Results 41 to 50 of about 30,154 (232)
Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model [PDF]
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age.
Waddell, Heidi
core +1 more source
Nanothermometry in Living Cells: Physical Limits, Conceptual and Material Challenges
Heat and temperature are fundamental to life. When nanothermometers began probing regions as small as a living cell, they triggered controversial claims of large intracellular temperature gradients. We review physical constraints energy‐conservation, entropy production, thermodynamic fluctuations, and molecular dynamics.
Taras Plakhotnik
wiley +1 more source
Evaluating Adversarial Robustness of Secret Key-Based Defenses
The vulnerability of neural networks to adversarial attacks has inspired the proposal of many defenses. Key-based input transformation techniques are the recently proposed methods that make use of gradient obfuscation to improve the adversarial ...
Ziad Tariq Muhammad Ali +2 more
doaj +1 more source
With a charge‐ion coupling engineering strategy, a K+/vacancy disordered K0.5Mn0.8Co0.1Ti0.1O2 material has been designed. The targeted transition metal doping disrupts charge ordering and inducing K+/vacancy disordering, thereby enabling rapid K+ diffusion through interconnected channels and a stable solid‐solution reaction mechanism.
Yongfeng Jia +10 more
wiley +1 more source
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes.
Jae Hyuk Suk +2 more
doaj +1 more source
Proxy-Terms Based Query Obfuscation Technique for Private Web Search
Search engines store users’ queries in a query log for performing personalized information retrieval. However, query logs cause privacy concerns and reveal a lot of information about individuals if used against them.
Shariq Bashir +2 more
doaj +1 more source
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll +19 more
wiley +1 more source
Differential Data Analysis for Recommender Systems
We present techniques to characterize which data is important to a recommender system and which is not. Important data is data that contributes most to the accuracy of the recommendation algorithm, while less important data contributes less to the ...
Chow, Richard +3 more
core +1 more source
Asymmetry of the Ferroelectric Phase Transition in BaTiO3
Phase transitions are typically assumed to behave identically in forward and reverse. This work shows that in the ferroelectric material barium titanate this is not true: heating drives an abrupt, first‐order jump, while cooling gives a smooth, continuous change.
Asaf Hershkovitz +14 more
wiley +1 more source
Block Cipher Based Public Key Encryption via Indistinguishability Obfuscation [PDF]
The article is devoted to generation techniques of the new public key crypto-systems, which are based on application of indistinguishability obfuscation methods to selected private key crypto-systems.
Aleksandra Horubała +3 more
doaj +1 more source

