Application and challenges of a metaverse in medicine

Y Wang, C Li, L Qu, H Cai, Y Ge - Frontiers in Robotics and AI, 2023 - frontiersin.org
Metaverse has been confirmed as a relatively amorphous concept of innovation, which
refers to technological advancement. Metaverse, ie, a coalition between reality world and …

Pinpointing hardware trojans through semantic feature extraction and natural language processing

Y Li, W Hu, H Su, X Zhang, Y Zhao… - … Test Conference in …, 2024 - ieeexplore.ieee.org
Hardware Trojans are malicious design modifications, which pose severe threats to
hardware security and trust. Since integrated circuit (IC) designs are difficult to modify after …

A Reliable and Secure Mobile Cyber-Physical Digital Microfluidic Biochip for Intelligent Healthcare

Y Yao, D Qiu, H Liu, Z Yang, X Liu, Y Yang… - IEEE Access, 2023 - ieeexplore.ieee.org
Digital microfluidic, as an emerging and potential technology, diversifies the biochemical
applications platform, such as protein dilution sewage detection. At present, a vast majority …

AntiMal: an Approach of Malware Detection Employing Swin Transformer

C Lyu, Y Yao, X Guo, Z Huang, C Dong… - Proceedings of the …, 2023 - dl.acm.org
In the present era, the menace of malicious software is growing continuously, posing a
significant challenge in the realm of cybersecurity. Currently, traditional machine learning …

Detecting Vulnerability in Hardware Description Languages: Opcode Language Processing

AG Ayar, A Sahruri, S Aygun… - IEEE Embedded …, 2023 - ieeexplore.ieee.org
Detecting vulnerable code blocks has become a highly popular topic in computer-aided
design, especially with the advancement of natural language processing (NLP). Analyzing …

A Deep Learning Approach for Hardware Trojan Detection Based on Ensemble Learning

Y Yao, C Dong, Z Xie, Y Li, X Guo, Y Yang… - Proceedings of the 2023 …, 2023 - dl.acm.org
In recent years, the application of integrated circuits in various fields has become more and
more extensive. The attackers utilize the hidden dangers of the industrial chain to design …

Marine litter detection based on YOLOv7 algorithm and data encryption protection

Q Wu, Y Ke, Z Liu, Y Zhang, Q Wu - Proceedings of the 2023 13th …, 2023 - dl.acm.org
Marine litter can cause significant damage to marine biodiversity, threatening the marine
food chain and spreading harmful substances, posing a significant impact on the ocean …

A Module Placement Method for Digital Microfluidic Biochips Based on Security Design

Z Yang, Y Yao, X Guo, P Huang, J Li, Y Chen… - Proceedings of the …, 2023 - dl.acm.org
Digital Microfluidic Biochips (DMFBs) represent a miniaturized, integrated, high-precision,
and cost-effective platform with widespread applications in fields such as mobile healthcare …

An Enhanced Detection Method of Hardware Trojan Based on CNN-Attention-LSTM

N Wang, H Kang - Computer Networks and Communications, 2024 - ojs.wiserpub.com
The security issues caused by the insertion of hardware Trojans seriously threaten the
security and reliability of the entire hardware device. This article constructs a detection …

Genetic-A* Algorithm-Based Routing for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare

H Huang, Z Yang, J Zhong, L Xu, C Dong… - … Conference on Green …, 2023 - Springer
In the field of intelligent digital healthcare, Continuous-flow microfluidic biochip (CFMB) has
become a research direction of widespread concern. CFMB integrates a large number of …