Results 51 to 60 of about 257,742 (291)
A general scheme for information interception in the ping pong protocol [PDF]
The existence of an undetectable eavesdropping of dense coded information has been already demonstrated by Pavi\v{c}i\'c for the quantum direct communication based on the ping-pong paradigm.
Miszczak, Jarosław Adam +1 more
core +3 more sources
The water permeability of amorphous carbon dots (CDs) is demonstrated by investigating their plasticization. Novel polyamide‐based and amorphous nanoparticles are synthesized by controlling their inner packing density. Water plasticization is evidenced by the decrease of the CDs glass transition temperature with increasing the hydration degree.
Elisa Sturabotti +8 more
wiley +1 more source
The widespread deployment of facial recognition-based biometric systems has made facial presentation attack detection (face anti-spoofing) an increasingly critical issue.
Zuheng Ming +3 more
doaj +1 more source
B2 and G2 Toda systems on compact surfaces: a variational approach
We consider the B2 and G2 Toda systems on compact surfaces. We attack the problem using variational techniques. We get existence and multiplicity of solutions under a topological assumption on the surface and some generic conditions on the parameters. We
Battaglia L. +5 more
core +1 more source
Decompositional Argument Mining:A General Purpose Approach for Argument Graph Construction [PDF]
This work presents an approach decomposing propositions into four functional components and identify the patterns linking those components to determine argument structure.
Gemechu, Debela, Reed, Chris
core +2 more sources
Generic DPA Attacks: Curse or Blessing? [PDF]
Generic DPA attacks, such as MIA, have been recently proposed as a method to mount DPA attacks without the need for possibly restrictive assumptions on the leakage behaviour. Previous work identified some shortcomings of generic DPA attacks when attacking injective targets (such as the AES Sbox output).
Reparaz, Oscar +2 more
openaire +2 more sources
From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks [PDF]
Modern information society depends on reliable functionality of information systems infrastructure, while at the same time the number of cyber-attacks has been increasing over the years and damages have been caused. Furthermore, graphs can be used to show paths than can be exploited by attackers to intrude into systems and gain unauthorized access ...
Nikolaos Polatidis +4 more
openaire +3 more sources
OMG-Attack: Self-Supervised On-Manifold Generation of Transferable Evasion Attacks
ICCV 2023, AROW ...
Tal, Ofir Bar +2 more
openaire +2 more sources
Adaptive Twisting Metamaterials
This work introduces torque‐controlled twisting metamaterials as a transformative platform for adaptive crashworthiness. By combining multiscale predictive modeling with experimental validation on additively manufactured gyroids, it demonstrates tunable stiffness, collapse stress, and energy absorption.
Mattia Utzeri +6 more
wiley +1 more source
Interphase Self‐Optimization Enables Stable Magnesium Anode in Hydrogel Electrolyte
Based on a MgCl2 hydrogel electrolyte, we identify a tridentate chelant additive to construct a magnesium oxychloride interphase on Mg metal anodes. This self‐optimized interphase enables low‐resistance Mg2+ stripping/plating, resulting in much elongated cycling life of 600 h with 0.24 V nucleation overpotential.
Xinyuan Zhang +4 more
wiley +1 more source

