Results 31 to 40 of about 155,128 (235)
Covert Communication in Autoencoder Wireless Systems
Hiding the wireless communication by transmitter Alice to intended receiver Bob from a capable and attentive adversary Willie has been widely studied under the moniker "covert communications". However, when such covert communication is done in the presence of allowable system communications, there has been little study of both hiding the signal and ...
Ali Mohammadi Teshnizi +2 more
openaire +2 more sources
AAA+ protein unfoldases—the Moirai of the proteome
AAA+ unfoldases are essential molecular motors that power protein degradation and disaggregation. This review integrates recent cryo‐electron microscopy (cryo‐EM) structures and single‐molecule biophysical data to reconcile competing models of substrate translocation.
Stavros Azinas, Marta Carroni
wiley +1 more source
Reliable, Deniable, and Hidable Communication over Multipath Networks
We consider the scenario wherein Alice wants to (potentially) communicate to the intended receiver Bob over a network consisting of multiple parallel links in the presence of a passive eavesdropper Willie, who observes an unknown subset of links.
Bakshi, Mayank +3 more
core +2 more sources
Covert Multi-Access Communication with a Non-Covert User
In this paper, we characterize the fundamental limits of a communication system with three users (i.e., three transmitters) and a single receiver where communication from two covert users must remain undetectable to an external warden. Our results show a tradeoff between the highest rates that are simultaneously achievable for the three users.
Abdelaziz Bounhar +2 more
openaire +2 more sources
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice +16 more
wiley +1 more source
BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations
It has been assumed that the physical separation (air-gap) of computers provides a reliable level of security, such that should two adjacent computers become compromised, the covert exchange of data between them would be impossible.
Elovici, Yuval +3 more
core +1 more source
Covert Communication Networks in Hostile Environments [PDF]
International ...
Kiseon Kim +2 more
openaire +2 more sources
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova +25 more
wiley +1 more source
Glioma cells mainly express the endothelin receptor EDNRB, while EDNRA is restricted to a perivascular tumor subpopulation. Endothelin signaling reduces glioma cell proliferation while promoting migration and a proneural‐to‐mesenchymal transition associated with poor prognosis. This pathway activates Ca2+, K+, ERK, and STAT3 signalings and is regulated
Donovan Pineau +36 more
wiley +1 more source
We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily deniable due to an eavesdropping attack that limits ...
A Steane +24 more
core +1 more source

