Results 61 to 70 of about 32,602 (220)
Boron Neutron Capture Therapy at a Crossroads: Translational Gap and Emerging Delivery Agents
This review surveys recent advances in boron delivery agents for BNCT, emphasizing the shift from classical small molecules to multifunctional nanocarriers and theranostic systems. By integrating targeting, imaging, and therapy, next‐generation boron compounds aim to bridge the gap between (bio)chemical innovation and clinical translation.
Christoph Selg, Evamarie Hey‐Hawkins
wiley +1 more source
Bread wheat is an important crop that supplies calories and nutrients to the global population. Enhancing the concentrations and bioavailability of essential micronutrients in wheat is crucial for human nutrition, and we investigated whether arbuscular mycorrhizal (AM) fungi can contribute to the biofortification of wheat.
Thi Diem Nguyen +5 more
wiley +1 more source
(Dis)information Systems: a Systemic View of Disinformation
ABSTRACT Disinformation is an ancient social phenomenon that has found a favourable environment for dissemination in internet‐based social networks. While the scientific community seeks to address the problem by creating specific tools to detect and classify the various types of false information, we argue that systems thinking is necessary to ...
Herbert Laroca +2 more
wiley +1 more source
Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs.
Due to Hardware Trojan (HT), trustworthiness of Integrated Circuit (IC) supply chain is a burning issue in Semiconductor Industry nowadays. Over the last decade, extensive research has been carried on HT detection methods for digital circuits.
Liakot Ali, Farshad
doaj +1 more source
Detecting Neural Trojans Through Merkle Trees
Deep neural networks are utilized in a growing number of industries. Much of the current literature focuses on the applications of deep neural networks without discussing the security of the network itself. One security issue facing deep neural networks is neural trojans.
openaire +2 more sources
Nanomaterials' Multigenerational Effects by Single and Joint Exposure in Non‐mammalian Models
ABSTRACT Nanotoxicology has mainly focused on single‐generation studies, leaving multigenerational toxicity underexplored. Having animal welfare recently gained importance, we aimed to provide the state‐of‐the‐art of knowledge about multigenerational effects in non‐mammalian models in the case of nanomaterials (NM) single and joint exposure to other ...
Andy Joel Taipe Huisa +9 more
wiley +1 more source
Trojan Detection in Large Language Models: Insights from The Trojan Detection Challenge
Large Language Models (LLMs) have demonstrated remarkable capabilities in various domains, but their vulnerability to trojan or backdoor attacks poses significant security risks. This paper explores the challenges and insights gained from the Trojan Detection Competition 2023 (TDC2023), which focused on identifying and evaluating trojan attacks on LLMs.
Maloyan, Narek +3 more
openaire +2 more sources
Detection of Trojan horse by Analysis of System Behavior and Data Packets [PDF]
Trojan horse is said to be one of the most serious threats to computer security. A Trojan horse is an executable file in the Windows operating system. These executable files will have certain static and runtime characteristics.
Abuzneid, Abdelshakour A. +4 more
core
Malware detection techniques for mobile devices
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications
Amro, Bela
core +1 more source
Topological Detection of Trojaned Neural Networks
Deep neural networks are known to have security issues. One particular threat is the Trojan attack. It occurs when the attackers stealthily manipulate the model's behavior through Trojaned training samples, which can later be exploited. Guided by basic neuroscientific principles we discover subtle -- yet critical -- structural deviation characterizing ...
Zheng, Songzhu +4 more
openaire +2 more sources

