Defeating Adversarial Attacks Againt Adversarial attacks in Network Security
Ehsan Nowroozi +5 more
openalex +1 more source
Spectrally Tunable 2D Material‐Based Infrared Photodetectors for Intelligent Optoelectronics
Intelligent optoelectronics through spectral engineering of 2D material‐based infrared photodetectors. Abstract The evolution of intelligent optoelectronic systems is driven by artificial intelligence (AI). However, their practical realization hinges on the ability to dynamically capture and process optical signals across a broad infrared (IR) spectrum.
Junheon Ha +18 more
wiley +1 more source
Survey of Technology in Network Security Situation Awareness. [PDF]
Zhang J, Feng H, Liu B, Zhao D.
europepmc +1 more source
Novel Learning Framework with Generative AI X-Ray Images for Deep Neural Network-Based X-Ray Security Inspection of Prohibited Items Detection with You Only Look Once [PDF]
Dong‐Sik Kim, Jinho Kang
openalex +1 more source
This review highlights how machine learning (ML) algorithms are employed to enhance sensor performance, focusing on gas and physical sensors such as haptic and strain devices. By addressing current bottlenecks and enabling simultaneous improvement of multiple metrics, these approaches pave the way toward next‐generation, real‐world sensor applications.
Kichul Lee +17 more
wiley +1 more source
Awareness of network security and customer value - The company and customer perspective. [PDF]
Krawczyk-Sokołowska I, Caputa W.
europepmc +1 more source
Inspired by octopuses, actuating legs based on soft materials are fabricated with programmed chiroptical properties and mechanical behaviors to achieve dynamic color modulation and reversible shape morphing, and these legs are developed into a modular OCTOID system.
Seung Hui Han +8 more
wiley +1 more source
Advancing Network Security with AI: SVM-Based Deep Learning for Intrusion Detection. [PDF]
Abuali KM, Nissirat L, Al-Samawi A.
europepmc +1 more source
Call for Papers: Wiley's Security and Communication Networks Journal Special Issue on Security in Mobile Wireless Networks [PDF]
openalex +1 more source
A Perfect Security Key Management Method for Hierarchical Wireless Sensor Networks in Medical Environments [PDF]
Ra'ad A. Muhajjar +2 more
openalex +1 more source

