Results 41 to 50 of about 10,318 (256)

Rapid Proteome‐Wide Discovery of Protein–Protein Interactions With ppIRIS

open access: yesAdvanced Science, EarlyView.
ppIRIS is a lightweight deep learning framework for proteome‐wide protein–protein interaction prediction directly from sequence. By fusing evolutionary and structural embeddings with a regularized Siamese architecture, ppIRIS achieves state‐of‐the‐art accuracy across species, enables minute‐scale screening, and reveals biologically validated bacterial ...
Luiz Felipe Piochi   +4 more
wiley   +1 more source

Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings [PDF]

open access: yes, 2007
We present a proxy signature scheme using bilinear pairings that provides effective proxy revocation. The scheme uses a binding-blinding technique to avoid secure channel requirements in the key issuance stage.
Das, Manik Lal   +2 more
core  

Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy

open access: yesAdvanced Science, EarlyView.
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu   +4 more
wiley   +1 more source

Cryptanalysis and Improvement of Several Identity-Based Authenticated and Pairing-Free Key Agreement Protocols for IoT Applications

open access: yesSensors, 2023
Internet of Things (IoT) applications have been increasingly developed. Authenticated key agreement (AKA) plays an essential role in secure communication in IoT applications.
Haiyan Sun   +4 more
doaj   +1 more source

Domain‐Aware Implicit Network for Arbitrary‐Scale Remote Sensing Image Super‐Resolution

open access: yesAdvanced Intelligent Discovery, EarlyView.
Although existing arbitrary‐scale image super‐resolution methods are flexible to reconstruct images with arbitrary scales, the characteristic of training distribution is neglected that there exists domain shift between samples of various scales. In this work, a Domain‐Aware Implicit Network (DAIN) is proposed to handle it from the perspective of domain
Xiaoxuan Ren   +6 more
wiley   +1 more source

Upsampling DINOv2 Features for Unsupervised Vision Tasks and Weakly Supervised Materials Segmentation

open access: yesAdvanced Intelligent Systems, EarlyView.
Feature from recent image foundation models (DINOv2) are useful for vision tasks (segmentation, object localization) with little or no human input. Once upsampled, they can be used for weakly supervised micrograph segmentation, achieving strong results when compared to classical features (blurs, edge detection) across a range of material systems.
Ronan Docherty   +2 more
wiley   +1 more source

Deformable Attention Multiscale Feature Fusion Network‐Dehaze: An Adaptive Image Dehazing Method Based on Deformable Attention Multiscale Fusion Network

open access: yesAdvanced Intelligent Systems, EarlyView.
This paper presents the deformable attention multiscale feature fusion network‐dehaze adaptive image dehazing network, which integrates three core modules (revised residual shrinkage unit, multiscale attention, cross‐scale feature fusion). It incorporates deformable convolution and multiscale attention mechanisms to address the detail loss issue of ...
Ruipeng Wang   +4 more
wiley   +1 more source

A New PVSS Scheme with a Simple Encryption Function

open access: yes, 2013
A Publicly Verifiable Secret Sharing (PVSS) scheme allows anyone to verify the validity of the shares computed and distributed by a dealer. The idea of PVSS was introduced by Stadler in [18] where he presented a PVSS scheme based on Discrete Logarithm ...
Blibech, Kaouther   +3 more
core   +2 more sources

Threshold Password-Based Authentication Using Bilinear Pairings [PDF]

open access: yes, 2004
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private key from remote servers with knowledge of only his identity and password. He does not need to carry the smart card storing his private information.
Lee, S Lee, Sangwon   +4 more
openaire   +2 more sources

Hierarchical Complementary Enhanced Autoencoder Integrating Spatio‐Temporal Interaction Feature for Soft Sensor

open access: yesAsia-Pacific Journal of Chemical Engineering, EarlyView.
ABSTRACT To address the issues of neglecting the spatiotemporal correlations among process variables, low‐level features are vulnerable to noise interference, and the gradual loss of key information layer by layer during deep network training in traditional stacked autoencoder‐based soft‐sensor models, this paper proposes a hierarchical complementary ...
Xiaoping Guo, Jinghong Guo, Yuan Li
wiley   +1 more source

Home - About - Disclaimer - Privacy