Results 61 to 70 of about 3,574 (299)
Near‐Infrared Organic Photovoltaic Electrodes for Subretinal Neurostimulation
Organic photovoltaic electrodes based on the D18:Y6 blend enable precise and light‐controlled activation of retinal ganglion cells in a degenerating retina. NIR Light‐driven activation of retinal ganglion cells, tunable stimulation parameters, and biocompatibility with human retinal organoids highlight their potential for next‐generation prosthetics ...
Andrea Corna +10 more
wiley +1 more source
Trust-based fault detection and robust fault-tolerant control of uncertain cyber-physical systems against time-delay injection attacks [PDF]
Salman Baroumand +2 more
openalex +1 more source
This review highlights how machine learning (ML) algorithms are employed to enhance sensor performance, focusing on gas and physical sensors such as haptic and strain devices. By addressing current bottlenecks and enabling simultaneous improvement of multiple metrics, these approaches pave the way toward next‐generation, real‐world sensor applications.
Kichul Lee +17 more
wiley +1 more source
Fuzzy fault injection attacks against secure automotive bootloaders
Secure embedded bootloaders are the trust anchors for modern vehicles’ software. The secure software update process of ECUs is well-defined across the entire automotive industry. Every OEM has his own implementation, but follows the general software update process.
Pozzobon, Enrico (M. Sc.) +3 more
openaire +2 more sources
From Waste to Value: Conversion of Calcium Sulfate to Vaterite via Carbon Capture and Storage
This study introduces a new concept for carbon management that relies on the carbonation of industrial gypsum waste and yields phase‐pure vaterite at ambient conditions without any additives. The obtained vaterite is further shown to be a reactive material that develops compressive strength in aqueous suspensions like conventional cements.
Carlos Pimentel +4 more
wiley +1 more source
Fault injection attacks are one of the most powerful forms of cryptanalytic attacks on ciphers. A single, precisely injected fault during the execution of a cipher like the AES, can completely reveal the key within a few milliseconds.
Keerthi K +4 more
doaj +1 more source
Exciton Binding Energy Modulation in 2D Perovskites: A Phenomenological Keldysh Framework
The intrinsic screening effects are successfully decoupled from structural distortion by rigorously designing a series of 2D perovskites. This enabled us to demonstrate how the dielectric environment modulates the quasiparticle bandgap and exciton binding energy.
Kitae Kim +15 more
wiley +1 more source
Observation of Relativistic Domain Wall Motion in Amorphous Ferrimagnets
Domain walls in ferrimagnets and antiferromagnets move as relativistic sine‐Gordon solitons, with the spin‐wave velocity setting their speed limit. Such relativistic domain‐wall motion is demonstrated in amorphous GdFeCo near angular momentum compensation, where current‐driven walls reach 90% of the 2 kms−1 spin‐wave speed, enabling ultrafast, device ...
Pietro Diona +3 more
wiley +1 more source
Switching Off your Device Does Not Protect Against Fault Attacks
Physical attacks, and among them fault injection attacks, are a significant threat to the security of embedded systems. Among the means of fault injection, laser has the significant advantage of being extremely spatially accurate.
Paul Grandamme +5 more
doaj +1 more source
Optical Fault Injection Attacks against Radiation-Hard Registers
If devices are physically accessible optical fault injection attacks pose a great threat since the data processed as well as the operation flow can be manipulated. Successful physical attacks may lead not only to leakage of secret information such as cryptographic private keys, but can also cause economic damage especially if as a result of such a ...
Petryk, Dmytro +4 more
openaire +2 more sources

