scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: Based on the regularity estimates for the semigroups and the classical existence theo- rem of global attractors, this article proved that this equation possesses a global attractor in H k k 4 (k� 0) space.
Abstract: This paper is concerned with the long time behavior of solution for the equation derived by the Trojan Y Chromosome (TYC) model with spatial spread. Based on the regularity estimates for the semigroups and the classical existence theo- rem of global attractors, we prove that this equations possesses a global attractor in H k () 4 (k� 0) space.

18 citations

Posted Content
TL;DR: A novel framework hides the existence of a Trojan network with arbitrary desired functionality within a benign transport network and proves theoretically that the Trojan network's detection is computationally infeasible and empirically that the transport network does not compromise its disguise.
Abstract: The complexity of large-scale neural networks can lead to poor understanding of their internal details. We show that this opaqueness provides an opportunity for adversaries to embed unintended functionalities into the network in the form of Trojan horses. Our novel framework hides the existence of a Trojan network with arbitrary desired functionality within a benign transport network. We prove theoretically that the Trojan network's detection is computationally infeasible and demonstrate empirically that the transport network does not compromise its disguise. Our paper exposes an important, previously unknown loophole that could potentially undermine the security and trustworthiness of machine learning.

18 citations

Journal ArticleDOI
TL;DR: In 2012, observers in the northeastern United States of America observed an occultation of 8.0-mag HIP 41337 star by the Jupiter-Trojan (911) Agamemnon, including one video recorded with a 36-cm telescope that shows a deep brief secondary occultation that is likely due to a satellite, of about 5.8±1.5 km across, at 278±5 km (0.0931″) from the asteroid's center as projected in the plane of the sky.

18 citations

Journal ArticleDOI
15 Mar 2019-Icarus
TL;DR: In this article, the authors report the discovery by the DES of two new dynamically stable L4 Neptunian Trojans, 2013-VX30 and 2014-UU240, both with inclinations i.i.d.

18 citations

Proceedings ArticleDOI
26 Aug 2015
TL;DR: It is demonstrated that sensors, which are deployed to prevent faults, can be exploited to insert effective and almost zero-overhead hardware Trojans.
Abstract: Embedded system face a serious threat from physical attacks when applied in critical applications. Therefore, modern systems have several integrated sensors to detect potential threats. In this paper, we put forward a new issue where these sensors can open other security loopholes. We demonstrate that sensors, which are deployed to prevent faults, can be exploited to insert effective and almost zero-overhead hardware Trojans. Two case studies are presented on Xilinx Virtex-5 FPGA. The first case study exploits the in-build temperature sensor of Virtex-5 system monitors while the other exploits a user deployed sensor. Both the sensor can be used to trigger a powerful Trojan with minimal and at times zero overhead.

18 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168