Results 41 to 50 of about 10,337 (237)

Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy

open access: yesAdvanced Science, EarlyView.
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu   +4 more
wiley   +1 more source

Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
We propose a novel approach that generalizes interleaved modular multiplication algorithms for the computation of sums of products over large prime fields. This operation has widespread use and is at the core of many cryptographic applications.
Patrick Longa
doaj   +1 more source

Public-Key Encryption with Delegated Search [PDF]

open access: yes, 2011
In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message.
Hartel, Pieter   +3 more
core   +3 more sources

MGDP: Mastering a Generalized Depth Perception Model for Quadruped Locomotion

open access: yesAdvanced Science, EarlyView.
ABSTRACT Perception‐based Deep Reinforcement Learning (DRL) controllers demonstrate impressive performance on challenging terrains. However, existing controllers still face core limitations, struggling to achieve both terrain generality and platform transferability, and are constrained by high computational overhead and sensitivity to sensor noise.
Yinzhao Dong   +9 more
wiley   +1 more source

Two secure non-symmetric role Key-Agreement protocols [PDF]

open access: yes, 2016
Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed.
Chizari, H.   +3 more
core  

A unified approach to Fierz identities

open access: yes, 2013
We summarize a unified and computationally efficient treatment of Fierz identities for form-valued pinor bilinears in various dimensions and signatures, using concepts and techniques borrowed from a certain approach to spinors known as geometric algebra.
Babalic, Elena-Mirela   +2 more
core   +1 more source

Domain‐Aware Implicit Network for Arbitrary‐Scale Remote Sensing Image Super‐Resolution

open access: yesAdvanced Intelligent Discovery, EarlyView.
Although existing arbitrary‐scale image super‐resolution methods are flexible to reconstruct images with arbitrary scales, the characteristic of training distribution is neglected that there exists domain shift between samples of various scales. In this work, a Domain‐Aware Implicit Network (DAIN) is proposed to handle it from the perspective of domain
Xiaoxuan Ren   +6 more
wiley   +1 more source

Deformable Attention Multiscale Feature Fusion Network‐Dehaze: An Adaptive Image Dehazing Method Based on Deformable Attention Multiscale Fusion Network

open access: yesAdvanced Intelligent Systems, EarlyView.
This paper presents the deformable attention multiscale feature fusion network‐dehaze adaptive image dehazing network, which integrates three core modules (revised residual shrinkage unit, multiscale attention, cross‐scale feature fusion). It incorporates deformable convolution and multiscale attention mechanisms to address the detail loss issue of ...
Ruipeng Wang   +4 more
wiley   +1 more source

Invariant Measure and Universality of the 2D Yang–Mills Langevin Dynamic

open access: yesCommunications on Pure and Applied Mathematics, EarlyView.
ABSTRACT We prove that the Yang–Mills (YM) measure for the trivial principal bundle over the two‐dimensional torus, with any connected, compact structure group, is invariant for the associated renormalised Langevin dynamic. Our argument relies on a combination of regularity structures, lattice gauge‐fixing and Bourgain's method for invariant measures ...
Ilya Chevyrev, Hao Shen
wiley   +1 more source

Cryptanalysis and Improvement of Several Identity-Based Authenticated and Pairing-Free Key Agreement Protocols for IoT Applications

open access: yesSensors, 2023
Internet of Things (IoT) applications have been increasingly developed. Authenticated key agreement (AKA) plays an essential role in secure communication in IoT applications.
Haiyan Sun   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy