First Steps towards Data-Driven Adversarial Deduplication [PDF]
In traditional databases, the entity resolution problem (which is also known as deduplication) refers to the task of mapping multiple manifestations of virtual objects to their corresponding real-world entities.
Jose N. Paredes +3 more
doaj +3 more sources
A Multi-Property Optimizing Generative Adversarial Network for de novo Antimicrobial Peptide Design. [PDF]
A Multi‐Property Optimizing Generative Adversarial Network (MPOGAN) is proposed to iteratively learn the relationship between peptides and multiple properties using a dynamically dataset. As the quality of the dataset improves, MPOGAN's ability to design antimicrobial peptides (AMPs) with multiple desired properties is enhanced.
Liu J +16 more
europepmc +2 more sources
Building an Ethical and Trustworthy Biomedical AI Ecosystem for the Translational and Clinical Integration of Foundation Models. [PDF]
Foundation Models (FMs) are gaining increasing attention in the biomedical artificial intelligence (AI) ecosystem due to their ability to represent and contextualize multimodal biomedical data. These capabilities make FMs a valuable tool for a variety of
Sankar BS +11 more
europepmc +3 more sources
Cyber attackers have constantly updated their attack techniques to evade antivirus software detection in recent years. One popular evasion method is to execute malicious code and perform malicious actions only in memory.
Jiaxi Liu +4 more
doaj +1 more source
Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation [PDF]
Background Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results.
A Beimel +57 more
core +2 more sources
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley +16 more
core +2 more sources
Efficiently Decodable Codes for the Binary Deletion Channel [PDF]
In the random deletion channel, each bit is deleted independently with probability p. For the random deletion channel, the existence of codes of rate (1-p)/9, and thus bounded away from 0 for any p ...
Guruswami, Venkatesan, Li, Ray
core +1 more source
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over ...
Kiraz, Mehmet Sabir
core +1 more source
Security challenges of small cell as a service in virtualized mobile edge computing environments [PDF]
Research on next-generation 5G wireless networks is currently attracting a lot of attention in both academia and industry. While 5G development and standardization activities are still at their early stage, it is widely acknowledged that 5G systems are ...
A Fragkiadakis +31 more
core +5 more sources
Accelerating Catalyst Materials Discovery With Large Artificial Intelligence Models
AI‐empowered catalysis research via integrated database platform, universal machine learning interatomic potentials (MLIPs), and large language models (LLMs). ABSTRACT The integration of artificial intelligence (AI) into catalysis is fundamentally reshaping the research paradigm of catalyst discovery.
Di Zhang +7 more
wiley +2 more sources

