Results 41 to 50 of about 30,154 (232)

Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model [PDF]

open access: yes, 2020
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age.
Waddell, Heidi
core   +1 more source

Nanothermometry in Living Cells: Physical Limits, Conceptual and Material Challenges

open access: yesAdvanced Functional Materials, EarlyView.
Heat and temperature are fundamental to life. When nanothermometers began probing regions as small as a living cell, they triggered controversial claims of large intracellular temperature gradients. We review physical constraints energy‐conservation, entropy production, thermodynamic fluctuations, and molecular dynamics.
Taras Plakhotnik
wiley   +1 more source

Evaluating Adversarial Robustness of Secret Key-Based Defenses

open access: yesIEEE Access, 2022
The vulnerability of neural networks to adversarial attacks has inspired the proposal of many defenses. Key-based input transformation techniques are the recently proposed methods that make use of gradient obfuscation to improve the adversarial ...
Ziad Tariq Muhammad Ali   +2 more
doaj   +1 more source

Tailoring K+/Vacancy Disordered Layered Oxide via Charge Engineering for Stabilizing High‐Performance Potassium‐Ion Batteries

open access: yesAdvanced Functional Materials, EarlyView.
With a charge‐ion coupling engineering strategy, a K+/vacancy disordered K0.5Mn0.8Co0.1Ti0.1O2 material has been designed. The targeted transition metal doping disrupts charge ordering and inducing K+/vacancy disordering, thereby enabling rapid K+ diffusion through interconnected channels and a stable solid‐solution reaction mechanism.
Yongfeng Jia   +10 more
wiley   +1 more source

SCORE: Source Code Optimization & REconstruction

open access: yesIEEE Access, 2020
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes.
Jae Hyuk Suk   +2 more
doaj   +1 more source

Proxy-Terms Based Query Obfuscation Technique for Private Web Search

open access: yesIEEE Access, 2022
Search engines store users’ queries in a query log for performing personalized information retrieval. However, query logs cause privacy concerns and reveal a lot of information about individuals if used against them.
Shariq Bashir   +2 more
doaj   +1 more source

Artificial Intelligence‐Assisted Workflow for Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling

open access: yesAdvanced Materials, EarlyView.
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll   +19 more
wiley   +1 more source

Differential Data Analysis for Recommender Systems

open access: yes, 2013
We present techniques to characterize which data is important to a recommender system and which is not. Important data is data that contributes most to the accuracy of the recommendation algorithm, while less important data contributes less to the ...
Chow, Richard   +3 more
core   +1 more source

Asymmetry of the Ferroelectric Phase Transition in BaTiO3

open access: yesAdvanced Materials, EarlyView.
Phase transitions are typically assumed to behave identically in forward and reverse. This work shows that in the ferroelectric material barium titanate this is not true: heating drives an abrupt, first‐order jump, while cooling gives a smooth, continuous change.
Asaf Hershkovitz   +14 more
wiley   +1 more source

Block Cipher Based Public Key Encryption via Indistinguishability Obfuscation [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2018
The article is devoted to generation techniques of the new public key crypto-systems, which are based on application of indistinguishability obfuscation methods to selected private key crypto-systems.
Aleksandra Horubała   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy