Results 11 to 20 of about 543,621 (317)
Jurisprudential and Legal Study of the Relationship between Surrogate Mother and the Child Born of Surrogacy [PDF]
Using surrogacy as one of the new ways of supporting fertility in away that the owner of the womb (surrogate mother) does not have anycreational relationship (through ovum) with the child, merely raisingthe fetus of another couple and giving birth to it,
Najadali Almasi +2 more
doaj +1 more source
Forensics and Anti-Forensics of a NAND Flash Memory: From a Copy-Back Program Perspective
This paper proposes a safe copy-back program operation in a NAND flash memory, which is targeting digital forensics for a variety of reasons. Due to the background management operation of the NAND flash memory, the original data is highly likely to ...
Na Young Ahn, Dong Hoon Lee
doaj +1 more source
Adversarial attack and defense in reinforcement learning-from AI security view
Reinforcement learning is a core technology for modern artificial intelligence, and it has become a workhorse for AI applications ranging from Atrai Game to Connected and Automated Vehicle System (CAV).
Tong Chen +5 more
doaj +1 more source
Dual Privacy-Preserving Lightweight Navigation System for Vehicular Networks
As an indispensable part of intelligent transportation system, a traffic-sensitive navigation system can assist drivers in avoiding traffic congestion by providing navigation services.
Yingying Yao +4 more
doaj +1 more source
Abstract BACKGROUND Genetic information is unique among all laboratory data because it not only informs the current health of the specific person tested but may also be predictive of the future health of the individual and, to varying degrees, all biological relatives.
Abraham P, Schwab +3 more
openaire +2 more sources
Integral Cryptanalysis of Lightweight Block Cipher PIPO
PIPO is a lightweight block cipher proposed at ICISC 2020, which has a byte-oriented structure suitable for bit-sliced implementation and allows for efficient higher-order masking implementations.
Sunyeop Kim +5 more
doaj +1 more source
LSGAN-AT: enhancing malware detector robustness against adversarial examples
Adversarial Malware Example (AME)-based adversarial training can effectively enhance the robustness of Machine Learning (ML)-based malware detectors against AME. AME quality is a key factor to the robustness enhancement.
Jianhua Wang +4 more
doaj +1 more source
Numerical Evaluation of Job Finish Time Under MTD Environment
Moving target defense (MTD) has recently emerged as a game-changer in the confrontation between cyberattack and defense. MTD mechanism constantly and randomly changes the system configurations to create uncertainty of the attack surface against cyber ...
Zhi Chen +3 more
doaj +1 more source
On ADS-B Sensor Placement for Secure Wide-Area Multilateration
As automatic dependent surveillance–broadcast (ADS-B) becomes more prevalent, the placement of on-ground sensors is vital for Air Traffic Control (ATC) to control the airspace.
Ala’ Darabseh +3 more
doaj +1 more source
With the advent of the Internet of Things, lightweight devices necessitate secure and cost-efficient key storage. Since traditional secure key storage is expensive, novel solutions have been developed based on the idea of deriving the key from noisy ...
Christopher Huth +4 more
doaj +1 more source

