Results 21 to 30 of about 32,602 (220)

The role of the host—Neutrophil biology

open access: yesPeriodontology 2000, EarlyView., 2023
Abstract Neutrophilic polymorphonuclear leukocytes (neutrophils) are myeloid cells packed with lysosomal granules (hence also called granulocytes) that contain a formidable antimicrobial arsenal. They are terminally differentiated cells that play a critical role in acute and chronic inflammation, as well as in the resolution of inflammation and wound ...
Iain L. C. Chapple   +4 more
wiley   +1 more source

A Novel Semi-Supervised Adversarially Learned Meta-Classifier for Detecting Neural Trojan Attacks

open access: yesIEEE Access, 2023
Deep neural networks (DNNs) are highly vulnerable to neural Trojan attacks. To carry out such an attack, an adversary retrains a DNN with poisoned data or modifies its parameters to produce incorrect output.
Shahram Ghahremani   +3 more
doaj   +1 more source

Periodontitis and atherosclerotic cardiovascular disease: A critical appraisal

open access: yesPeriodontology 2000, EarlyView., 2023
Abstract In spite of intensive research efforts driving spectacular advances in terms of prevention and treatments, cardiovascular diseases (CVDs) remain a leading health burden, accounting for 32% of all deaths (World Health Organization. “Cardiovascular Diseases (CVDs).” WHO, February 1, 2017, https://www.who.int/news‐room/fact‐sheets/detail ...
Maria Clotilde Carra   +3 more
wiley   +1 more source

Hardware Trojan Detection Method Based on Hidden Markov Model [PDF]

open access: yesJisuanji gongcheng, 2016
Hardware Trojan causes a huge threat to the reliability of the integrated circuit chips,so this paper proposes a Trojan detection method based on Hidden Markov Model(HMM).It extracts the characteristic parameters of original circuit data,trains the ...
GAO Zhenbin,BAI Xue,YANG Song,HE Jiaji
doaj   +1 more source

Threshold quantum cryptograph based on Grover's algorithm [PDF]

open access: yes, 2006
Grover's operator in the two-qubit case can transform a basis into its conjugated basis. A permutation operator can transform a state in the two conjugated bases into its orthogonal state.
Cai   +20 more
core   +2 more sources

Engineering of fluorescent or photoactive Trojan probes for detection and eradication of β-Amyloids

open access: yesDrug Delivery, 2020
Trojan horse technology institutes a potentially promising strategy to bring together a diagnostic or cell-based drug design and a delivery platform.
Amal A. Aziz   +2 more
doaj   +1 more source

Ingress of Threshold Voltage-Triggered Hardware Trojan in the Modern FPGA Fabric–Detection Methodology and Mitigation

open access: yesIEEE Access, 2020
The ageing phenomenon of negative bias temperature instability (NBTI) continues to challenge the dynamic thermal management of modern FPGAs. Increased transistor density leads to thermal accumulation and propagates higher and non-uniform temperature ...
Sohaib Aslam   +4 more
doaj   +1 more source

Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems

open access: yesSensors, 2020
Internet of Things (IoT) and Cyber-Physical Systems (CPS) have profoundly influenced the way individuals and enterprises interact with the world. Although attacks on IoT devices are becoming more commonplace, security metrics often focus on software ...
Anju P. Johnson   +2 more
doaj   +1 more source

The Absolute Magnitude Distribution of Kuiper Belt Objects [PDF]

open access: yes, 2014
Here we measure the absolute magnitude distributions (H-distribution) of the dynamically excited and quiescent (hot and cold) Kuiper Belt objects (KBOs), and test if they share the same H-distribution as the Jupiter Trojans.
Batygin, Konstantin   +4 more
core   +3 more sources

Defeating Untrustworthy Testing Parties: A Novel Hybrid Clustering Ensemble Based Golden Models-Free Hardware Trojan Detection Method

open access: yesIEEE Access, 2019
Due to the globalization of the design and fabrication process of integrated circuits (ICs), ICs are becoming vulnerable to hardware Trojans. Most of the existing hardware Trojan detection works assume that the testing stage is trustworthy.
Mingfu Xue   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy