Results 151 to 160 of about 27,441 (278)
IAESR: IoT-oriented authenticated encryption based on iShadow round function. [PDF]
Zhang Y +5 more
europepmc +1 more source
Abstract In the face of powerful criticism, the “reliance interest” continues to hold an impactful position in judicial and academic treatment of contract damages. And yet, the theoretical foundation of reliance damages for breach of contract remains unsettled.
Yehuda Adar, Efi Zemach
wiley +1 more source
From Human Hands to Machine Minds: Financing AI‐Driven Entrepreneurship in Reward‐Based Crowdfunding
ABSTRACT This study examines the effect of artificial intelligence (AI) adoption on financing performance in reward‐based crowdfunding. Using Kickstarter data from US projects, we find that AI projects have lower pledged amounts, receive fewer donations and attract fewer backers.
Zirui Song, Yihui Lan, Yuan George Shan
wiley +1 more source
An end-to-end convolutional neural network for secure image transmission via joint encryption and steganography. [PDF]
Iqbal A +6 more
europepmc +1 more source
ABSTRACT Sustainability has become a defining challenge for firms in emerging economies, where pressures to address environmental and social concerns increasingly intersect with the need to remain financially competitive. Yet many organizations struggle to show whether sustainability disclosures create measurable business value, particularly in complex
Li KaoDui +3 more
wiley +1 more source
The WeDDa framework for preventing smishing and vishing using protocol agnostic cryptographic trust. [PDF]
Salem MFM, Hamad EKI, El-Bendary MAM.
europepmc +1 more source
Abstract Behavioural science research has the potential to develop evidence‐based strategies to fight disinformation about climate science and climate mitigation action; however, this research has yet to be conducted systematically with validated sets of climate disinformation stimuli. Here, we present the Climate Disinformation Corpus, a collection of
Tobia Spampatti +3 more
wiley +1 more source
Segment and Recover: Defending Object Detectors Against Adversarial Patch Attacks. [PDF]
Gu H, Jafarnejadsani H.
europepmc +1 more source

