillation (VD), can suffer from imperfect implementation, potentially leading to worse outcomes than ...
Xiao-Yue Xu +4 more
doaj +1 more source
Characterisations of Ideal Threshold Schemes [PDF]
We characterise ideal threshold schemes from different approaches. Since the characteristic properties are independent to particular descriptions of threshold schemes all ideal threshold schemes can be examined by new points of view and new results on ...
Josef Pieprzyk, Xian-Mo Zhang
doaj +1 more source
An intracellular transporter mitigates the CO2‐induced decline in iron content in Arabidopsis shoots
This study identifies a gene encoding a transmembrane protein, MIC, which contributes to the reduction of shoot Fe content observed in plants under elevated CO2. MIC is a putative Fe transporter localized to the Golgi and endosomal compartments. Its post‐translational regulation in roots may represent a potential target for improving plant nutrition ...
Timothy Mozzanino +7 more
wiley +1 more source
A Cre‐dependent lentiviral vector for neuron subtype‐specific expression of large proteins
We designed a versatile and modular lentivector comprising a Cre‐dependent switch and self‐cleaving 2A peptide and tested it for co‐expression of GFP and a 2.8 kb gene of interest (GOI) in mouse cortical parvalbumin (PV+) interneurons and midbrain dopamine (TH+) neurons.
Weixuan Xue +6 more
wiley +1 more source
Pseudorandom number generators based on neural networks: a review
Pseudorandom number generators are deterministic algorithms capable of producing sequences of numbers that appear sufficiently ”random,” and they find extensive applications across various domains such as cryptography, network security, communications ...
Xuguang Wu +6 more
doaj +1 more source
Signal fingerprint feature extraction and recognition method for communication satellite
Due to the complex maritime environment, communication satellite signals are inevitably subjected to various unpredictable situations which results in the noisy signal.
Zhen Guo, Kai Huang, Jun Ye
doaj +1 more source

