Results 61 to 70 of about 30,382 (272)

Evaluating Adversarial Robustness of Secret Key-Based Defenses

open access: yesIEEE Access, 2022
The vulnerability of neural networks to adversarial attacks has inspired the proposal of many defenses. Key-based input transformation techniques are the recently proposed methods that make use of gradient obfuscation to improve the adversarial ...
Ziad Tariq Muhammad Ali   +2 more
doaj   +1 more source

Artificial Intelligence‐Assisted Workflow for Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling

open access: yesAdvanced Materials, EarlyView.
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll   +19 more
wiley   +1 more source

SCORE: Source Code Optimization & REconstruction

open access: yesIEEE Access, 2020
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes.
Jae Hyuk Suk   +2 more
doaj   +1 more source

Proxy-Terms Based Query Obfuscation Technique for Private Web Search

open access: yesIEEE Access, 2022
Search engines store users’ queries in a query log for performing personalized information retrieval. However, query logs cause privacy concerns and reveal a lot of information about individuals if used against them.
Shariq Bashir   +2 more
doaj   +1 more source

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

Vectorization, Obfuscation and P4 LLVM Tool-chain [PDF]

open access: yes, 2018
This thesis broadly focuses on three different areas: Loop Vectorization, Code Obfuscation, and P4LLVM compiler. The work in Loop vectorization starts with a comparison of Auto-vectorization of GCC, ICC and LLVM compilers and show their strengths and ...
Kumar, Dangeti Tharun   +1 more
core  

Correlated Charge Transport in an Organic Coulomb Glass

open access: yesAdvanced Materials, EarlyView.
ABSTRACT Advances in the development of organic field‐effect transistors (OFETs), electrically gated organic semiconductors (EGOFETs), and organic electrochemical transistors (OECTs) allow for the operation of these devices at very high charge‐carrier densities, where Coulomb interactions between carriers can be expected to become significant.
Magdalena Sophie Dörfler   +3 more
wiley   +1 more source

Block Cipher Based Public Key Encryption via Indistinguishability Obfuscation [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2018
The article is devoted to generation techniques of the new public key crypto-systems, which are based on application of indistinguishability obfuscation methods to selected private key crypto-systems.
Aleksandra Horubała   +3 more
doaj   +1 more source

When Poor Exciton Dissociation Limits Photocurrents in Organic Solar Cells: Why Low Offset Non‐Fullerene Acceptor Blends Can't Be Efficient

open access: yesAdvanced Materials, EarlyView.
The energetic offset between the donor and the acceptor components in organic photoactive layers is central to the tradeoff between photovoltage and photocurrent losses. This Perspective covers the most important issues surrounding this topic in non‐fullerene acceptor blends, from the difficulty of accurately determining state energies and driving ...
Dieter Neher, Manasi Pranav
wiley   +1 more source

Securing IP Cores for DSP Applications Using Structural Obfuscation and Chromosomal DNA Impression

open access: yesIEEE Access, 2022
This paper presents a novel hybrid methodology with structural obfuscation and encrypted chromosomal DNA impression to secure intellectual property (IP) cores of digital signal processing (DSP) applications.
Anirban Sengupta, Rahul Chaurasia
doaj   +1 more source

Home - About - Disclaimer - Privacy