Results 71 to 80 of about 514,969 (347)
Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation
Deep learning (DL)-based techniques have recently proven to be very successful when applied to profiled side-channel attacks (SCA). In a real-world profiled SCA scenario, attackers gain knowledge about the target device by getting access to a similar ...
Pei Cao, Chi Zhang, Xiangjun Lu, Dawu Gu
doaj +1 more source
ABSTRACT Objective This study aimed to systematically observe the clinical manifestations, immune cell subsets, and dynamic changes in serological indicators in patients with myasthenia gravis (MG) before and after efgartigimod (EFG) treatment. Methods We analyzed the baseline data, laboratory parameters, and lymphocyte subset proportions in MG ...
Tiancheng Luo +9 more
wiley +1 more source
Functional Connectivity Linked to Cognitive Recovery After Minor Stroke
ABSTRACT Objective Patients with minor stroke exhibit slowed processing speed and generalized alterations in functional connectivity involving frontoparietal cortex (FPC). The pattern of connectivity evolves over time. In this study, we examine the relationship of functional connectivity patterns to cognitive performance, to determine ...
Vrishab Commuri +7 more
wiley +1 more source
RISC-V is equipped with physical memory protection (PMP) to prevent malicious software from accessing protected memory regions. PMP provides a trusted execution environment (TEE) that isolates secure and insecure applications. In this study, we propose a
Shoei Nashimoto +3 more
doaj +1 more source
PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance [PDF]
The power consumption of a microprocessor is a huge channel for information leakage. While the most popular exploitation of this channel is to recover cryptographic keys from embedded devices, other applications such as mobile app fingerprinting, reverse
F. MuhammadArsathK. +3 more
semanticscholar +1 more source
Anonymous Identity Based Broadcast Encryption against Continual Side Channel Attacks in the State Partition Model [PDF]
Qihong Yu, Jiguo Li, Sai Ji
openalex +1 more source
Lessons Learned From a Delayed‐Start Trial of Modafinil for Freezing of Gait in Parkinson's Disease
ABSTRACT Objective Freezing of gait (FOG) in people with Parkinson's disease (PwPD) is debilitating and has limited treatments. Modafinil modulates beta/gamma band activity in the pedunculopontine nucleus (PPN), like PPN deep brain stimulation. We therefore tested the hypothesis that Modafinil would improve FOG in PwPD.
Tuhin Virmani +8 more
wiley +1 more source
Secure and Computationally-Efficient Cryptographic Primitive based on Cellular Automation
Mageto, a random number generator based on one-dimensional cellular automaton (CA) is presented. Three procedures of secure implementation using Mageto is proposed and discussed. Implementations are very efficient in a wide range of hardware and software
Vuckovac, Rade
core +1 more source
Side-Channel Expectation-Maximization Attacks
Block ciphers are protected against side-channel attacks by masking. On one hand, when the leakage model is unknown, second-order correlation attacks are typically used. On the other hand, when the leakage model can be profiled, template attacks are prescribed.
Béguinot, Julien +3 more
openaire +4 more sources
ABSTRACT Objective The Gold Coast criteria permit diagnosis of amyotrophic lateral sclerosis (ALS) even without upper motor neuron (UMN) signs. However, whether ALS patients with UMN signs (ALSwUMN) and those without (ALSwoUMN) share similar characteristics and prognoses remains unclear.
Hee‐Jae Jung +7 more
wiley +1 more source

