Results 101 to 110 of about 32,756 (234)
Abstract Design Practice is shifting towards transdisciplinary, collaborative and problem‐based approaches in response to complex challenges of a changing world including societal issues and the climate crisis. However, the nature of emerging roles for designers aiming to contribute to sustainability transitions, and the capabilities that empower ...
Charlotte Kessler, Janice Rieger
wiley +1 more source
TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents [PDF]
Recent work has identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan attacks at training time.
Jha, Susmit +3 more
core
Unequal Solidarity: Club Rules and Crisis Support in the European Polity
Abstract Is European solidarity during crises due to common or close identities? Or do Europeans punish rule‐breaking countries by showing them less solidarity? Research on the determinants of European solidarity increasingly focuses on ‘solidarity to’, how givers' attitudes are shaped by their perceptions of receiving member states.
Zbigniew Truchlewski +2 more
wiley +1 more source
Hardware Trojan Design and Detection in Pre-Charge Half Buffer Asynchronous Circuits
The escalating landscape of cyber warfare has made the detection of hardware Trojans, malicious circuit components capable of leaking sensitive information, a critical research priority.
Chukwunalu Asuai +3 more
doaj +1 more source
The Return of Industrial Policy in the EU: A Chance for Central and Eastern Europe?
Abstract This contribution explores the Visegrad four's (V4) responses to the revival of industrial policy in the European Union (EU). To a region so highly industrialised, and so dependent on foreign firms, this revival brings mixed blessings. Industrial policy focused on ‘European champions’ is driving investment towards core regions and firms ...
Vera Šćepanović, Imre G. Szabó
wiley +1 more source
Consistency-based characterization for IC Trojan detection
A Trojan attack maliciously modifies, alters, or embeds unplanned components inside the exploited chips. Given the original chip specifications, and process and simulation models, the goal of Trojan detection is to identify the malicious components. This paper introduces a new Trojan detection method based on nonintrusive external IC quiescent current ...
Yousra Alkabani, Farinaz Koushanfar
openaire +1 more source
Policing the Environmental Crisis: Climate Protest, the State, and Law and Order
Constellations, EarlyView.
Oscar Talbot
wiley +1 more source
Abstract Disinformation has become a contentious issue within the European Union (EU) and in transatlantic relations, raising fundamental questions about how democratic societies should regulate online content. This article investigates how competing democratic visions shape European Parliamentary debates on the Digital Services Act (DSA).
Linus Wahlberg, Sara Wissén
wiley +1 more source
Abstract The aim of this study was to investigate the potential effects of monosodium glutamate (MSG), a known flavour enhancer added to many ready‐to‐eat foods, as a feed additive in rainbow trout (Oncorhynchus mykiss). Evaluating the effects of MSG on aquatic organisms will fill the knowledge gap in this field by monitoring the haematological indices
Gonca Alak +16 more
wiley +1 more source
Convolutional neural networks (CNNs) have demonstrated significant superiority in modern artificial intelligence (AI) applications. To accelerate the inference process of CNNs, reconfigurable CNN accelerators that support diverse networks are widely ...
Jia Hou +3 more
doaj +1 more source

