Results 71 to 80 of about 32,602 (220)

Image and video analysis using graph neural network for Internet of Medical Things and computer vision applications

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma   +4 more
wiley   +1 more source

TROJAN-GUARD: Hardware Trojans Detection Using GNN in RTL Designs

open access: yes2025 International Joint Conference on Neural Networks (IJCNN)
Chip manufacturing is a complex process, and to achieve a faster time to market, an increasing number of untrusted third-party tools and designs from around the world are being utilized. The use of these untrusted third party intellectual properties (IPs) and tools increases the risk of adversaries inserting hardware trojans (HTs). The covert nature of
Thorat, Kiran   +3 more
openaire   +2 more sources

CHINESE UNIVERSITIES AS URBAN DEVELOPERS: The Tale of Two Innovation Complexes in Nanjing, China

open access: yesInternational Journal of Urban and Regional Research, EarlyView.
Abstract Chinese universities are important but undertheorized players in the production of urban built environments. Most work focuses on purpose‐built university towns, neglecting the redevelopment of underutilized downtown campuses. Therefore, this article considers how two publicly funded universities in Nanjing attempted to establish ‘innovation ...
Hao Chen, Yunpeng Zhang
wiley   +1 more source

Triggered Hardware Trojan Detection in IP Cores for Ensuring Safety in Cyber Physical Systems

open access: yesChips
Cyber physical systems (CPSs) increasingly depend on complex hardware IP cores to perform critical functions. However, triggered hardware Trojans’ stealthy, malicious modifications activated under rare conditions pose significant threats to the safety ...
Mahfuzur Rahman Talukder   +3 more
doaj   +1 more source

Analysis and Improvements in Trojan Designing [PDF]

open access: yes, 2012
While there are numerous Trojans out there in the internet, all of them are easily detected by antiviruses or blocked by firewalls. Apart from that, they are also easily detected and removed by any user with a good knowledge in Operating System and ...
Swain, Shanti Swaroop
core  

Trojan Detection Test for Clockless Circuits

open access: yesJournal of Electronic Testing, 2020
Clockless integrated circuits, as any type of integrated system, might today carry hardware Trojan (HT) circuits maliciously implanted in the designs during outsourced phases of fabrication. This paper proposes a testing technique dedicated to detect HTs in clockless circuits fabricated in CMOS technologies.
Ricardo Aquino Guazzelli   +5 more
openaire   +2 more sources

Co‐phylogeny and biogeography of the myrmecophilous beetle Paussus favieri (Carabidae, Paussinae) and its host ant Pheidole pallidula (Hymenoptera, Myrmicinae)

open access: yesInsect Science, EarlyView.
Strict patterns of co‐divergence have rarely been documented other than among organisms and their symbionts. In this paper, using a molecular approach, we inferr the population‐level phylogenies of a Mediterranean ant species Pheidole pallidula and its nest parasite, the obligate myrmecophilous beetle Paussus favieri. We then investigate the role of co‐
Davide Bergamaschi   +2 more
wiley   +1 more source

IP Soft Core Hardware Trojan Detection Method Based on Grayscale Graph Analysis [PDF]

open access: yesJisuanji gongcheng
With the refinement of the division of labor in chip design, manufacturing, and packaging processes, the use of third-party Intellectual Property(IP) soft cores for secondary development can significantly improve design efficiency and reduce duplication ...
Lin NI, Zihui LIU, Shuai ZHANG, Jiujiang HAN, Ming XIAN
doaj   +1 more source

A Near-Infrared Search for Silicates in Jovian Trojan Asteroids

open access: yes, 2011
We obtained near-infrared (0.8 - 2.5 micron) spectra of seven Jovian Trojan asteroids that have been formerly reported to show silicate-like absorption features near 1 micron.
Bin Yang   +21 more
core   +1 more source

Dynamic 16S rRNA Sequencing of the Abdominal Wall Surgical Site Highlights Potential Pathways of Incisional Surgical Site Infection in Colorectal Surgery

open access: yesANZ Journal of Surgery, EarlyView.
ABSTRACT Introduction Understanding the microbial changes within the surgical site may enhance our understanding of the origin and subsequent role of microbes in the causation of incisional surgical site infections (SSIs). In this study we used 16S rRNA sequencing to establish the dynamic microbiota of the surgical site in patients undergoing bowel ...
Veral Vishnoi   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy