Application and challenges of a metaverse in medicine
Y Wang, C Li, L Qu, H Cai, Y Ge - Frontiers in Robotics and AI, 2023 - frontiersin.org
Metaverse has been confirmed as a relatively amorphous concept of innovation, which
refers to technological advancement. Metaverse, ie, a coalition between reality world and …
refers to technological advancement. Metaverse, ie, a coalition between reality world and …
Pinpointing hardware trojans through semantic feature extraction and natural language processing
Hardware Trojans are malicious design modifications, which pose severe threats to
hardware security and trust. Since integrated circuit (IC) designs are difficult to modify after …
hardware security and trust. Since integrated circuit (IC) designs are difficult to modify after …
A Reliable and Secure Mobile Cyber-Physical Digital Microfluidic Biochip for Intelligent Healthcare
Digital microfluidic, as an emerging and potential technology, diversifies the biochemical
applications platform, such as protein dilution sewage detection. At present, a vast majority …
applications platform, such as protein dilution sewage detection. At present, a vast majority …
AntiMal: an Approach of Malware Detection Employing Swin Transformer
In the present era, the menace of malicious software is growing continuously, posing a
significant challenge in the realm of cybersecurity. Currently, traditional machine learning …
significant challenge in the realm of cybersecurity. Currently, traditional machine learning …
Detecting Vulnerability in Hardware Description Languages: Opcode Language Processing
Detecting vulnerable code blocks has become a highly popular topic in computer-aided
design, especially with the advancement of natural language processing (NLP). Analyzing …
design, especially with the advancement of natural language processing (NLP). Analyzing …
A Deep Learning Approach for Hardware Trojan Detection Based on Ensemble Learning
In recent years, the application of integrated circuits in various fields has become more and
more extensive. The attackers utilize the hidden dangers of the industrial chain to design …
more extensive. The attackers utilize the hidden dangers of the industrial chain to design …
Marine litter detection based on YOLOv7 algorithm and data encryption protection
Q Wu, Y Ke, Z Liu, Y Zhang, Q Wu - Proceedings of the 2023 13th …, 2023 - dl.acm.org
Marine litter can cause significant damage to marine biodiversity, threatening the marine
food chain and spreading harmful substances, posing a significant impact on the ocean …
food chain and spreading harmful substances, posing a significant impact on the ocean …
A Module Placement Method for Digital Microfluidic Biochips Based on Security Design
Z Yang, Y Yao, X Guo, P Huang, J Li, Y Chen… - Proceedings of the …, 2023 - dl.acm.org
Digital Microfluidic Biochips (DMFBs) represent a miniaturized, integrated, high-precision,
and cost-effective platform with widespread applications in fields such as mobile healthcare …
and cost-effective platform with widespread applications in fields such as mobile healthcare …
Genetic-A* Algorithm-Based Routing for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare
H Huang, Z Yang, J Zhong, L Xu, C Dong… - … Conference on Green …, 2023 - Springer
In the field of intelligent digital healthcare, Continuous-flow microfluidic biochip (CFMB) has
become a research direction of widespread concern. CFMB integrates a large number of …
become a research direction of widespread concern. CFMB integrates a large number of …
IoT-enabled Low Communication Cost Sentiment Analysis Architecture for Intelligent Healthcare
The rapid development of the Internet of Things makes it possible to analyze and make
decisions on complex tasks in human society based on big data and artificial intelligence …
decisions on complex tasks in human society based on big data and artificial intelligence …