Results 71 to 80 of about 574,096 (277)

Secure detection in quantum key distribution by real-time calibration of receiver

open access: yes, 2017
The single photon detection efficiency of the detector unit is crucial for the security of common quantum key distribution protocols like Bennett-Brassard 1984 (BB84). A low value for the efficiency indicates a possible eavesdropping attack that exploits
Makarov, Vadim   +2 more
core   +1 more source

Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples

open access: yesACM Transactions on Software Engineering and Methodology
As a new programming paradigm, deep learning (DL) has achieved impressive performance in areas such as image processing and speech recognition, and has expanded its application to solve many real-world problems. However, neural networks and DL are normally black-box systems; even worse, DL-based software are vulnerable to threats from ...
Zhe Zhao 0007   +6 more
openaire   +2 more sources

A High‐Sensitivity Circulating Nucleic Acid Sequencing Assay for Assessing Treatment Response to Alectinib in a Pediatric Patient With ALK‐Rearranged Non–Small Cell Lung Cancer

open access: yes
Pediatric Blood &Cancer, EarlyView.
Alberto D. Guerra   +9 more
wiley   +1 more source

A methionine‐lined active site governs carbocation stabilization and product specificity in a bacterial terpene synthase

open access: yesFEBS Letters, EarlyView.
This study reveals a unique active site enriched in methionine residues and demonstrates that these residues play a critical role by stabilizing carbocation intermediates through novel sulfur–cation interactions. Structure‐guided mutagenesis further revealed variants with significantly altered product profiles, enhancing pseudopterosin formation. These
Marion Ringel   +13 more
wiley   +1 more source

Deep Reinforcement Learning-Based Adversarial Attack and Defense in Industrial Control Systems

open access: yesMathematics
Adversarial attacks targeting industrial control systems, such as the Maroochy wastewater system attack and the Stuxnet worm attack, have caused significant damage to related facilities.
Mun-Suk Kim
doaj   +1 more source

Feature Engineering for Detection of Wormhole Attacking in Mobile Ad Hoc Networks with Machine Learning Methods [PDF]

open access: yes, 2014
Due to the self-configuring nature of a Mobile Ad Hoc Network (MANET), each node must participate in the routing process, in addition to its other activities.
Dooley, Laurence S.   +3 more
core  

Face Presentation Attack Detection

open access: yes, 2023
Face recognition technology has been widely used in daily interactive applications such as checking-in and mobile payment due to its convenience and high accuracy. However, its vulnerability to presentation attacks (PAs) limits its reliable use in ultra-secure applicational scenarios.
Zitong Yu, Chenxu Zhao, Zhen Lei 0001
openaire   +2 more sources

Linking neurogenesis, oligodendrogenesis, and myelination defects to neurodevelopmental disruption in primary mitochondrial disorders

open access: yesFEBS Letters, EarlyView.
Mitochondrial remodeling shapes neural and glial lineage progression by matching metabolic supply with demand. Elevated OXPHOS supports differentiation and myelin formation, while myelin compaction lowers mitochondrial dependence, revealing mitochondria as key drivers of developmental energy adaptation.
Sahitya Ranjan Biswas   +3 more
wiley   +1 more source

Behavioral Fingerprinting of IoT Devices for Forensic Identification Post-Attack

open access: yesIEEE Access
The rapid adoption of Internet of Things (IoT) devices has amplified security risks, particularly in post-incident scenarios where accurate device attribution and evidence reconstruction are required.
Laveeza Tahir   +5 more
doaj   +1 more source

The ubiquitin ligase RNF115 is required for the clearance of damaged lysosomes

open access: yesFEBS Letters, EarlyView.
Upon lysosomal rupture, an E3 ubiquitin ligase RNF115 translocates from the cytosol to the damaged lysosomal membrane. Moreover, RNF115 depletion impairs the clearance of damaged lysosomes, identifying it as a key regulator of lysosomal quality control.
Sae Nakanaga   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy