Results 41 to 50 of about 1,717,630 (292)

DDSG-GAN: Generative Adversarial Network with Dual Discriminators and Single Generator for Black-Box Attacks

open access: yesMathematics, 2023
As one of the top ten security threats faced by artificial intelligence, the adversarial attack has caused scholars to think deeply from theory to practice.
Fangwei Wang   +4 more
doaj   +1 more source

Lived and care experiences of chronic musculoskeletal shoulder pain in Australian adults: A qualitative study

open access: yesArthritis Care &Research, Accepted Article.
Objectives Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centred care and informing local service pathways and care guidelines or standards.
Sonia Ranelli   +8 more
wiley   +1 more source

Advanced ENF Region Classification Using UniTS-SinSpec: A Novel Approach Integrating Sinusoidal Activation Function and Spectral Attention

open access: yesApplied Sciences
The electric network frequency (ENF), often referred to as the industrial heartbeat, plays a crucial role in the power system. In recent years, it has found applications in multimedia evidence identification for court proceedings and audio–visual ...
Yujin Li   +4 more
doaj   +1 more source

Security Trust Zone in 5G Networks

open access: yes, 2017
Fifth Generation (5G) telecommunication system is going to deliver a flexible radio access network (RAN). Security functions such as authorization, authentication and accounting (AAA) are expected to be distributed from central clouds to edge clouds.
Dohler, Mischa   +4 more
core   +1 more source

Virtual or in‐person: does it matter? Comparing pain, function, quality of life, self‐efficacy and physical function outcomes of virtual, hybrid and in‐person GLA:D Canada participants

open access: yesArthritis Care &Research, Accepted Article.
Objective This study aimed to determine if program format (in‐person, virtual, hybrid) results in differences in three‐month outcomes of pain, function, quality of life, self‐efficacy and chair stands in a hip/knee osteoarthritis management program. Methods A secondary analysis of the GLA:DTM Canada database was completed.
Jill Van Damme   +7 more
wiley   +1 more source

Semi-AttentionAE: An Integrated Model for Graph Representation Learning

open access: yesIEEE Access, 2021
Graph embedding learns low-dimensional vector representations which capture and preserve information in original graphs. Common shallow neural networks and deep autoencoder only use adjacency matrix as input, and usually ignore node attributes and ...
Lining Yuan   +3 more
doaj   +1 more source

Learning to Customize Network Security Rules

open access: yes, 2017
Security is a major concern for organizations who wish to leverage cloud computing. In order to reduce security vulnerabilities, public cloud providers offer firewall functionalities.
Ajay Piriya Vijaya Kumar Saroja (5597705)   +4 more
core   +6 more sources

Financial Distress and its Determinants in Rheumatoid Arthritis

open access: yesArthritis Care &Research, Accepted Article.
Objective To quantify the degree of financial distress and identify its determinants in adults with rheumatoid arthritis (RA) given the frequent chronic use of expensive disease modifying therapies. Methods We identified adults enrolled in the FORWARD databank with either RA or non‐inflammatory musculoskeletal disease (NIMSKD) completing the Functional
Amber Brown Keebler   +5 more
wiley   +1 more source

On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments

open access: yesIEEE Access, 2019
As the progress of digitization in industrial society, large amount of production data are outsourced to the cloud server in order to reduce data management costs. Nevertheless, how to ensure the outsourced data integrality, validity, and availability is
Wenjie Yang   +3 more
doaj   +1 more source

Design of Network-based Security System for Windows Nt Network Operations to Achieve Efficiency [PDF]

open access: yes, 1999
In building a network of points that a lot of attention is on the network operatingsystem installation and implementation of network security systems and maintenanceof existing network systems.
Drs. Lingga Hermanto, MM Drs. Lingga Hermanto, MM   +1 more
core  

Home - About - Disclaimer - Privacy