Results 61 to 70 of about 67,029 (331)

State vulnerability assessment against false data injection attacks in AC state estimators

open access: yesEnergy Conversion and Economics, 2022
The transformation of the conventional power grid into a smart grid has revolutionised the power industry. However, this has also made the power grid vulnerable to various cyberattacks.
Gaurav Khare   +2 more
doaj   +1 more source

Analyzing Attacks on Cooperative Adaptive Cruise Control (CACC)

open access: yes, 2017
Cooperative Adaptive Cruise Control (CACC) is one of the driving applications of vehicular ad-hoc networks (VANETs) and promises to bring more efficient and faster transportation through cooperative behavior between vehicles.
Kargl, Frank   +2 more
core   +1 more source

Electro‐Stimulated Graphene‐Polymer Nanocomposites Enable Wearable Patches With Feedback‐Controlled Drug Release

open access: yesAdvanced Healthcare Materials, EarlyView.
xx xx. ABSTRACT Stimuli‐responsive nanomaterials capable of spatiotemporal control over drug release are of nanocomposite patch (“e‐Medi‐Patch”) engineered from biodegradable polycaprolactone (PCL), graphene nanoplatelets, and a redox‐active therapeutic, niclosamide. The hierarchical composite integrates π‐π interactions between aromatic drug molecules
Santosh K. Misra   +7 more
wiley   +1 more source

Transistor‐Level Activation Functions via Two‐Gate Designs: From Analog Sigmoid and Gaussian Control to Real‐Time Hardware Demonstrations

open access: yesAdvanced Materials, EarlyView.
Screen gate‐based transistors are presented, enabling tunable analog sigmoid and Gaussian activations. The SA‐transistor improves MRI classification accuracy, while the GA‐transistor supports precise Gaussian kernel tuning for forecasting. Both functions are implemented in a single device, offering compact, energy‐efficient analog AI processing ...
Junhyung Cho   +9 more
wiley   +1 more source

PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-Model Transmission Systems

open access: yesIEEE Open Journal of the Computer Society, 2022
Smart grids are vulnerable to stealthy false data injection attacks (SFDIAs), as SFDIAs can bypass residual-based bad data detection mechanisms. Methods based on deep learning technology have shown promising accuracy in the detection of SFDIAs.
Xuefei Yin   +3 more
doaj   +1 more source

Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective

open access: yes, 2014
How can we detect suspicious users in large online networks? Online popularity of a user or product (via follows, page-likes, etc.) can be monetized on the premise of higher ad click-through rates or increased sales.
Beutel, Alex   +3 more
core   +1 more source

Atomistic Mechanisms Triggered by Joule Heating Effects in Metallic Cu‐Bi Nanowires for Spintronics

open access: yesAdvanced Materials, EarlyView.
Bi doped metallic Cu nanowires are promising for spintronics thanks to the stabilization of a giant spin Hall effect. However, heat resulting from current injection forces Bi to leave solution, forcing segregation into monoatomic decorations which evolve into coherent crystalline aggregates.
Alejandra Guedeja‐Marrón   +6 more
wiley   +1 more source

Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing [PDF]

open access: yesSensors, 2018
As an extension of cloud computing, fog computing has received more attention in recent years. It can solve problems such as high latency, lack of support for mobility and location awareness in cloud computing. In the Internet of Things (IoT), a series of IoT devices can be connected to the fog nodes that assist a cloud service center to store and ...
Yinghui Zhang   +6 more
openaire   +3 more sources

Tuning Windowed Chi-Squared Detectors for Sensor Attacks

open access: yes, 2017
A model-based windowed chi-squared procedure is proposed for identifying falsified sensor measurements. We employ the widely-used static chi-squared and the dynamic cumulative sum (CUSUM) fault/attack detection procedures as benchmarks to compare the ...
aström   +6 more
core   +1 more source

High‐Throughput In Vivo Screening Using Barcoded mRNA Identifies Lipid Nanoparticles With Extrahepatic Tropism for In Situ Immunoengineering

open access: yesAdvanced Materials, EarlyView.
A high‐throughput in vivo mRNA LNP screening platform is developed and employed to screen a large library of 122 mRNA LNPs in vivo for delivery to immune, stromal, and parenchymal cells, identifying promising LNP candidates. A novel small particle flow cytometry‐based protein adsorption analysis method is utilized to interrogate protein corona ...
Alex G. Hamilton   +17 more
wiley   +1 more source

Home - About - Disclaimer - Privacy