Muntenaar, Laura (author)
Demand for smart, Internet-connected devices and other electronics has increased dramatically in recent years. This increase in demand for technological devices, driven by advancements in Artificial Intelligence (AI), the Internet of Things (IoT), and autonomous systems, has exposed the digital system to potential security threats. As more devices ...
Ma, Ji
This article discusses some common problems in the structural design of housing structure in civil engineering construction. To start with, we analyzed the basic principles of housing structure design, including safety, economy, practicality and so forth. Furthermore, we discussed common problems in structural design, such as improper selection of ...
Arafat, Md Eaysir Larue, Grégoire S. Demmel, Sébastien Rakotonirainy, Andry Dehkordi, Sepehr Ghasemi
Pedestrian safety is a significant concern for transportation professionals, especially the risky behaviour of pedestrians using mobile phones, such as entering a road crossing illegally or entering the crossing with a delay. While several investigations have highlighted the significance of mobile phone distraction while walking and interventions d...
Kaye, Sherrie-Anne Watson-Brown, Natalie Yin, Jiani Oviedo Trespalacios, Oscar Senserrick, Teresa Lewis, Ioni
This study examined a sample of drivers’ perceptions towards both traditional (e.g., police enforcement) and technology-based (e.g., Advanced Driver Assistance Systems) approaches to reduce speeding behaviour. Drivers (N=680) were randomly allocated to read one of four scenarios, which differed based on road environment (urban or regional) and spee...
Zhang, Lin Zhang, Jin
Published in
E3S Web of Conferences
In recent years, the scale of cross-border E-commerce in China has developed rapidly. ASEAN is an important market of cross-border E-commerce in China. With the signing and entry into force of RCEP, the favorable factors such as the decline of raw materials, production costs and commodity prices of the contracting countries will bring many opportun...
Tianfeng, Fan Xiaojing, Meng Chi, Zhang
Published in
Journal of Physics: Conference Series
UAV swarm is gradually becoming a comprehensive new weapon platform integrating electronic countermeasure, information attack and defense and firepower attack. It has become an important form of future combat, and also gave birth to the rapid development of anti UAV swarm system. Aiming at the problem that UAV is developing rapidly and becoming an ...
Wu, L. (author)
For almost three decades, side-channel analysis has represented a realistic and severe threat to embedded devices' security. As a well-known and influential class of implementation attacks, side-channel analysis has been applied against cryptographic implementations, processors, communication systems, and, more recently, machine learning models. Tw...
Granholm, Fredrik Tin, Derrick Ciottone, Gregory R
Published in
Health security
Wetterström, Max Rönn, Patric
Currently, there is a lack of research behind the security of Virtual Reality against fingerprinting attacks and how these affect the Quality of Experience (QoE) and Quality of Service (QoS) for a user. With practical testing in a game which implements traffic shaping methods as security defences, this thesis aims to take the first step towards cha...
Solarova, Sara Podroužek, Juraj Mesarčík, Matúš Gavornik, Adrian Bielikova, Maria
Published in
AI and ethics
This paper contributes to the discussion on effective regulation of facial recognition technologies (FRT) in public spaces. In response to the growing universalization of FRT in the United States and Europe as merely intrusive technology, we propose to distinguish scenarios in which the ethical and social risks of using FRT are unattainable from ot...