Results 111 to 120 of about 77,587 (303)
Adversarial training suffers from poor effectiveness due to the challenging optimisation of loss with hard labels. To address this issue, adversarial distillation has emerged as a potential solution, encouraging target models to mimic the output of the ...
Shuyi Li +3 more
doaj +1 more source
Adaptive Carbon Nanotube Patches for Versatile Electronic Textiles and Wind‐Harvesting Applications
An adhesion‐tunable electronic textile patch based on a carbon nanotube/paraffin composite is presented, enabling direct, adhesive‐free integration with fabrics. Pressure‐responsive bonding allows reversible or permanent attachment on demand.
Seokwon Joo +4 more
wiley +1 more source
In the most existing reversible data hiding schemes for encrypted images, cover images can be reversibly recovered, but the integrity of image content cannot be guaranteed.
Fang Ren +4 more
doaj +1 more source
Apriori Algorithm for the Data Mining of Global Cyberspace Security Issues for Human Participatory Based on Association Rules. [PDF]
Li Z, Li X, Tang R, Zhang L.
europepmc +1 more source
Ultra‐Durable Information‐Encoded Anti‐Counterfeiting Self‐Assembled Nanocrystal Labels
Ultra‐durable cost‐effective information‐encoded anti‐counterfeiting labels are fabricated to secure semiconductor chips. A novel method is used to self‐assemble colloidal quantum wells (CQWs) into color bars. Information can be encoded spatially, spectrally, and opto‐spatially.
Taha Haddadifam +6 more
wiley +1 more source
Renyi entropy-driven network traffic anomaly detection with dynamic threshold
Network traffic anomaly detection is a critical issue in network security. Existing Abnormal traffic detection methods rely on statistical-based or anomaly-based approaches, and these detection methods all require a full understanding of traffic ...
Haoran Yu +4 more
doaj +1 more source
Do's and Don'ts When Visiting Circularly Polarized Luminescence
This perspective presents our insights into the principles, challenges, and opportunities of circularly polarized luminescence (CPL). Highlighting key concepts such as the dissymmetry factor (glum) and molecular design strategies, we discuss advances in CPL efficiency, emerging NIR emitters, solid‐state applications, and the growing role of theory and ...
Rafael G. Uceda +9 more
wiley +1 more source
Bag2image: a multi-instance network traffic representation for network security event prediction
In practical scenarios, security events triggered by abnormal network traffic often result from the collective behavior of multiple data streams, embodying group security events with collective characteristics.
Jiachen Zhang +6 more
doaj +1 more source
Compelled to control: conflicting visions of the future of cyberspace [PDF]
This report looks at the desire among states for greater control over the digital domain. It considers the convergence of controlling desires among the major cyberpowers and examines some of the main dynamics of the Russian and Chinese positions.
David Clemente
core
The Computer Misuse Act 1990: lessons from its past and predictions for its future [PDF]
The age of the internet has thrown down some real challenges to the Computer Misuse Act 1990. Recently, the Government made changes to this piece of legislation, in an attempt to meet two of those challenges--the proliferation of “ Denial of Service ...
Macewan, NF
core

