-
401
Efficient Method for Robust Backdoor Detection and Removal in Feature Space Using Clean Data
Published 2025-01-01“…These methods target different areas, such as computer vision (CV), natural language processing (NLP), and thus utilize different assumptions about the nature of the input data and the type of backdoor trigger used in the attack. …”
Get full text
Article -
402
Differential parasitism by four species of phorid flies when attacking three worker castes of the leaf-cutting ant Atta laevigata (Smith, 1858).
Published 2021-01-01“…Certain species of parasitic flies belonging to the Phoridae are known to attack Atta spp. workers foraging along trails, near nest openings used by the ants to supply the colony with plant material, and in the areas where the ants are actively cutting plant material. …”
Get full text
Article -
403
Optical Characteristics of Halogen Lamp for Coronavirus, Tumors, Thrombus and Toothache Treatment
Published 2023-03-01“…The effect of reducing the damaged organ cell number and size in different areas of the human body (in case of carcinomas, cerebral thrombosis, heart attacks, damaged chest and cervical vertebrae areas, in case of coronavirus and dental pulpitis) was studied using a halogen lamp. …”
Get full text
Article -
404
Development of transient ischemic attack risk prediction model suitable for initializing a learning health system unit using electronic medical records
Published 2024-12-01“…Abstract Background Patients with transient ischemic attack (TIA) face a significantly increased risk of stroke. …”
Get full text
Article -
405
Resilience characterization and evaluation model of field area network for the power distribution network
Published 2022-09-01“…To analyze the robustness and reliability of field area network (FAN) in the power distribution network, a quantifiable network resilience characterization and evaluation model was proposed.The elasticity indicator was defined from network connectivity, robustness and redundancy, and the total network elasticity was calculated by the weighted sum.The resilience performance of FAN was evaluated by simulating random failures and malicious attacks.A single node failure was simulated and tested to evaluate the difference in network resilience a affected by different node failures and find the weak points of resilience in the network.The elastic characterization and evaluation model was extended to general network topologies, and simulation experiments were carried out using BA scale-free network and ER random network.The experimental results demonstrate the universality of the model.…”
Get full text
Article -
406
Adversarial sample generation algorithm for vertical federated learning
Published 2023-08-01“…To adapt to the scenario characteristics of vertical federated learning (VFL) applications regarding high communication cost, fast model iteration, and decentralized data storage, a generalized adversarial sample generation algorithm named VFL-GASG was proposed.Specifically, an adversarial sample generation framework was constructed for the VFL architecture.A white-box adversarial attack in the VFL was implemented by extending the centralized machine learning adversarial sample generation algorithm with different policies such as L-BFGS, FGSM, and C&W.By introducing deep convolutional generative adversarial network (DCGAN), an adversarial sample generation algorithm named VFL-GASG was designed to address the problem of universality in the generation of adversarial perturbations.Hidden layer vectors were utilized as local prior knowledge to train the adversarial perturbation generation model, and through a series of convolution-deconvolution network layers, finely crafted adversarial perturbations were produced.Experiments show that VFL-GASG can maintain a high attack success while achieving a higher generation efficiency, robustness, and generalization ability than the baseline algorithm, and further verify the impact of relevant settings for adversarial attacks.…”
Get full text
Article -
407
A Blockchain-based federated learning framework for secure aggregation and fair incentives
Published 2024-12-01“…However, challenges such as poisoning attacks and free rider attacks underscore the need for advanced security measures. …”
Get full text
Article -
408
CASE OF CORONARY ARTERY SPASM WITH FATAL OUTCOME IN THE EARLY PERIOD AFTER PERCUTANEOUS TRANSLUMINAL CORONARY ANGIOPLASTY OF THE RIGHT CORONARY ARTERY WITH IMPLANTATION OF BARE MET...
Published 2021-03-01“…On the evening of discharge, the man developed a severe pain attack in the epigastric region and turned to the hospital. …”
Get full text
Article -
409
A Review on the Security of IoT Networks: From Network Layer’s Perspective
Published 2023-01-01“…RPL protocol faces many attacks such as selective forwarding attacks, blackhole attacks, sybil attacks, wormhole attacks, and sinkhole attacks. …”
Get full text
Article -
410
Protecting Dynamically Obfuscated Scan Chain Architecture from DOSCrack with Trivium Pseudo-Random Number Generation
Published 2025-01-01“…In previous research, the dynamically obfuscated scan chain (DOSC) was introduced to protect logic-locking keys from scan-based attacks by obscuring test patterns and responses. …”
Get full text
Article -
411
-
412
Admission systolic blood pressure and short-term outcomes after dual antiplatelet therapy in patients with minor ischemic stroke or transient ischemic attack
Published 2025-04-01“…Background: Elevated baseline systolic blood pressure (SBP) was associated with poor outcomes following dual antiplatelet therapy (DAPT) in patients with non-cardioembolic minor ischemic stroke (MIS) or high-risk transient ischemic attack (TIA) in clinical trials. Objectives: We aimed to assess the impact of admission SBP on the short-term outcomes after DAPT in patients with non-cardioembolic MIS or high-risk TIA. …”
Get full text
Article -
413
Attack rates assessment of the 2009 pandemic H1N1 influenza A in children and their contacts: a systematic review and meta-analysis.
Published 2012-01-01“…<h4>Conclusion/significance</h4>The consistently higher attack rates of the 2009 pandemic H1N1 influenza A among children, as compared to adults, as well as the magnitude of the difference is important for understanding the contribution of children to disease burden, for implementation of mitigation strategies directed towards children, as well as more precise mathematical modeling and simulation of future influenza pandemics.…”
Get full text
Article -
414
Combining 2D texture and 3D geometry features for Reliable iris presentation attack detection using light field focal stack
Published 2022-09-01“…Abstract Iris presentation attack detection (PAD) is still an unsolved problem mainly due to the various spoof attack strategies and poor generalisation on unseen attackers. …”
Get full text
Article -
415
Differences in pharmacological migraine treatment across different levels of clinical headache care – a cross-sectional study
Published 2025-04-01“…This study evaluates differences in pharmacological recommendations for acute and preventive migraine treatments across primary, secondary, and tertiary care settings. …”
Get full text
Article -
416
Network slicing deployment method based on isolation level
Published 2020-04-01Get full text
Article -
417
Effect of herbal medicine (Jodeungsan) on migraine: A double-blind randomized clinical trial
Published 2022-12-01“…The number of HADs did not significantly differ between the JDS and placebo groups at the end of the study. …”
Get full text
Article -
418
Quantized <italic>l</italic>₂-<italic>l</italic>∞ Control for Nonlinear Discrete-Time Systems With DoS Attacks
Published 2025-01-01“…Unknown DoS attacks are defined and modeled in terms of attack frequency and attack duration. …”
Get full text
Article -
419
A 3D Multipath Planning Method for Guided Vehicles Using Improved A∗ Algorithm Based on Multiple Avoidance Tactics and Terminal Attack Angles
Published 2025-01-01“…The criteria used to measure multipath planning effectiveness include path length, path smoothness, avoidance capability, terminal attack angle settablity, and search time. Simulation results in two attack situations, three different degrees of freedom modes and 10 real-world scenarios demonstrate that the improved A∗ search algorithm has higher efficiency and better performance than classical algorithms. …”
Get full text
Article -
420
A Kinematic Analysis of Upper Extremity Joint when Punching by Three Different Methods in Athletes of Different Skill Levels
Published 2017-03-01“…As, a reciprocal effect exist between the factors of different skill level and punching technique.…”
Get full text
Article