Results 61 to 70 of about 77,587 (303)
Double landmines: invisible textual backdoor attacks based on dual-trigger
Backdoor attacks pose an important security threat to textual large language models. Exploring textual backdoor attacks not only helps reveal the potential security risks of models, but also promotes innovation and development of defense mechanisms ...
Yang Hou +5 more
doaj +1 more source
A Blockchain-Enabled Decentralized Autonomous Access Control Scheme for Data Sharing
With the rapid development of artificial intelligence, multi-party collaboration based on data sharing has become an inevitable trend. However, in practical applications, shared data often originate from multiple providers.
Kunyang Li +7 more
doaj +1 more source
Cyber-security is thus a very serious issue. Attacks can have catastrophic consequences. The cyber-war is for real. Greater legal certainty, less confrontation between departments and more cooperation between governments, is the call of the hour. India has to make cyber-security a priority, if the government wants to go digital. Attitudes and behaviour
openaire +1 more source
Persuasive technology and digital design for behaviour change [PDF]
Copyright @ 2012 Social Science Research NetworkThe convergence of the 'digital' and 'real' worlds has been rapid and transformative of everyday life, as well as design practice - to the extent that talking about 'digital design' and 'the digital context'
Lockton, D
core +2 more sources
Atomic Layer Deposition in Transistors and Monolithic 3D Integration
Transistors are fundamental building blocks of modern electronics. This review summarizes recent progress in atomic layer deposition (ALD) for the synthesis of two‐dimensional (2D) metal oxides and transition‐metal dichalcogenides (TMDCs), with particular emphasis on their enabling role in monolithic three‐dimensional (M3D) integration for next ...
Yue Liu +5 more
wiley +1 more source
Perspectives for Cyber Strategists on Law for Cyberwar [PDF]
The proliferation of martial rhetoric in connection with the release of thousands of pages of sensitive government documents by the WikiLeaks organization underlines how easily words that have legal meanings can be indiscriminately applied to cyber ...
Dunlap, Charles J., Jr.
core +1 more source
EU cybersecurity capacity building in the Mediterranean and the Middle East [PDF]
Cyberthreats on the Rise The 2008 Report on the implementation of the European Security Strategy included “cybersecurity” for the first time among the priorities of the EU’s external action, stating that: “modern economies are heavily reliant on critical
Lannon, Erwoan
core
Conjugated polymer–nanocrystal composites are investigated to develop fast, high‐yield green scintillators. The polymer F8BT enables efficient, ultrafast emission, while blends with non‐emitting HfO2 nanocrystals and luminescent CdZnS/ZnS quantum dots reveal distinct sensitization mechanisms.
Chenger Wang +13 more
wiley +1 more source
Exploring the Fractal Space of Sparse Deep Neural Network
Sparse deep neural networks (DNNs) are preferable in many real-world applications, especially edge computing. How to find the sparse structure of deep neural networks so that the model can achieve better performance is an important research topic.
Hang Xu +5 more
doaj +1 more source
Unlocking the Doors Feminist Insights for Inclusion in Governance, Peace and Security [PDF]
This is the third primer in the series. It analyses the successes and gaps in women's movements' approaches to the intersections between governance and the security complex.
Awino Okech
core

