Results 51 to 60 of about 30,154 (232)
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
Securing IP Cores for DSP Applications Using Structural Obfuscation and Chromosomal DNA Impression
This paper presents a novel hybrid methodology with structural obfuscation and encrypted chromosomal DNA impression to secure intellectual property (IP) cores of digital signal processing (DSP) applications.
Anirban Sengupta, Rahul Chaurasia
doaj +1 more source
Correlated Charge Transport in an Organic Coulomb Glass
ABSTRACT Advances in the development of organic field‐effect transistors (OFETs), electrically gated organic semiconductors (EGOFETs), and organic electrochemical transistors (OECTs) allow for the operation of these devices at very high charge‐carrier densities, where Coulomb interactions between carriers can be expected to become significant.
Magdalena Sophie Dörfler +3 more
wiley +1 more source
A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation
QoS-based Web service recommendation has recently gained much attention for providing a promising way to help users find high-quality services. To facilitate such recommendations, existing studies suggest the use of collaborative filtering techniques for
He, Pinjia +3 more
core +1 more source
This work reports on the actuation behavior of CP‐based polypyrrole/PVdF TYs soaked in electrolyte/ionic liquids and woven actuators where such TYs are integrated. These studies are important toward the creation of on‐body applications such as wearable soft robotics, where textiles offer many advantages such as increased force, integrated electrical ...
Carin Backe +4 more
wiley +1 more source
Evaluation of Local Security Event Management System vs. Standard Antivirus Software
The detection and classification of threats in computer systems has been one of the main problems researched in Cybersecurity. As technology evolves, the tactics employed by adversaries have also become more sophisticated to evade detection systems.
Antonio Pérez-Sánchez, Rafael Palacios
doaj +1 more source
Vectorization, Obfuscation and P4 LLVM Tool-chain [PDF]
This thesis broadly focuses on three different areas: Loop Vectorization, Code Obfuscation, and P4LLVM compiler. The work in Loop vectorization starts with a comparison of Auto-vectorization of GCC, ICC and LLVM compilers and show their strengths and ...
Kumar, Dangeti Tharun +1 more
core
Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore +20 more
wiley +1 more source
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identify phishing URLs.
Faloutsos, Michalis +2 more
core +2 more sources
This study identifies GDF15+ TAMs as a cell subset mediating tumor regression after immunotherapy. Macrophage‐intrinsic GDF15 enhances phagocytosis and antigen cross‐presentation to CD8+ T cells through the NF‐κB signaling pathway, thereby inhibiting tumor progression.
Xinyu Zhou +9 more
wiley +1 more source

