Results 51 to 60 of about 1,753,778 (277)

DDSG-GAN: Generative Adversarial Network with Dual Discriminators and Single Generator for Black-Box Attacks

open access: yesMathematics, 2023
As one of the top ten security threats faced by artificial intelligence, the adversarial attack has caused scholars to think deeply from theory to practice.
Fangwei Wang   +4 more
doaj   +1 more source

Design of Network-based Security System for Windows Nt Network Operations to Achieve Efficiency [PDF]

open access: yes, 1999
In building a network of points that a lot of attention is on the network operatingsystem installation and implementation of network security systems and maintenanceof existing network systems.
Drs. Lingga Hermanto, MM Drs. Lingga Hermanto, MM   +1 more
core  

Learning to Customize Network Security Rules

open access: yes, 2017
Security is a major concern for organizations who wish to leverage cloud computing. In order to reduce security vulnerabilities, public cloud providers offer firewall functionalities.
Ajay Piriya Vijaya Kumar Saroja (5597705)   +4 more
core   +6 more sources

Age‐Related Characteristics of SYT1‐Associated Neurodevelopmental Disorder

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objectives We describe the clinical manifestations and developmental abilities of individuals with SYT1‐associated neurodevelopmental disorder (Baker‐Gordon syndrome) from infancy to adulthood. We further describe the neuroradiological and electrophysiological characteristics of the condition at different ages, and explore the associations ...
Sam G. Norwitz   +3 more
wiley   +1 more source

Design of Linkable Ring Signature Scheme Based on the MP-LWE Problem and Its Application in IoV

open access: yesIET Information Security
Ensuring the information security and privacy of users in the Internet of Vehicles (IoV) is crucial for gaining user trust and promoting the application of vehicular networks.
Lansheng Han, Wei Liao, Peng Chen
doaj   +1 more source

A Hybrid Multi-Scale Transformer-CNN UNet for Crowd Counting

open access: yesSensors
Crowd counting is a critical computer vision task with significant applications in public security and smart city systems. While deep learning has markedly improved accuracy, persistent challenges include extreme scale variations, severe occlusion, and ...
Kai Zhao   +3 more
doaj   +1 more source

Implementasi Management Network Security Pada Laboratorium Cisco Universitas Bina Darma [PDF]

open access: yes, 2014
The development of computer network technology as a medium for data communications to this increase. The need for the use of shared resources on the network both software and hardware has resulted in the emergence of a variety of network technology ...
Negara, E. S. (Edi)
core  

Techniques for Enhanced Physical-Layer Security

open access: yes, 2010
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems.
Barros, Joao   +2 more
core   +1 more source

Innate Immune Reprogramming Mediated by Endogenous Retroelement Dysregulation Drives Multiple Sclerosis Progression

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
Epigenetic reprogramming in hematopoietic stem and progenitor cells (HSPCs) and downstream myeloid cells, mediated by H3.3 downregulation and endogenous retroelement (ERE) overexpression, contributes to the progression of multiple sclerosis (MS). ABSTRACT Background Skewed myelopoiesis in the bone marrow has been identified as a key driver of multiple ...
Li‐Mei Xiao   +6 more
wiley   +1 more source

Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy