Results 101 to 110 of about 72,170 (255)
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions
We provide a survey about generic attacks on cryptographic hash constructions including hash-based message authentication codes and hash combiners. We look into attacks involving iteratively evaluating identical mappings many times.
Zhenzhen Bao, Jian Guo, Lei Wang
doaj +1 more source
Blockchain for the Arts and Humanities
ABSTRACT As born‐digital cultural materials proliferate, the arts and humanities require infrastructures that guarantee provenance, authenticity, and equitable access. This paper delivers a comprehensive, critical survey of blockchain's potential and limits across the sector.
James O'Sullivan
wiley +1 more source
Selective Location Blinding Using Hash Chains (Transcript of Discussion) [PDF]
The work that I am reporting on is work that we recently started with a Luxembourgish company, itrust. Together with this company we are working on the design of a security architecture and security protocols to enable location-based services. The general architecture of the system consists of a satellite and a local user device, such as a mobile ...
openaire +2 more sources
ABSTRACT Purpose To develop a self‐supervised scan‐specific deep learning framework for reconstructing accelerated multiparametric quantitative MRI (qMRI). Methods We propose REFINE‐MORE (REference‐Free Implicit NEural representation with MOdel REinforcement), combining an implicit neural representation (INR) architecture with a model reinforcement ...
Ruimin Feng +3 more
wiley +1 more source
In this study, a significant increase in serum NSE, GFAP, CK‐B, IgM and IgM concentrations was determined in dogs with nervous distemper. It was shown that NSE, GFAP and CK‐B biomarkers have a useful and reliable diagnostic value in determining brain damage in dogs with nervous distemper .
Muhammed Mustafa Kapar +2 more
wiley +1 more source
Efficient pebbling for list traversal synopses
We show how to support efficient back traversal in a unidirectional list, using small memory and with essentially no slowdown in forward steps. Using $O(\log n)$ memory for a list of size $n$, the $i$'th back-step from the farthest point reached so far ...
Matias, Yossi, Porat, Ely
core +2 more sources
ABSTRACT Vocabulary knowledge is foundational to educational success, but significant gaps exist between students with reading disabilities or those from disadvantaged backgrounds and their peers. These gaps have cascading effects, as children with lower vocabulary knowledge are less likely to acquire new words through independent reading and are less ...
Halie A. Olson +3 more
wiley +1 more source
The Bitcoin digital currency appeared in 2009. Since this time, researchers and practitioners have looked under the hood of the open source Bitcoin currency, and discovered that Bitcoins Blockchain software architecture is useful for non-monetary ...
Prpić, J.
core
Vehicle Communication using Hash Chain-based Secure Cluster
We introduce a hash chain-based secure cluster. Here, secure cluster refers to a set of vehicles having vehicular secrecy capacity of more than a reference value. Since vehicle communication is performed in such a secure cluster, basically secure vehicle communication can be expected.
Ahn, Na-Young, Lee, Dong Hoon
openaire +2 more sources

