Results 71 to 80 of about 349,531 (370)
A Decade of Lattice Cryptography
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn as the foundation for secure cryptographic systems. Attractive features of lattice cryptography include apparent resistance to quantum attacks in contrast with ...
Chris Peikert
semanticscholar +1 more source
Hiding Data in Images Using Cryptography and Deep Neural Network [PDF]
Steganography is an art of obscuring data inside another quotidian file of similar or varying types. Hiding data has always been of significant importance to digital forensics.
Kartik Sharma+4 more
semanticscholar +1 more source
Unraveling Mycobacterium tuberculosis acid resistance and pH homeostasis mechanisms
Mycobacterium tuberculosis exhibits a remarkable resilience to acid stress. In this Review, we discuss some of the molecular mechanisms and metabolic pathways used by the tubercle bacilli to adapt and resist host‐mediated acid stress. Mycobacterium tuberculosis (Mtb) is a successful pathogen that has developed a variety of strategies to survive and ...
Janïs Laudouze+3 more
wiley +1 more source
Owing to the emergence and rapid advances of new-generation information and digitalization technologies, the concept of model-driven digital twin has received widespread attentions and is developing vigorously.
Jiaxing Guo+5 more
doaj +1 more source
The power of microRNA regulation—insights into immunity and metabolism
MicroRNAs are emerging as crucial regulators at the intersection of metabolism and immunity. This review examines how miRNAs coordinate glucose and lipid metabolism while simultaneously modulating T‐cell development and immune responses. Moreover, it highlights how cutting‐edge artificial intelligence applications can identify miRNA biomarkers ...
Stefania Oliveto+2 more
wiley +1 more source
Circuit-noise-resilient virtual distillation
Quantum error mitigation (QEM) is vital for improving quantum algorithms’ accuracy on noisy near-term devices. A typical QEM method, called Virtual Distillation (VD), can suffer from imperfect implementation, potentially leading to worse outcomes than ...
Xiao-Yue Xu+4 more
doaj +1 more source
Полиномиальные аппроксимации некоторых функций активации нейронных сетей
Активное внедрение систем машинного обучения ставит актуальную задачу обеспечения их защиты от различных типов атак, направленных на нарушение свойств конфиденциальности, целостности и доступности как обрабатываемых данных, так и обучаемых моделей. Одним
Grigory Marshalko, Julia Trufanova
doaj +1 more source
The Saccharomyces cerevisiae amino acid transporter Lyp1 has a broad substrate spectrum
In Saccharomyces cerevisiae, Yeast Amino acid Transporter family members mediate the import of amino acids, ranging from substrate specialists to generalists. Here, we show that the specialist transporter, Lyp1, has a broader substrate spectrum than previously described, with affinity constants spanning from micromolar to millimolar.
Foteini Karapanagioti+3 more
wiley +1 more source
A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology
With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management.
Chaoyue Song+3 more
doaj +1 more source