Results 61 to 70 of about 32,602 (220)

Boron Neutron Capture Therapy at a Crossroads: Translational Gap and Emerging Delivery Agents

open access: yesChemistry – A European Journal, EarlyView.
This review surveys recent advances in boron delivery agents for BNCT, emphasizing the shift from classical small molecules to multifunctional nanocarriers and theranostic systems. By integrating targeting, imaging, and therapy, next‐generation boron compounds aim to bridge the gap between (bio)chemical innovation and clinical translation.
Christoph Selg, Evamarie Hey‐Hawkins
wiley   +1 more source

Arbuscular mycorrhizal fungal inoculation increases the bioavailability of zinc and iron in wheat grain

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Bread wheat is an important crop that supplies calories and nutrients to the global population. Enhancing the concentrations and bioavailability of essential micronutrients in wheat is crucial for human nutrition, and we investigated whether arbuscular mycorrhizal (AM) fungi can contribute to the biofortification of wheat.
Thi Diem Nguyen   +5 more
wiley   +1 more source

(Dis)information Systems: a Systemic View of Disinformation

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT Disinformation is an ancient social phenomenon that has found a favourable environment for dissemination in internet‐based social networks. While the scientific community seeks to address the problem by creating specific tools to detect and classify the various types of false information, we argue that systems thinking is necessary to ...
Herbert Laroca   +2 more
wiley   +1 more source

Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs.

open access: yesPLoS ONE, 2021
Due to Hardware Trojan (HT), trustworthiness of Integrated Circuit (IC) supply chain is a burning issue in Semiconductor Industry nowadays. Over the last decade, extensive research has been carried on HT detection methods for digital circuits.
Liakot Ali, Farshad
doaj   +1 more source

Detecting Neural Trojans Through Merkle Trees

open access: yes, 2023
Deep neural networks are utilized in a growing number of industries. Much of the current literature focuses on the applications of deep neural networks without discussing the security of the network itself. One security issue facing deep neural networks is neural trojans.
openaire   +2 more sources

Nanomaterials' Multigenerational Effects by Single and Joint Exposure in Non‐mammalian Models

open access: yesEnvironmental Toxicology, EarlyView.
ABSTRACT Nanotoxicology has mainly focused on single‐generation studies, leaving multigenerational toxicity underexplored. Having animal welfare recently gained importance, we aimed to provide the state‐of‐the‐art of knowledge about multigenerational effects in non‐mammalian models in the case of nanomaterials (NM) single and joint exposure to other ...
Andy Joel Taipe Huisa   +9 more
wiley   +1 more source

Trojan Detection in Large Language Models: Insights from The Trojan Detection Challenge

open access: yes
Large Language Models (LLMs) have demonstrated remarkable capabilities in various domains, but their vulnerability to trojan or backdoor attacks poses significant security risks. This paper explores the challenges and insights gained from the Trojan Detection Competition 2023 (TDC2023), which focused on identifying and evaluating trojan attacks on LLMs.
Maloyan, Narek   +3 more
openaire   +2 more sources

Detection of Trojan horse by Analysis of System Behavior and Data Packets [PDF]

open access: yes, 2015
Trojan horse is said to be one of the most serious threats to computer security. A Trojan horse is an executable file in the Windows operating system. These executable files will have certain static and runtime characteristics.
Abuzneid, Abdelshakour A.   +4 more
core  

Malware detection techniques for mobile devices

open access: yes, 2017
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications
Amro, Bela
core   +1 more source

Topological Detection of Trojaned Neural Networks

open access: yes, 2021
Deep neural networks are known to have security issues. One particular threat is the Trojan attack. It occurs when the attackers stealthily manipulate the model's behavior through Trojaned training samples, which can later be exploited. Guided by basic neuroscientific principles we discover subtle -- yet critical -- structural deviation characterizing ...
Zheng, Songzhu   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy