Results 51 to 60 of about 201,296 (311)

SURVEY AND PROPOSED METHOD TO DETECT ADVERSARIAL EXAMPLES USING AN ADVERSARIAL RETRAINING MODEL

open access: yesTạp chí Khoa học Đại học Đà Lạt
Artificial intelligence (AI) has found applications across various sectors and industries, offering numerous advantages to human beings. One prominent area where AI has made significant contributions is in machine learning models.
Thanh Son Phan   +3 more
doaj   +1 more source

Quantum Cryptography

open access: yes, 2009
There is no abstract for this review article.
Lo, Hoi-Kwong, Zhao, Yi
openaire   +2 more sources

Decoding the dual role of autophagy in cancer through transcriptional and epigenetic regulation

open access: yesFEBS Letters, EarlyView.
Transcriptional and epigenetic regulation controls autophagy, which exerts context‐dependent effects on cancer: Autophagy suppresses tumorigenesis by maintaining cellular homeostasis or promotes tumor progression by supporting survival under stress. In this “In a Nutshell” article, we explore the intricate mechanisms of the dual function of autophagy ...
Young Suk Yu, Ik Soo Kim, Sung Hee Baek
wiley   +1 more source

An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
Owing to the emergence and rapid advances of new-generation information and digitalization technologies, the concept of model-driven digital twin has received widespread attentions and is developing vigorously.
Jiaxing Guo   +5 more
doaj   +1 more source

Protonophore activity of short‐chain fatty acids induces their intracellular accumulation and acidification

open access: yesFEBS Letters, EarlyView.
The protonated form of butyrate, as well as other short‐chain fatty acids (SCFAs), is membrane permeable. In acidic extracellular environments, this can lead to intracellular accumulation of SCFAs and cytosolic acidification. This phenomenon will be particularly relevant in acidic environments such as the large intestine or tumor microenvironments ...
Muwei Jiang   +2 more
wiley   +1 more source

Free-Space Quantum Key Distribution

open access: yes, 2016
Based on the firm laws of physics rather than unproven foundations of mathematical complexity, quantum cryptography provides a radically different solution for encryption and promises unconditional security.
Carrasco-Casado, Alberto   +2 more
core   +1 more source

A stepwise emergence of evolution in the RNA world

open access: yesFEBS Letters, EarlyView.
How did biological evolution emerge from chemical reactions? This perspective proposes a gradual scenario of self‐organization among RNA molecules, where catalytic feedback on random mixtures plays the central role. Short oligomers cross‐ligate, and self‐assembly enables heritable variations. An event of template‐externalization marks the transition to
Philippe Nghe
wiley   +1 more source

Circuit-noise-resilient virtual distillation

open access: yesCommunications Physics
Quantum error mitigation (QEM) is vital for improving quantum algorithms’ accuracy on noisy near-term devices. A typical QEM method, called Virtual Distillation (VD), can suffer from imperfect implementation, potentially leading to worse outcomes than ...
Xiao-Yue Xu   +4 more
doaj   +1 more source

Modifications in FLAP's second cytosolic loop influence 5‐LOX interaction, inhibitor binding, and leukotriene formation

open access: yesFEBS Letters, EarlyView.
The enzyme 5‐lipoxygenase (5‐LOX) catalyzes the first step in the biosynthesis of leukotrienes (LTs) involved in inflammatory pathophysiology. After cellular stimulation, 5‐LOX translocates to the nucleus, interacting with the 5‐LOX‐activating protein (FLAP) to form LTA4 from arachidonic acid (AA).
Erik Romp   +5 more
wiley   +1 more source

A new quantum cryptanalysis method on block cipher Camellia

open access: yesIET Information Security, 2021
Symmetric cryptography is expected to be quantum safe when long‐term security is needed. Kuwakado and Morii gave a 3‐round quantum distinguisher of the Feistel cipher based on Simon's algorithm.
Yanjun Li, Hao Lin, Meng Liang, Ying Sun
doaj   +1 more source

Home - About - Disclaimer - Privacy