Results 111 to 120 of about 32,602 (220)
Production and environmental outputs of intensive pasture‐based dairy systems must be rebalanced to reduce overall environmental footprint. This analysis documents the tactical management changes that enabled Lincoln University Dairy Farm (LUDF) to transition from high nitrogen (N) inputs (345 kg N fertiliser/ha/year) to a lower N input strategy (167 ...
David F. Chapman
wiley +1 more source
The Pro‐Office Mindset. Anticorruption Beyond Legal Instruments
Journal of Social Philosophy, EarlyView.
Emanuela Ceva, Patrizia Pedrini
wiley +1 more source
ABSTRACT Background Including public contributors in the development of artificial intelligence (AI) systems in healthcare research is growing, however, traditional methods of participation fail to engage people from minoritised groups. This work explores how we can utilise art‐based methods to involve the perspectives of those not previously included ...
Elizabeth Remfry +7 more
wiley +1 more source
Collective Neuroplasticity in the Human Division of Labor: Theory, Evidence, and Implications
ABSTRACT The division of labor in human societies have been mainly analyzed by Adam Smith and Émile Durkheim, both from two different perspectives. However, due to the limitations of the state of knowledge and technology in their respective eras, their approach reached the end of its productivity.
Artur Tomas Grygierczyk
wiley +1 more source
A neural network framework based on ConvNeXt for side-channel hardware Trojan detection
Researchers in the field of hardware security have been dedicated to the study of hardware Trojan detection. Among the various approaches, side-channel detection methods are widely used because of their high detection accuracy and fewer constraints ...
Yuchan Gao +4 more
doaj +1 more source
Defense of hidden backdoor technology for Web
Rootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and ...
Liyue CHEN +4 more
doaj +2 more sources
PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans
Printed circuit Boards (PCBs) are becoming increasingly vulnerable to malicious design alteration, also known as Trojan attacks, due to a distributed business model that often involves various untrusted parties.
Junjun Huan +3 more
doaj +1 more source
Robust hardware Trojan detection leveraging dual-domain features and stacked ensemble learning
Cyber-physical systems rely on sensors, communication, and computing, all powered by integrated circuits (ICs). These ICs are vulnerable to malicious hardware attacks, with hardware Trojans being one of the stealthiest threats.
Sefatun-Noor Puspa +5 more
doaj +1 more source
Deep neural network (DNN) classifiers are potent instruments that can be used in various security-sensitive applications. Nonetheless, they are vulnerable to certain attacks that impede or distort their learning process.
Orson Mengara +2 more
doaj +1 more source
DART: Distribution-Aware Hardware Trojan Detection
Machine Learning (ML) has proven effective in Integrated Circuits (IC) security, particularly in Hardware Trojan (HT) detection. However, a model’s generalization potential depends on its ability to address distribution shifts (DS) in unseen data. Mitigating DS enhances a model’s adaptability to novel variations and threats within the dynamic realm of ...
Luke Chen +5 more
openaire +2 more sources

