Results 51 to 60 of about 10,775 (222)
Eight years of rider measurement in the Android malware ecosystem: evolution and lessons learned [PDF]
Despite the growing threat posed by Android malware, the research community is still lacking a comprehensive view of common behaviors and trends exposed by malware families active on the platform.
Stringhini, Gianluca +1 more
core
Concerted Wire Lifting: Enabling Secure and Cost-Effective Split Manufacturing
Here we advance the protection of split manufacturing (SM)-based layouts through the judicious and well-controlled handling of interconnects. Initially, we explore the cost-security trade-offs of SM, which are limiting its adoption.
Ashraf, Mohammed +3 more
core +1 more source
ABSTRACT The last few years have seen a reemergence in the awareness of virtual worlds among practitioners and academics. Driven by tech giants' investments, the Metaverse is considered by some as an unprecedented revolutionary technology with the potential to unlock an entire gamut of new unexplored opportunities for both companies and individuals ...
Giulio Ferrigno +2 more
wiley +1 more source
Detecting Cryptojacking Web Threats: An Approach with Autoencoders and Deep Dense Neural Networks
With the growing popularity of cryptocurrencies, which are an important part of day-to-day transactions over the Internet, the interest in being part of the so-called cryptomining service has attracted the attention of investors who wish to quickly earn ...
Aldo Hernandez-Suarez +6 more
doaj +1 more source
Reusing Logic Masking to Facilitate Hardware Trojan Detection [PDF]
Hardware Trojan (HT) and Integrated Circuit (IC)/ Intellectual Property (IP) piracy are important threats which may happen in untrusted fabrication foundries.
Beroulle, Vincent +2 more
core
ABSTRACT Large language models (LLMs) have made remarkable advances in natural language processing, demonstrating great potential in modelling structured sequences. However, adapting these capabilities to machine gaming tasks such as Go remains challenging due to limitations in strategy generalisation and optimisation efficiency.
Xiali Li +5 more
wiley +1 more source
Development of trustworthy and secure hardware for Edge AI devices with increasing Deep Learning applications has gained recent attention. Logic locking has been a proven technology for secure and trustworthy designs for hardware obfuscation and enhanced
Kadiyam Tirumalarao +5 more
doaj +1 more source
De la logique à l’algorithme : la traduction dans le design de programmes
What makes machine logic so difficult to understand for users ? It seems as if we attribute to machines the utopian potential of unifying all forms of logic into one single binary model.
Kim Sacks
doaj +1 more source
Parallel implementation of fast randomized algorithms for the decomposition of low rank matrices
We analyze the parallel performance of randomized interpolative decomposition by decomposing low rank complex-valued Gaussian random matrices up to 64 GB.
Feo, John, Lucas, Andrew, Stalzer, Mark
core +1 more source
Abstract This article analyses ideas of ‘good governance through technology’ in India that first emerged from the software industry, symbolizing state support for the ‘new middle‐class’ values of liberalized private enterprise. We suggest that the contemporary prominence of consulting firms in government represents a second transformation that embeds ...
Matt Birkinshaw, Sanjay Srivastava
wiley +1 more source

