Results 71 to 80 of about 32,756 (234)
The introduction outlines the review scope. Microbial cell factories as living drugs cover host–gut microbiota, bacteria, yeast, and other microbial systems, with comparative host advantages. Engineering strategies include synthetic circuits, quorum sensing, and memory.
Cemile Elif Özçelik +3 more
wiley +1 more source
Cassandra: Detecting Trojaned Networks From Adversarial Perturbations
Deep neural networks are being widely deployed for critical tasks. In many cases, pre-trained models are sourced from vendors who may have disrupted the training pipeline to insert Trojan behaviors.
Xiaoyu Zhang +4 more
doaj +1 more source
This review explores how Fusobacterium nucleatum extracellular vesicles drive local oral diseases and distal pathologies via sophisticated cross‐compartment cross talk. It highlights the transformative potential of these “tiny carriers” as next‐generation molecular intermediaries for advanced health monitoring and innovative bio‐interventions by ...
Rongyang Ma +6 more
wiley +1 more source
Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs.
Due to Hardware Trojan (HT), trustworthiness of Integrated Circuit (IC) supply chain is a burning issue in Semiconductor Industry nowadays. Over the last decade, extensive research has been carried on HT detection methods for digital circuits.
Liakot Ali, Farshad
doaj +1 more source
Homomorphic Data Isolation for Hardware Trojan Protection
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr +4 more
core +1 more source
Abstract While the physical and mental health benefits of greenspace exposure are well documented, ethnic minority communities in the United Kingdom continue to engage with these environments at disproportionately lower rates. This persistent disparity points to an oversight in existing literature, specifically regarding how these communities navigate ...
Andrew K. Palmer +5 more
wiley +1 more source
(Dis)information Systems: a Systemic View of Disinformation
ABSTRACT Disinformation is an ancient social phenomenon that has found a favourable environment for dissemination in internet‐based social networks. While the scientific community seeks to address the problem by creating specific tools to detect and classify the various types of false information, we argue that systems thinking is necessary to ...
Herbert Laroca +2 more
wiley +1 more source
Nanomaterials' Multigenerational Effects by Single and Joint Exposure in Non‐mammalian Models
ABSTRACT Nanotoxicology has mainly focused on single‐generation studies, leaving multigenerational toxicity underexplored. Having animal welfare recently gained importance, we aimed to provide the state‐of‐the‐art of knowledge about multigenerational effects in non‐mammalian models in the case of nanomaterials (NM) single and joint exposure to other ...
Andy Joel Taipe Huisa +9 more
wiley +1 more source
Triggered Hardware Trojan Detection in IP Cores for Ensuring Safety in Cyber Physical Systems
Cyber physical systems (CPSs) increasingly depend on complex hardware IP cores to perform critical functions. However, triggered hardware Trojans’ stealthy, malicious modifications activated under rare conditions pose significant threats to the safety ...
Mahfuzur Rahman Talukder +3 more
doaj +1 more source
A Near-Infrared Search for Silicates in Jovian Trojan Asteroids
We obtained near-infrared (0.8 - 2.5 micron) spectra of seven Jovian Trojan asteroids that have been formerly reported to show silicate-like absorption features near 1 micron.
Bin Yang +21 more
core +1 more source

