Results 111 to 120 of about 77,587 (303)

Clean, performance‐robust, and performance‐sensitive historical information based adversarial self‐distillation

open access: yesIET Computer Vision
Adversarial training suffers from poor effectiveness due to the challenging optimisation of loss with hard labels. To address this issue, adversarial distillation has emerged as a potential solution, encouraging target models to mimic the output of the ...
Shuyi Li   +3 more
doaj   +1 more source

Adaptive Carbon Nanotube Patches for Versatile Electronic Textiles and Wind‐Harvesting Applications

open access: yesAdvanced Materials Technologies, EarlyView.
An adhesion‐tunable electronic textile patch based on a carbon nanotube/paraffin composite is presented, enabling direct, adhesive‐free integration with fabrics. Pressure‐responsive bonding allows reversible or permanent attachment on demand.
Seokwon Joo   +4 more
wiley   +1 more source

Reversible data hiding and authentication scheme for encrypted image based on prediction error compression

open access: yesScientific Reports
In the most existing reversible data hiding schemes for encrypted images, cover images can be reversibly recovered, but the integrity of image content cannot be guaranteed.
Fang Ren   +4 more
doaj   +1 more source

Ultra‐Durable Information‐Encoded Anti‐Counterfeiting Self‐Assembled Nanocrystal Labels

open access: yesAdvanced Optical Materials, EarlyView.
Ultra‐durable cost‐effective information‐encoded anti‐counterfeiting labels are fabricated to secure semiconductor chips. A novel method is used to self‐assemble colloidal quantum wells (CQWs) into color bars. Information can be encoded spatially, spectrally, and opto‐spatially.
Taha Haddadifam   +6 more
wiley   +1 more source

Renyi entropy-driven network traffic anomaly detection with dynamic threshold

open access: yesCybersecurity
Network traffic anomaly detection is a critical issue in network security. Existing Abnormal traffic detection methods rely on statistical-based or anomaly-based approaches, and these detection methods all require a full understanding of traffic ...
Haoran Yu   +4 more
doaj   +1 more source

Do's and Don'ts When Visiting Circularly Polarized Luminescence

open access: yesAdvanced Optical Materials, EarlyView.
This perspective presents our insights into the principles, challenges, and opportunities of circularly polarized luminescence (CPL). Highlighting key concepts such as the dissymmetry factor (glum) and molecular design strategies, we discuss advances in CPL efficiency, emerging NIR emitters, solid‐state applications, and the growing role of theory and ...
Rafael G. Uceda   +9 more
wiley   +1 more source

Bag2image: a multi-instance network traffic representation for network security event prediction

open access: yesCybersecurity
In practical scenarios, security events triggered by abnormal network traffic often result from the collective behavior of multiple data streams, embodying group security events with collective characteristics.
Jiachen Zhang   +6 more
doaj   +1 more source

Compelled to control: conflicting visions of the future of cyberspace [PDF]

open access: yes
This report looks at the desire among states for greater control over the digital domain. It considers the convergence of controlling desires among the major cyberpowers and examines some of the main dynamics of the Russian and Chinese positions.
David Clemente
core  

The Computer Misuse Act 1990: lessons from its past and predictions for its future [PDF]

open access: yes, 2008
The age of the internet has thrown down some real challenges to the Computer Misuse Act 1990. Recently, the Government made changes to this piece of legislation, in an attempt to meet two of those challenges--the proliferation of “ Denial of Service ...
Macewan, NF
core  

Home - About - Disclaimer - Privacy