Transfer learning with XAI for robust malware and IoT network security. [PDF]
Almadhor A +6 more
europepmc +1 more source
High‐Frequency Ultrasonographic Characterization of Subcutaneous Glomus Tumors
Color Doppler image reveals intralesional hypervascularity. ABSTRACT Objective To evaluate the clinical manifestations and ultrasonographic characteristics of glomus tumors under the nails and other subcutaneous soft tissues. Methods A retrospective analysis was performed on 45 patients with pathologically confirmed glomus tumors who underwent ...
Mingyu Bai, Nan Wang, Jie Jiang
wiley +1 more source
Adaptive malware identification via integrated SimCLR and GRU networks. [PDF]
Alsubaei FS +5 more
europepmc +1 more source
From Empire to Aid: Analysing Persistence of Colonial Legacies in Foreign Aid to Africa
ABSTRACT For decades now, Western development agencies and donors have been castigated for their colonial biases in providing aid to Africa. It is well established that donors provide considerably more foreign aid to their former colonies relative to other countries.
Swetha Ramachandran
wiley +1 more source
Obfuscation via pitch-shifting for balancing privacy and diagnostic utility in voice-based cognitive assessment. [PDF]
Ahangaran M +5 more
europepmc +1 more source
Healing Beams: Radiation and Radiotherapy in Novels, Poems, Music, Film, Painting
Radiation and radiotherapy are perceived by patients and the general public as mysterious, dangerous and healing. The image of radiation and radiotherapy can be analysed by studying novels, poems, music, film and painting. Our paper reviews how radiation and radiotherapy are perceived by patients, the general public, as reflected in various art genres.
Ad A. Kaptein +3 more
wiley +1 more source
HALT-PROP: Human-Annotated Lithuanian Textual Corpus for Propaganda Narratives and Techniques. [PDF]
Rizgelienė I +3 more
europepmc +1 more source
Acting authentically: Using play to cultivate authentic interrelating in role performance
Summary Research is increasingly demonstrating that authenticity and human connection are fundamental and interrelated human needs. However, organizational roles often constrain authenticity and connection in workplace interactions, especially roles that are highly scripted.
Lyndon E. Garrett
wiley +1 more source
PromptGuard a structured framework for injection resilient language models. [PDF]
Alzahrani A.
europepmc +1 more source
Bypassing defensive system detection using obfuscation techniques research
Per pastaruosius metus antivirusinės programos tobulėjo didele sparta. Anksčiau, kibernetinio saugumo įrankiai pasikliaudavo žymų arba "parašų" duomenų bazėmis norėdamos apsisaugoti nuo kenkėjiškų programų. Tačiau per pastaruosius metus buvo sukurta didelis kiekis naujovių - heuristinė analizė, realaus laiko skenavimai, pavojaus identifikacija ...
openaire +1 more source

