Results 81 to 90 of about 331,923 (300)
A Multi-Task Adversarial Attack against Face Authentication
Deep learning-based identity management systems, such as face authentication systems, are vulnerable to adversarial attacks. However, existing attacks are typically designed for single-task purposes, which means they are tailored to exploit vulnerabilities unique to the individual target rather than being adaptable for multiple users or systems.
Hanrui Wang +4 more
openaire +2 more sources
Connecting Levels of Analysis in Educational Neuroscience: A Review of Multi-level Structure of Educational Neuroscience with Concrete Examples [PDF]
In its origins educational neuroscience has started as an endeavor to discuss implications of neuroscience studies for education. However, it is now on its way to become a transdisciplinary field, incorporating findings, theoretical frameworks and ...
Han, Hyemin
core
Decoding Naturalistic Episodic Memory with Artificial Intelligence and Brain‐Machine Interface
Episodic memory weaves together what, where, and when of experience into a personal narrative. Cutting‐edge AI models may decode this intricate process in real‐life settings, revealing how neural activity encodes naturalistic memories. By merging AI with brain–machine interfaces, researchers are edging closer to mapping and even engineering memory ...
Dong Song
wiley +1 more source
This study tests NeuroD1 AAV‐based gene therapy in a non‐human primate Alzheimer's disease model. The therapy prevents neuronal damage, inhibits hippocampal atrophy, and reduces neuroinflammation. It also repairs vascular and blood‐brain barrier damage, restores cerebrospinal fluid biomarkers, enhances hippocampal glucose metabolism, and improves ...
Zhouquan Jiang +21 more
wiley +1 more source
Smart home applications aim to increase convenience, yet often require authentication to protect sensitive data. This is non-trivial: effortful authentication contradicts intended convenience, the multitude of devices raises scalability issues, many devices lack suitable interfaces, and the presence of other inhabitants requires intentional and ...
Verena Zimmermann +3 more
openaire +2 more sources
We identified GRIA2 as a critical driver of gastric cancer peritoneal metastasis through in vivo CRISPR screening. Mechanistically, GRIA2‐mediated calcium influx inhibits GSK3β and activates Wnt/β‐catenin signaling, driven by glutamate from cancer‐associated fibroblasts.
Jie Sun +13 more
wiley +1 more source
Authenticated Robotic Teleoperation with Task Recognition
Human-in-the-loop teleoperation of robotic arms holds considerable promise for consumer electronics, particularly in immersive and interactive applications such as healthcare, gaming, augmented reality, virtual reality, smart home systems, and telemedicine.
Stan I. E. +3 more
openaire +1 more source
Evidence of authentic achievement: the extent of disciplined enquiry in student teachers' essay scripts [PDF]
The purpose of this study was to describe the extent to which undergraduates engage in disciplined enquiry, as one means of operationalising critical thinking.
Maclellan, Effie
core
Development‐based In Vivo Bioreactor Strategy for Challenging Senescent Bone Reconstruction
We present a development‐based in vivo bioreactor strategy to generate rejuvenated bone grafts (vBR‐Bone) within aged hosts. By enclosing vBR‐Bone fragments within an asymmetric biomimetic periosteum, segmental femoral defects in aged mice were successfully repaired within 6 weeks. Mechanistically, the multifactors of vBR‐Bone reconstitute a remodeling
Wenchao Zhang +9 more
wiley +1 more source
Measuring teacher authenticity: Criteria students use in their perception of teacher authenticity
Authenticity is an often-heard term with respect to education. Tasks should be authentic, the learning environment should be authentic and, above all, the teacher should be authentic.
Pedro De Bruyckere, Paul A. Kirschner
doaj +1 more source

