Results 251 to 260 of about 112,314 (333)
Experimental coherent one-way quantum key distribution with simplicity and practical security. [PDF]
Cao XY +5 more
europepmc +1 more source
Lifecycle‐Based Governance to Build Reliable Ethical AI Systems
ABSTRACT Artificial intelligence (AI) systems represent a paradigm shift in technological capabilities, offering transformative potential across industries while introducing novel governance and implementation challenges. This paper presents a comprehensive framework for understanding AI systems through three critical dimensions: trustworthiness ...
Maikel Leon
wiley +1 more source
Multi-carrier information hiding based on projection-driven vertex embedding in 3D models. [PDF]
Ou Y +5 more
europepmc +1 more source
Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images
Chien-Chang Chen, C.H. Liu
openalex +1 more source
ABSTRACT Enhancing infrastructure resilience, a key component of transforming and sustainably developing service utilities, requires a transdisciplinary and systems engineering framework. Addressing vulnerabilities in system architecture offers opportunities for resilience improvements, thereby mitigating the environmental, social, and economic impacts
Bob Hasanabadi +2 more
wiley +1 more source
A Two-Phase Embedding Approach for Secure Distributed Steganography. [PDF]
Woźniak K, Ogiela MR, Ogiela L.
europepmc +1 more source
In the aftermath of the 2020 U.S. election, the boundary between activism and extremism blurred, with election officials reporting violent threats and false accusations of election fraud. From a symbolic interactionist perspective, these attacks provide a unique lens for examining the consequences of being falsely labeled a criminal.
Steven Windisch
wiley +1 more source
Lightweight semantic compression visual cryptography for secure medical image transmission in IoT systems. [PDF]
Blesswin AJ +5 more
europepmc +1 more source

