Results 81 to 90 of about 331,923 (300)

A Multi-Task Adversarial Attack against Face Authentication

open access: yesACM Transactions on Multimedia Computing, Communications, and Applications
Deep learning-based identity management systems, such as face authentication systems, are vulnerable to adversarial attacks. However, existing attacks are typically designed for single-task purposes, which means they are tailored to exploit vulnerabilities unique to the individual target rather than being adaptable for multiple users or systems.
Hanrui Wang   +4 more
openaire   +2 more sources

Connecting Levels of Analysis in Educational Neuroscience: A Review of Multi-level Structure of Educational Neuroscience with Concrete Examples [PDF]

open access: yes, 2019
In its origins educational neuroscience has started as an endeavor to discuss implications of neuroscience studies for education. However, it is now on its way to become a transdisciplinary field, incorporating findings, theoretical frameworks and ...
Han, Hyemin
core  

Decoding Naturalistic Episodic Memory with Artificial Intelligence and Brain‐Machine Interface

open access: yesAdvanced Science, EarlyView.
Episodic memory weaves together what, where, and when of experience into a personal narrative. Cutting‐edge AI models may decode this intricate process in real‐life settings, revealing how neural activity encodes naturalistic memories. By merging AI with brain–machine interfaces, researchers are edging closer to mapping and even engineering memory ...
Dong Song
wiley   +1 more source

A NeuroD1 AAV‐Based Gene Therapy for Functional Brain Repair in Alzheimer's Disease‐Like Non‐Human Primate Model

open access: yesAdvanced Science, EarlyView.
This study tests NeuroD1 AAV‐based gene therapy in a non‐human primate Alzheimer's disease model. The therapy prevents neuronal damage, inhibits hippocampal atrophy, and reduces neuroinflammation. It also repairs vascular and blood‐brain barrier damage, restores cerebrospinal fluid biomarkers, enhances hippocampal glucose metabolism, and improves ...
Zhouquan Jiang   +21 more
wiley   +1 more source

Authenticate as You Go: From Exploring Smart Home Authentication with Daily Objects to Authenticating with Primary Tasks

open access: yesACM Transactions on Computer-Human Interaction
Smart home applications aim to increase convenience, yet often require authentication to protect sensitive data. This is non-trivial: effortful authentication contradicts intended convenience, the multitude of devices raises scalability issues, many devices lack suitable interfaces, and the presence of other inhabitants requires intentional and ...
Verena Zimmermann   +3 more
openaire   +2 more sources

In Vivo CRISPR Screening Identifies the Glutamate Receptor GRIA2 as Promoting Peritoneal Metastasis of Gastric Cancer via Calcium‐Dependent β‐Catenin Activation

open access: yesAdvanced Science, EarlyView.
We identified GRIA2 as a critical driver of gastric cancer peritoneal metastasis through in vivo CRISPR screening. Mechanistically, GRIA2‐mediated calcium influx inhibits GSK3β and activates Wnt/β‐catenin signaling, driven by glutamate from cancer‐associated fibroblasts.
Jie Sun   +13 more
wiley   +1 more source

Authenticated Robotic Teleoperation with Task Recognition

open access: yesIEEE Consumer Electronics Magazine
Human-in-the-loop teleoperation of robotic arms holds considerable promise for consumer electronics, particularly in immersive and interactive applications such as healthcare, gaming, augmented reality, virtual reality, smart home systems, and telemedicine.
Stan I. E.   +3 more
openaire   +1 more source

Evidence of authentic achievement: the extent of disciplined enquiry in student teachers' essay scripts [PDF]

open access: yes, 2004
The purpose of this study was to describe the extent to which undergraduates engage in disciplined enquiry, as one means of operationalising critical thinking.
Maclellan, Effie
core  

Development‐based In Vivo Bioreactor Strategy for Challenging Senescent Bone Reconstruction

open access: yesAdvanced Science, EarlyView.
We present a development‐based in vivo bioreactor strategy to generate rejuvenated bone grafts (vBR‐Bone) within aged hosts. By enclosing vBR‐Bone fragments within an asymmetric biomimetic periosteum, segmental femoral defects in aged mice were successfully repaired within 6 weeks. Mechanistically, the multifactors of vBR‐Bone reconstitute a remodeling
Wenchao Zhang   +9 more
wiley   +1 more source

Measuring teacher authenticity: Criteria students use in their perception of teacher authenticity

open access: yesCogent Education, 2017
Authenticity is an often-heard term with respect to education. Tasks should be authentic, the learning environment should be authentic and, above all, the teacher should be authentic.
Pedro De Bruyckere, Paul A. Kirschner
doaj   +1 more source

Home - About - Disclaimer - Privacy