Results 111 to 120 of about 179,893 (274)

Hippo pathway at the crossroads of stemness and therapeutic resistance in breast cancer

open access: yesMolecular Oncology, EarlyView.
Dysregulation of the Hippo pathway drives nuclear accumulation of YAP/TAZ, activating stemness‐related transcriptional programs that sustain breast cancer stemness and fuel therapeutic resistance across subtypes, underscoring Hippo signaling as a targetable vulnerability. Figure created and edited with BioRender.com.
Giulia Schiavoni   +11 more
wiley   +1 more source

A Secure Authentication Protocol Supporting Efficient Handover for UAV

open access: yesMathematics
Unmanned Aerial Vehicles (UAVs) are increasingly pivotal in operations such as flood rescue, wildfire surveillance, and covert military endeavors, with their integration into the Internet of Things (IoT) networks broadening the scope of services they ...
Kang Wen   +5 more
doaj   +1 more source

ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Despite the growing demand for software implementations of ECDSA secure against attackers with full control of the execution environment, scientific literature on ECDSA white-box design is scarce. The CHES 2021 WhibOx contest was thus held to assess the
Guillaume Barbu   +8 more
doaj  

Deciphering transcriptional plasticity in pancreatic ductal adenocarcinoma reveals alterations in sensory neuron innervation

open access: yesMolecular Oncology, EarlyView.
Pancreatic sensory neurons innervating healthy and PDAC tissue were retrogradely labeled and profiled by single‐cell RNA sequencing. Tumor‐associated innervation showed a dominant neurofilament‐positive subtype, altered mitochondrial gene signatures, and reduced non‐peptidergic neurons.
Elena Genova   +14 more
wiley   +1 more source

Motion vector‐domain video steganalysis exploiting skipped macroblocks

open access: yesIET Image Processing
Video steganography has the potential to be used to convey illegal information, and video steganalysis is a vital tool to detect the presence of this illicit act.
Jun Li   +4 more
doaj   +1 more source

Sota Voce: Low-Noise Sampling of Sparse Fixed-Weight Vectors

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Many post-quantum cryptosystems require generating an n-bit binary vector with a prescribed Hamming weight ω, a process known as fixed-weight sampling.
Décio Luiz Gazzoni Filho   +5 more
doaj   +1 more source

CCDC80 suppresses high‐grade serous ovarian cancer migration via negative regulation of B7‐H3

open access: yesMolecular Oncology, EarlyView.
PAX8 is a lineage‐specific master regulator of transcription in high‐grade serous ovarian cancer (HGSC) progression. We show for the first time that PAX8 facilitates proliferation and metastasis by repressing the cell autonomous tumor suppressor CCDC80 and inducing B7‐H3 expression.
Aya Saleh   +12 more
wiley   +1 more source

Bootstrapping Optimization Techniques for the FINAL Fully Homomorphic Encryption Scheme

open access: yesInformation
With the advent of cloud computing and the era of big data, there is an increasing focus on privacy computing. Consequently, homomorphic encryption, being a primary technique for achieving privacy computing, is held in high regard.
Meng Wu, Xiufeng Zhao, Weitao Song
doaj   +1 more source

CD47 promotes mitogen‐activated protein kinase and epithelial‐to‐mesenchymal transition molecular programs to drive prometastatic phenotypes in non‐small cell lung cancer

open access: yesMolecular Oncology, EarlyView.
Beyond its role in immune evasion, this study identified that CD47 drives tumor‐intrinsic signaling in non‐small cell lung cancer (NSCLC). Transcriptomic profiling and functional studies revealed that CD47 regulates cell adhesion, migration, and metastasis through an ERK–EMT signaling axis.
Asa P.Y. Lau   +8 more
wiley   +1 more source

Mitigating Crossfire Attacks via Topology Spoofing Based on ENRNN-MTD

open access: yesApplied Sciences
Crossfire attacks disrupt network services by targeting critical links of server groups, causing traffic congestion and server failures that prevent legitimate users from accessing services.
Dexian Chang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy