The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent studies show that deep neural networks (DNNs) suffer adversarial examples. That is, attackers can mislead the output of a DNN by adding subtle perturbation to a benign input image. In addition, researchers propose new generation of technologies to produce robust adversarial examples. Robust adversarial examples can consistently fool DNN models under predefined hyperparameter space, which can...
With the wide application of embedded technology and its products, much attention has been turned to the development of program to improve the safety and reliability of embedded devices. In this paper, we present a construct program of embedded trusted computing environment based on QEMU virtual machine architecture. The proposed program, simulates functions of trusted cryptographic modules by software,...
In recent years, The Internet of Things(IOT) is one of the hottest research topics. It was originally defined as connected all the things through the sensing devices to the Internet. In addition, Service-Oriented methodology has gradually drawn people's attention. Therefore, integrated The IOT with Service-Oriented methodology is very important. But now IOT service composition is mostly synchronous...
This paper highlights the recent typical applications of the types of household, garment, accessory and network, and discusses the key technologies to realize the portability, security and intelligence of the personalized home healthcare measure technology and equipment, and also gives a brief guide to our department's novel research achievements, such as wireless communication technology, detection...
In recent decade, DRM (digital rights management) has focused on security techniques for solving the issues as the malicious copy, free dissemination and unrestricted abuse of digital contents or assets. Whereas some increasingly enhanced security policies, which were implemented at contents provider-side or user-side, have not brought about optimal utilities for participants in the contents value...
Wireless biomedical sensor network (WBSN) improves monitoring conditions, community medical and health services remarkably. Meanwhile, it poses prominent characteristics and challenges for its particular medical application. This paper highlights the recent researches and achievements in this field and also gives a guide to pivotal challenges of WBSN for researchers and engineers.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.