Results 91 to 100 of about 115,293 (296)

RAitc: Securely Auditing the Remotely Executed Applications

open access: yesIEEE Access, 2020
One of the most important security challenges in remote computing (e.g., cloud computing) is protecting users' applications running on the service platform from malicious attacks.
Lei Zhou, Entao Luo, Guojun Wang
doaj   +1 more source

Minimally Invasive Bowel Cancer Detection through Vibrating Microrobot‐Induced Elastography

open access: yesAdvanced Intelligent Systems, EarlyView.
A minimally invasive diagnostic method for bowel cancer detection combines vibrating microrobots and laser speckle contrast imaging to map tissue elasticity. By analyzing vibration‐induced resonance, detailed elasticity maps are produced, clearly differentiating tumors from healthy tissue.
Andrew Bickerdike   +3 more
wiley   +1 more source

A TEE-Based Federated Privacy Protection Method: Proposal and Implementation

open access: yesApplied Sciences
With the continuous enhancement of privacy protection globally, there is a problem for the traditional machine learning paradigm, which is that training data cannot be obtained from a single place.
Libo Zhang   +4 more
doaj   +1 more source

A blockchain-enabled wiki framework based on participatory design

open access: yesDigital Communications and Networks, 2022
The 5G mobile Internet facilitates contents generation for online communities and platforms through human-to-human collaboration. Wikipedia, a well-known online community, uses wiki technology to build an encyclopedia through collective intelligence and ...
Zheng Xu   +4 more
doaj  

Secure Sensor Prototype Using Hardware Security Modules and Trusted Execution Environments in a Blockchain Application: Wine Logistic Use Case [PDF]

open access: gold, 2023
Antonio Cabrera   +5 more
openalex   +1 more source

A Synthesized Neural Control System for Bioinspired Robots to Achieve Diverse Locomotion

open access: yesAdvanced Intelligent Systems, EarlyView.
A novel hexapod robot named RENS H2 based on the synthesized neural control system. The control system is constructed based on the central pattern generator and virtual motoneurons network, serving as the foundation of the behavioral network. It encompasses omnidirectional movement, regulation of motor neuron intensity, sensorimotor integration, local ...
Chunchao Liu, Yaguang Zhu, Zhigang Han
wiley   +1 more source

Dynamic Distribution‐Based Multiagent Cooperative Defense: An Enhanced Resource Allocation and Defense Efficiency Strategy

open access: yesAdvanced Intelligent Systems, EarlyView.
This study addresses multiagent defense challenges against low‐cost swarm attacks through a hierarchical framework combining resource allocation and PPO optimization. The three‐layer architecture coordinates strategic planning, deployment optimization, and real‐time execution.
Xiaokai Fei   +2 more
wiley   +1 more source

TEEvil: Identity Lease via Trusted Execution Environments

open access: yes, 2019
21 pages, 5 ...
Puddu, Ivan; id_orcid0000-0003-2198-2405   +5 more
openaire   +3 more sources

Do Influential Articles on the Genetics of Autism Show Evidence of Engagement With the Autistic Community?

open access: yesAmerican Journal of Medical Genetics Part B: Neuropsychiatric Genetics, EarlyView.
ABSTRACT Investigations into the etiology and genetic basis of autism continue to drive much autism research, yet reports are emerging of this research not aligning with priorities of autistic people. Engagement of autistic people in the research process is a key way to take their perspectives on board.
Heidi Kristiina Kaljusto   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy