Abstract: Passive near field communication (NFC) tags rely on the carrier-provided clock for operation. They can receive 100% amplitude shift keying (ASK)-modulated information but are unable to ...
Abstract: An implementation method of a capacitive ternary neural network (TNN) is proposed, utilizing two-metal-ferroelectric-metal capacitors (FeCaps) per synapse. Unlike conventional one-FeCap ...
The UEFI firmware implementation in some motherboards from ASUS, Gigabyte, MSI, and ASRock is vulnerable to direct memory access (DMA) attacks that can bypass early-boot memory protections. The ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results