Results 51 to 60 of about 193,653 (266)
Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering
In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption.
Asma'a Mahfoud Hezam Al-Hakimi +4 more
doaj +1 more source
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana +2 more
wiley +1 more source
APPAS: A Privacy-Preserving Authentication Scheme Based on Pseudonym Ring in VSNs
Vehicular social networks (VSNs) provide a variety of services for users based on social relationships through vehicular ad hoc networks (VANETs). During the communication in VSNs, vehicles are at risk of exposure to privacy information.
Tianhan Gao +4 more
doaj +1 more source
The article analyzes the main threats and problems of software protection. Methods for protecting information, their advantages and disadvantages are considered, and the possibility of using existing tools to protect software is studied. The possibility of improving and using a number of software protection methods against active fraud attacks was ...
O. Sytnikova +3 more
openaire +2 more sources
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner +9 more
wiley +1 more source
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone +11 more
wiley +1 more source
The neural network-based differential distinguisher has attracted significant interest from researchers due to its high efficiency in cryptanalysis since its introduction by Gohr in 2019.
Yufei Hou +5 more
doaj +1 more source
Cloud Removal Advances: A Comprehensive Review and Analysis for Optical Remote Sensing Images
Cloud cover significantly decreases the quality of optical remote sensing (ORS) images, adversely impacting its effectiveness in geographic monitoring, disaster prevention, and advanced visual applications.
Jin Ning +3 more
doaj +1 more source
NeuFuzz: Efficient Fuzzing With Deep Neural Network
Coverage-guided graybox fuzzing is one of the most popular and effective techniques for discovering vulnerabilities due to its nature of high speed and scalability.
Yunchao Wang +3 more
doaj +1 more source
There is a significant need for biomaterials with well‐defined stability and bioactivity to support tissue regeneration. In this study, we developed a tunable microgel platform that enables the decoupling of stiffness from porosity, thereby promoting bone regeneration.
Silvia Pravato +9 more
wiley +1 more source

