Results 41 to 50 of about 77,587 (303)
Fine-grained image-text matching, which is pivotal to multimodal intelligence, has advanced semantic correspondence inference through inter-modal region-word aggregation.
Dingcheng Feng +4 more
doaj +1 more source
This study investigates electromechanical PUFs that improve on traditional electric PUFs. The electron transport materials are coated randomly through selective ligand exchange. It produces multiple keys and a key with motion dependent on percolation and strain, and approaches almost ideal inter‐ and intra‐hamming distances.
Seungshin Lim +7 more
wiley +1 more source
The group fuzzy extractor allows group users to extract and reproduce group cryptographic keys from their individual non-uniform random sources. It can be easily used in group-oriented cryptographic applications.
Kaini Chen +4 more
doaj +1 more source
In Situ Study of Resistive Switching in a Nitride‐Based Memristive Device
In situ TEM biasing experiment demonstrates the volatile I‐V characteristic of MIM lamella device. In situ STEM‐EELS Ti L2/L3 ratio maps provide direct evidence of the oxygen vacancies migrations under positive/negative electrical bias, which is critical for revealing the RS mechanism for the MIM lamella device.
Di Zhang +19 more
wiley +1 more source
Spectrally Tunable 2D Material‐Based Infrared Photodetectors for Intelligent Optoelectronics
Intelligent optoelectronics through spectral engineering of 2D material‐based infrared photodetectors. Abstract The evolution of intelligent optoelectronic systems is driven by artificial intelligence (AI). However, their practical realization hinges on the ability to dynamically capture and process optical signals across a broad infrared (IR) spectrum.
Junheon Ha +18 more
wiley +1 more source
Honey password vaults tolerating leakage of both personally identifiable information and passwords
Honey vaults are useful tools for password management. A vault usually contains usernames for each domain, and the corresponding passwords, encrypted with a master password chosen by the owner.
Chao An +4 more
doaj +1 more source
Integrity Auditing for Multi-Copy in Cloud Storage Based on Red-Black Tree
With the rapid development of cloud storage, cloud users are willing to store data in the cloud storage system, and at the same time, the requirements for the security, integrity, and availability of data storage are getting higher and higher.
Zhenpeng Liu +3 more
doaj +1 more source
Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core +1 more source
An oral nanoplatform, MOP@T@D, which can maintain glucose homeostasis and restore islet β cells in diabetic rats is developed. It achieves efficient intestinal absorption and liver‐targeted delivery. The nanoparticle disintegrates only in response to hyperglycemia to release insulin on demand and provides antioxidant protection through selenoprotein ...
Chenxiao Chu +14 more
wiley +1 more source
A metaheuristic image cryptosystem using improved parallel model and many‐objective optimization
Metaheuristic is one of the techniques to improve the security of image encryption. However, existing metaheuristic image cryptosystems based on metaheuristic may have convergence difficulties during the optimization process, which cause insecurity and ...
Zihao Xin +4 more
doaj +1 more source

