Topic
Trojan
About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: Based on the regularity estimates for the semigroups and the classical existence theo- rem of global attractors, this article proved that this equation possesses a global attractor in H k k 4 (k� 0) space.
Abstract: This paper is concerned with the long time behavior of solution for the equation derived by the Trojan Y Chromosome (TYC) model with spatial spread. Based on the regularity estimates for the semigroups and the classical existence theo- rem of global attractors, we prove that this equations possesses a global attractor in H k () 4 (k� 0) space.
18 citations
•
TL;DR: A novel framework hides the existence of a Trojan network with arbitrary desired functionality within a benign transport network and proves theoretically that the Trojan network's detection is computationally infeasible and empirically that the transport network does not compromise its disguise.
Abstract: The complexity of large-scale neural networks can lead to poor understanding of their internal details. We show that this opaqueness provides an opportunity for adversaries to embed unintended functionalities into the network in the form of Trojan horses. Our novel framework hides the existence of a Trojan network with arbitrary desired functionality within a benign transport network. We prove theoretically that the Trojan network's detection is computationally infeasible and demonstrate empirically that the transport network does not compromise its disguise. Our paper exposes an important, previously unknown loophole that could potentially undermine the security and trustworthiness of machine learning.
18 citations
••
TL;DR: In 2012, observers in the northeastern United States of America observed an occultation of 8.0-mag HIP 41337 star by the Jupiter-Trojan (911) Agamemnon, including one video recorded with a 36-cm telescope that shows a deep brief secondary occultation that is likely due to a satellite, of about 5.8±1.5 km across, at 278±5 km (0.0931″) from the asteroid's center as projected in the plane of the sky.
18 citations
••
University of Michigan1, University of Pennsylvania2, Fermilab3, University College London4, University of Illinois at Urbana–Champaign5, Stanford University6, University of Arizona7, California Institute of Technology8, Autonomous University of Madrid9, University of California, Santa Cruz10, Ohio State University11, Harvard University12, Australian Astronomical Observatory13, Texas A&M University14, University of Sussex15, University of Southampton16, Brandeis University17, State University of Campinas18, Oak Ridge National Laboratory19
TL;DR: In this article, the authors report the discovery by the DES of two new dynamically stable L4 Neptunian Trojans, 2013-VX30 and 2014-UU240, both with inclinations i.i.d.
18 citations
••
26 Aug 2015TL;DR: It is demonstrated that sensors, which are deployed to prevent faults, can be exploited to insert effective and almost zero-overhead hardware Trojans.
Abstract: Embedded system face a serious threat from physical attacks when applied in critical applications. Therefore, modern systems have several integrated sensors to detect potential threats. In this paper, we put forward a new issue where these sensors can open other security loopholes. We demonstrate that sensors, which are deployed to prevent faults, can be exploited to insert effective and almost zero-overhead hardware Trojans. Two case studies are presented on Xilinx Virtex-5 FPGA. The first case study exploits the in-build temperature sensor of Virtex-5 system monitors while the other exploits a user deployed sensor. Both the sensor can be used to trigger a powerful Trojan with minimal and at times zero overhead.
18 citations