-
181
Hardware Trojan vulnerability assessment in digital integrated circuits using learnable classifiers
Published 2024-07-01“…Abstract- In the current distributed integrated circuits (IC) industry, the possibility of adversarial hardware attacks cannot be ignored. Hardware Trojans (HT) attacks may lead to information leakage or failure in security-critical systems. …”
Get full text
Article -
182
-
183
Classification and identification of pest, diseases and nutrient deficiency in paddy using layer based EMD phase features with decision tree
Published 2025-06-01“…Multiple layers are then constructed on the leaf image through which features are extracted. The Gray Level Co-occurrence Matrix (GLCM) algorithm and Principal Component Analysis (PCA) are used to extract the global texture features of the leaf image. …”
Get full text
Article -
184
Jasmonic acid-mediated cell wall biosynthesis pathway involved in pepper (Capsicum annuum) defense response to Ralstonia solanacearum
Published 2025-07-01“…Phytohormone signaling pathways, including those mediated by jasmonic acid (JA), are crucial to plant defense responses against pathogen attacks. Nevertheless, the function of JA in the resistance response of pepper to R. solanacearum is unclear. …”
Get full text
Article -
185
Terror films: The socio-cultural reconstruction of trauma in contemporary Israeli cinema
Published 2019-06-01“… Ben-Moshe Yael, Ebbrecht-Hartmann Tobias, Terror films: The socio-cultural reconstruction of trauma in contemporary Israeli cinema. “Images” vol. XXV, no. 34. Poznań 2019. Adam Mickiewicz University Press. …”
Get full text
Article -
186
Dessiner pour agir : graphisme et politique dans l’espace public
Published 2021-02-01“…Starting from an ethnography analysis of series of workshops on graphic creation, initiated following the attacks of January 2015, the text seeks to retrace the origins of the alliance between graphics and politics, embodied in the sixties in France by the collective "Grapus" and the international productions of political murals. …”
Get full text
Article -
187
An Alternating Direction Method for Mixed Gaussian Plus Impulse Noise Removal
Published 2013-01-01Get full text
Article -
188
Higher limbic and basal ganglia volumes in surviving COVID-negative patients and the relations to fatigue
Published 2022-06-01“…Background: Among systemic abnormalities caused by the novel coronavirus, little is known about the critical attack on the central nervous system (CNS). Few studies have shown cerebrovascular pathologies that indicate CNS involvement in acute patients. …”
Get full text
Article -
189
Predicting symptomatic carotid artery plaques with radiomics-based carotid perivascular adipose tissue characteristics: a multicenter, multiclassifier study
Published 2025-08-01“…Methods Patients were categorized into symptomatic and asymptomatic groups based on the presence or absence of acute ischemic stroke or transient ischemic attack in the anterior cerebral circulation within two weeks prior to the CTA examination. …”
Get full text
Article -
190
Restricted Boltzmann machine with Sobel filter dense adversarial noise secured layer framework for flower species recognition
Published 2025-04-01“…The RBMCV Flower images are trained with SRB-VGG FCL model, SRB-VGG Dense model and the performance analysis was done. …”
Get full text
Article -
191
Robustness evaluation of commercial liveness detection platform
Published 2022-02-01“…Liveness detection technology has become an important application in daily life, and it is used in scenarios including mobile phone face unlock, face payment, and remote authentication.However, if attackers use fake video generation technology to generate realistic face-swapping videos to attack the living body detection system in the above scenarios, it will pose a huge threat to the security of these scenarios.Aiming at this problem, four state-of-the-art Deepfake technologies were used to generate a large number of face-changing pictures and videos as test samples, and use these samples to test the online API interfaces of commercial live detection platforms such as Baidu and Tencent.The test results show that the detection success rate of Deepfake images is generally very low by the major commercial live detection platforms currently used, and they are more sensitive to the quality of images, and the false detection rate of real images is also high.The main reason for the analysis may be that these platforms were mainly designed for traditional living detection attack methods such as printing photo attacks, screen remake attacks, and silicone mask attacks, and did not integrate advanced face-changing detection technology into their liveness detection.In the algorithm, these platforms cannot effectively deal with Deepfake attacks.Therefore, an integrated live detection method Integranet was proposed, which was obtained by integrating four detection algorithms for different image features.It could effectively detect traditional attack methods such as printed photos and screen remakes.It could also effectively detect against advanced Deepfake attacks.The detection effect of Integranet was verified on the test data set.The results show that the detection success rate of Deepfake images by proposed Integranet detection method is at least 35% higher than that of major commercial live detection platforms.…”
Get full text
Article -
192
Visual explanation method for reversible neural networks
Published 2023-12-01“…The issue of model explainability has gained significant attention in understanding the vulnerabilities and anonymous decision-making processes inherent in deep neural networks (DNN).While there has been considerable research on explainability for traditional DNN, there is a lack of exploration on the operation mechanism and explainability of reversible neural networks (RevNN).Additionally, the existing explanation methods for traditional DNN are not suitable for RevNN and suffer from issues such as excessive noise and gradient saturation.To address these limitations, a visual explanation method called visual explanation method for reversible neural network (VERN) was proposed for RevNN.VERN leverages the reversible property of RevNN and is based on the class-activation mapping mechanism.The correspondence between the feature map and the input image was explored by VERN, allowing for the mapping of classification weights of regional feature maps to the corresponding regions of the input image.The importance of each region for model decision-making was revealed through this process, which generates a basis for model decision-making.Experimental comparisons with other explanation methods on generalized datasets demonstrate that VERN achieves a more focused visual effect, surpassing suboptimal methods with up to 7.80% improvement in average drop (AD) metrics and up to 6.05% improvement in average increase (AI) metrics in recognition tasks.VERN also exhibits an 82.00% level of localization for the maximum point of the heat value.Furthermore, VERN can be applied to explain traditional DNN and exhibits good scalability, improving the performance of other methods in explaining RevNN.Furthermore, through adversarial attack analysis experiments, it is observed that adversarial attacks alter the decision basis of the model.This is reflected in the misalignment of the model’s attention regions, thereby aiding in the exploration of the operation mechanism of adversarial attacks.…”
Get full text
Article -
193
Cellular porosity in dentin exhibits complex network characteristics with spatio-temporal fluctuations.
Published 2025-01-01“…Residual errors were classified in 4 topological classes related to fluorescence staining and confocal detection efficiency, instrumental resolution and image processing. Their relative importance was estimated using statistical and physical graph attack simulations in a broad experimental range. …”
Get full text
Article -
194
The Phenomenon of Psychological Operations as a Concept and Discourse (Based on Security Linguistic Cultures of the NATO and the Russian Federation)
Published 2020-04-01“…To achieve the most plausible results, the following integrated methods have been used: semantic and cognitive analysis – to study deep semantic connotations, which are fundamentally different in the linguistic cultures of the NATO and the Russian Federation; concept analysis – to study the regulatory role of the concept PSYCHOLOGICAL OPERATIONS in interstate relations;discourse analysis – to study the consistently situational institutional discourse of psychological operations as a tool for constructing social reality. …”
Get full text
Article -
195
Phenotypic and genetic characteristics of retinal vascular parameters and their association with diseases
Published 2024-11-01“…Our analyses provide evidence that large-scale analysis of image-derived vascular phenotypes has sufficient power for obtaining functional and causal insights into the processes modulating the retinal vasculature.…”
Get full text
Article -
196
Leptomeningeal and Intraparenchymal Blood Barrier Disruption in a MOG-IgG Positive Patient
Published 2018-01-01Get full text
Article -
197
Explainable AI supported hybrid deep learnig method for layer 2 intrusion detection
Published 2025-06-01“…This study proposes the creation of a Comprehensive Layer 2 − IDS (CL2-IDS) dataset for the development of IDS systems utilised in the local network structures of organisations, in conjunction with a hybrid deep learning (DL) model for the detection of attack vectors in the proposed dataset. The proposed hybrid model is obtained by using CNN (Convolutional Neural Networks) and Bi-LSTM (Bidirectional Long Short-Term Memory) models, which are widely used in areas such as image analysis and time series data. …”
Get full text
Article -
198
Linkable Ring Signature for Privacy Protection in Blockchain-Enabled IIoT
Published 2025-06-01“…In addition, it also can resist the double spending attack with the linking user’s signature. Lastly, we provide a security analysis, and it is proven that our ring signature scheme satisfies correctness, anonymity, unforgeability and linkability. …”
Get full text
Article -
199
Preventing Terrorism by Strengthening Community Based Ecosystem in Bali Province
Published 2022-05-01“…It has devastated more than 200 people lives and damage the overall image of Bali as the paradise site in the world and Indonesia as a secure state. …”
Get full text
Article -
200