Results 81 to 90 of about 317,969 (287)
Filtering Schemes for Injected False Data in Wsn
Wireless sensor networking is an emerging technology, which supports many emerging applications due to their low cost, small size and unethered communication over short distances. Sensor nodes are deployed in open hostile environment in WSN applications. An adversary can easily compromise sensor nodes due to their unattended nature.
openaire +1 more source
This study introduces VIVID (Vesicle In Vivo Identification using DNA), a qPCR‐based platform that tracks PCR‐amplifiable DNA tags loaded in the EVs for accurate and quantifiable EV biodistribution in vivo. ABSTRACT Extracellular vesicles (EVs) represent promising carriers for nucleic acid therapeutics, offering advantages over synthetic nanoparticles ...
Oscar Boyadjian +5 more
wiley +1 more source
False data injection cyber-physical threat is a typical integrity attack in modern smart grids. These days, data analytical methods have been employed to mitigate false data injection attacks (FDIAs), especially when large scale smart grids generate huge
Yi Wang +3 more
doaj +1 more source
Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective
How can we detect suspicious users in large online networks? Online popularity of a user or product (via follows, page-likes, etc.) can be monetized on the premise of higher ad click-through rates or increased sales.
Beutel, Alex +3 more
core +1 more source
Gourd‐Inspired Design of Unit Cell with Multiple Gradients for Physiological‐Range Pressure Sensing
Gourd‐shaped micro‐dome arrays with coordinated modulus, conductivity, and geometric gradients co‐optimize sensitivity and linearity in piezoresistive tactile sensors. Under pressure, a solid upper dome embeds into a porous lower dome, triggering rapid contact‐area growth and series‐to‐parallel conduction, enabling unsaturated, intensity‐resolved ...
Jiayi Xu +6 more
wiley +1 more source
Voltage regulation strategy for alternating current microgrid under false data injection attacks [PDF]
This study introduces a robust strategy for regulating output voltage in the presence of false data injection (FDI) attacks. Employing a hierarchical approach, we disentangle the distributed secondary control problem into two distinct facets: an observer-
Rongqiang Guan +5 more
doaj +1 more source
Multi-residue analysis of pharmaceuticals in Belgian surface water : a novel screening-to-quantification approach using large-volume injection liquid chromatography coupled to high-resolution mass spectrometry [PDF]
The ever growing number of emerging micropollutants such as pharmaceuticals requests rapid and sensitive full-spectrum analytical techniques. Time-of-flight highresolution mass spectrometry (TOF-HRMS) is a promising alternative for the state-ofthe- art ...
Demeestere, Kristof +3 more
core
Designing Sparse AC False Data Injection Attack
7 ...
Iranpour, Mohammadreza +1 more
openaire +2 more sources
Automat optical inspection (AOI) techniques in semiconductor fabrication can be leveraged in battery manufacturing, enabling scalable detection and analysis of electrode‐ and cell‐level imperfections through AI‐driven analytics and a digital‐twin framework.
Jianyu Li, Ertao Hu, Wei Wei, Feifei Shi
wiley +1 more source
Tissue Engineered Human Elastic Cartilage From Primary Auricular Chondrocytes for Ear Reconstruction
Despite over three decades of research, no tissue‐engineered solution for auricular reconstruction in microtia patients has reached clinical translation. The key challenge lies in generating functional elastic cartilage ex vivo. Here, we integrate synergistic cell‐biomaterial strategies to engineer auricular grafts with mechanical and histological ...
Philipp Fisch +13 more
wiley +1 more source

