Results 51 to 60 of about 177,532 (270)

Alveolar Soft Part Sarcoma in Pediatric and Young Adult Patients: A Report From the Children's Oncology Group Study ARST0332

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Alveolar soft part sarcoma (ASPS) is a rare soft tissue sarcoma occurring most commonly in adolescence and young adulthood. Methods We present the clinical characteristics, treatments, and outcomes of patients with newly diagnosed ASPS enrolled on the Children's Oncology Group study ARST0332.
Jacquelyn N. Crane   +11 more
wiley   +1 more source

PathFuzzer: Sensitive Information Flow Path-Guided Fuzzing for Intent Vulnerabilities in Android Applications

open access: yesIET Information Security
Intent vulnerabilities pose a significant threat as they allow attackers to exploit unverified intent messages, leading to sensitive data leaks, privilege escalations, or unauthorized actions that compromise user privacy and system security.
Zhanhui Yuan   +4 more
doaj   +1 more source

SURVEY AND PROPOSED METHOD TO DETECT ADVERSARIAL EXAMPLES USING AN ADVERSARIAL RETRAINING MODEL

open access: yesTạp chí Khoa học Đại học Đà Lạt
Artificial intelligence (AI) has found applications across various sectors and industries, offering numerous advantages to human beings. One prominent area where AI has made significant contributions is in machine learning models.
Thanh Son Phan   +3 more
doaj   +1 more source

Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP

open access: yesIACR Transactions on Symmetric Cryptology, 2023
In this paper, we present an improved differential-linear cryptanalysis of the ChaCha stream cipher. Our main contributions are new differential-linear distinguishers that we were able to build thanks to the following improvements: a) we considered a ...
Emanuele Bellini   +4 more
doaj   +1 more source

Quantum cryptography: key distribution and beyond

open access: yes, 2018
Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other ...
H., Akshata Shenoy   +2 more
core   +1 more source

Implementing Health‐Related Quality of Life Assessment in Pediatric Oncology: A Feasibility Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background There is growing interest in embedding health‐related quality of life (HRQoL) assessment and patient‐reported outcome measures (PROMs) within clinical cancer care. This study evaluated the feasibility, acceptability, and usability of implementing an electronic PROM (ePROM) platform to measure HRQoL in children with cancer ...
Mikaela Doig   +13 more
wiley   +1 more source

Circuit-noise-resilient virtual distillation

open access: yesCommunications Physics
Quantum error mitigation (QEM) is vital for improving quantum algorithms’ accuracy on noisy near-term devices. A typical QEM method, called Virtual Distillation (VD), can suffer from imperfect implementation, potentially leading to worse outcomes than ...
Xiao-Yue Xu   +4 more
doaj   +1 more source

Characterisations of Ideal Threshold Schemes [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2004
We characterise ideal threshold schemes from different approaches. Since the characteristic properties are independent to particular descriptions of threshold schemes all ideal threshold schemes can be examined by new points of view and new results on ...
Josef Pieprzyk, Xian-Mo Zhang
doaj   +1 more source

Treatment Decision‐Making Roles and Preferences Among Adolescents and Young Adults With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Decision‐making (DM) dynamics between adolescents and young adults (AYAs) with cancer, parents, and oncologists remain underexplored in diverse populations. We examined cancer treatment DM preferences among an ethnically and socioeconomically diverse group of AYAs and their parents.
Amanda M. Gutierrez   +14 more
wiley   +1 more source

Secure Quantum Key Distribution

open access: yes, 2014
Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography.
Curty, Marcos   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy