Results 81 to 90 of about 30,050 (262)

DNNobfus: a study on obfuscation-based edge-side model protection framework

open access: yes网络与信息安全学报
The proliferation of artificial intelligence models has rendered them vulnerable to a myriad of security threats. The extensive integration of deep learning models into edge devices has introduced novel security challenges. Given the analogous structural
SONG Feiyang   +6 more
doaj   +3 more sources

Interest-Based Access Control for Content Centric Networks (extended version)

open access: yes, 2015
Content-Centric Networking (CCN) is an emerging network architecture designed to overcome limitations of the current IP-based Internet. One of the fundamental tenets of CCN is that data, or content, is a named and addressable entity in the network ...
Ghali, Cesar   +3 more
core   +1 more source

The Role of Actual and Purported Origin in e‐Commerce Wine Pricing: Evidence From Italian and French Names on Labels

open access: yesAgribusiness, EarlyView.
ABSTRACT The origin of a product, if associated with good quality, can contribute to building a positive collective reputation, leading to a potential price premium. However, it is conceivable that a producer markets a product by evoking symbols, images, words, and values typical of places other than where it was designed or produced, creating a ...
Annalisa Caloffi   +2 more
wiley   +1 more source

CrossMatAgent: AI‐Assisted Design of Manufacturable Metamaterial Patterns via Multi‐Agent Generative Framework

open access: yesAdvanced Intelligent Discovery, EarlyView.
CrossMatAgent is a multi‐agent framework that combines large language models and diffusion‐based generative AI to automate metamaterial design. By coordinating task‐specific agents—such as describer, architect, and builder—it transforms user‐provided image prompts into high‐fidelity, printable lattice patterns.
Jie Tian   +12 more
wiley   +1 more source

The Effectiveness Of Bytecode Decompilation [PDF]

open access: yes
High-level bytecodes used by object-oriented managed execution environments make it easy to decompile them. This paper studies the reasons that make bytecode decompilers such efficient and presents basic obfuscation techniques as an efficient protection ...
Robert Enyedi
core  

Impact of Biomimetic Pinna Shape Variation on Clutter Echoes: A Machine Learning Approach

open access: yesAdvanced Intelligent Systems, EarlyView.
Bats with dynamic ear structures navigate dense, echo‐rich environments, yet the echoes they receive are highly random. This study shows that machine learning can reliably detect structural signatures in these seemingly chaotic biosonar signals. The results open new directions for biologically inspired sensing, where time‐varying receiver shapes ...
Ibrahim Eshera   +2 more
wiley   +1 more source

Assessing User Perceptions and Preferences on Applying Obfuscation Techniques for Privacy Protection in Augmented Reality

open access: yesFuture Internet
As augmented reality (AR) technologies become increasingly integrated into everyday life, privacy-maintenance concerns about their capacity to capture and process sensitive visual data also increase.
Ana Cassia Cruz   +5 more
doaj   +1 more source

Anti-semantic Analysis Script Fusion Technology [PDF]

open access: yesJisuanji kexue
In recent years,script programs have been widely used in the field of computer science.Script programs are increasingly being used in the current network environment due to their powerful functionality and high execution efficiency,simpler writing and ...
TIAN Bowen, YANG Ju, XIONG Xiaobing, DUAN Shuang, WEI Ran
doaj   +1 more source

“And in some cases, we're the best option:” A qualitative study of community‐based doula support for black perinatal mental health

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract We explored community‐based doulas' perspectives on the acceptability of using formal screening tools to address low rates of mental health screening, diagnosis, and treatment for perinatal anxiety and depression among Black women. Using thematic analysis, we analyzed interview data from 30 community‐based doulas who support Black families ...
Tamara Nelson   +5 more
wiley   +1 more source

Mapping Intimate Partner Financial Abuse Across Public and Private Systems

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This article maps the ways that intimate partner financial abuse presents, and the range of public and private entities involved in its perpetration. It reports on an analysis of submissions by individuals to the Australian parliamentary inquiry into the Financial Services Regulatory Framework in Relation to Financial Abuse.
Adrienne Byrt   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy