Results 1 to 10 of about 169,904 (225)
Malware detection using pre-trained transformer encoder with byte sequences. [PDF]
Ordinary users encounter various documents on the network every day, such as news articles, emails, and messages, and most are vulnerable to malicious attacks.
Eun-Jin Kim +6 more
doaj +2 more sources
Oncolytic virotherapy potentiates chemo-PD-1 immunotherapy by engaging chemo-resistant bystander CD8+ T cells [PDF]
Background The efficacy of combined chemotherapy and programmed cell death protein-1 (PD-1) immune checkpoint blockade (ICB) is constrained by the collateral cytotoxicity of chemotherapy toward proliferating tumor-specific CD8+ T (TTST) cells, a ...
Xiangyu Chen +14 more
doaj +2 more sources
Security Issues of the Digital Certificates within Public Key Infrastructures [PDF]
The paper presents the basic byte level interpretation of an X.509 v3 digital certificate according to ASN.1 DER/BER encoding. The reasons for byte level analysis are various and important.
Cristian TOMA
doaj +2 more sources
Raw QPP-RNG randomness via system jitter across platforms: a NIST SP 800-90B evaluation [PDF]
High-quality randomness is fundamental to the security of modern cryptographic systems. We present QPP-RNG, a true random number generator (TRNG) that harvests entropy from diverse system-level jitters–including CPU pipeline timing divergences, DRAM ...
Georgia Vrana, Dafu Lou, Randy Kuang
doaj +2 more sources
ByT5: Towards a Token-Free Future with Pre-trained Byte-to-Byte Models
Noah Constant, Rami Al-Rfou
exaly +2 more sources
Computer-aided drug design (CADD) techniques allow the identification of compounds capable of modulating protein functions in pathogenesis-related pathways, which is a promising line on drug discovery. Marine natural products (MNPs) are considered a rich
Laura Llorach-Pares +3 more
doaj +1 more source
The demand for data storage is growing at an unprecedented rate, and current methods are not sufficient to accommodate such rapid growth due to their cost, space requirements, and energy consumption.
Tomasz Buko +2 more
doaj +1 more source
Radiation-Inactivated Acinetobacter baumannii Vaccine Candidates
Acinetobacter baumannii is a bacterial pathogen that is often multidrug-resistant (MDR) and causes a range of life-threatening illnesses, including pneumonia, septicemia, and wound infections.
Stephen J. Dollery +13 more
doaj +1 more source
Optimized Implementation of SM4 on AVR Microcontrollers, RISC-V Processors, and ARM Processors
At 2003, the SM4 block cipher was introduced that is a Chinese domestic cryptographic. It is mandated in the Chinese National Standard for Wireless LAN Wired Authentication and Privacy Infrastructure (WAPI), because the algorithm was developed for use in
Hyeokdong Kwon +7 more
doaj +1 more source
Byte Addressing Mode Expansion and 64bit Data Operation Simulation Implementation for BWDSP104X [PDF]
Currently,the programming model under BWDSP104X compiler is based on the word unit addressing modes,lacking of support for non 32-bit wide data and incompatible with byte unit addressing modes.With the modification of related frontend data type,the ...
ZHAO Gaoyi,ZHENG Qilong
doaj +1 more source

