Results 91 to 100 of about 776,400 (220)
Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques
Microsoft's .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in ...
Daniel Dolz, Gerardo Parra
doaj
Hardware Validation for Semi-Coherent Transmission Security
The rapid growth of Internet-connected devices integrating into our everyday lives has no end in sight. As more devices and sensor networks are manufactured, security tends to be a low priority.
Michael Fletcher +2 more
doaj +1 more source
Human tests for machine models: What lies “Beyond the Imitation Game”?
Abstract Benchmarking large language models (LLMs) is a key practice for evaluating their capabilities and risks. This paper considers the development of “BIG Bench,” a crowdsourced benchmark designed to test LLMs “Beyond the Imitation Game.” Drawing on linguistic anthropological and ethnographic analysis of the project's GitHub repository, we examine ...
Noya Kohavi, Anna Weichselbraun
wiley +1 more source
Hardware Obfuscation Driven by QR Pattern using High Level Transformations
This paper presents QR pattern enabled key driven approach for mitigating piracy problem over any digital design, hardware security and reverse engineering (RE) by obfuscation process.
Sharath Kumar D.R.V.A
semanticscholar +1 more source
Datasheets for machine learning sensors
Abstract Machine learning (ML) is becoming prevalent in embedded AI sensing systems. These “ML sensors” enable context‐sensitive, real‐time data collection and decision‐making across diverse applications ranging from anomaly detection in industrial settings to wildlife tracking for conservation efforts.
Matthew Stewart +14 more
wiley +1 more source
Scaling‐Aware Rating of Poisson‐Limited Demand Forecasts
ABSTRACT Forecast quality should be assessed in the context of what is possible in theory and what is reasonable to expect in practice. Often, one can identify an approximate upper bound to a probabilistic forecast's sharpness, which sets a lower, not necessarily achievable, limit to error metrics.
Malte C. Tichy +4 more
wiley +1 more source
Machine Learning and Deep Learning Approaches for SQL Injection Detection: A Review
Structured Query Language Injection (SQLi) remains one of the most serious threats to web applications and has the ability to bypass traditional signature-based detection through obfuscation and zero-day payloads.
Sahar Saadallah Ahmed +1 more
doaj +1 more source
A cybersecurity risk analysis framework for systems with artificial intelligence components
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho +3 more
wiley +1 more source
The transactive energy market is an emerging development in energy economics built on advanced metering infrastructure. Data generated in this context is often required for market operations, while also being privacy sensitive.
Daniel Sousa-Dias +4 more
doaj +1 more source
ABSTRACT Although the proximal femoral nail anti‐rotation (PFNA) is accompanied by several benefits, using the nail is technically challenging and may pose some errors, leading to osteosynthesis failure. Here, we report a critical presentation of an uncommon side effect of PFNA surgery.
Mohammad Javad Dehghani Firoozabadi +3 more
wiley +1 more source

