Results 61 to 70 of about 63,938 (281)
Smart grids are vulnerable to stealthy false data injection attacks (SFDIAs), as SFDIAs can bypass residual-based bad data detection mechanisms. Methods based on deep learning technology have shown promising accuracy in the detection of SFDIAs.
Xuefei Yin +3 more
doaj +1 more source
Liver stiffness promotes intrahepatic cholesterol accumulation by repressing LXRα through YAP/TAZ activation. Stiff matrices impair cholesterol efflux in hepatocytes, while YAP/TAZ deletion restores LXRα activity and prevents cholesterol‐induced fibrosis.
Na Young Lee +9 more
wiley +1 more source
This study reveals that Urolithin A (UA) counteracts alcohol‐induced cognitive and social dysfunction (AICSD) via a gut microbiome‐dependent mechanism. UA‐enriched Bacteroids sartorii and Parabacteroids distasonis elevate anandamide (AEA), which activates the CB1R‐DRD2‐Rap1 signaling cascade to drive synaptic repair and reduce neuroinflammation ...
Hongbo Zhang +9 more
wiley +1 more source
Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing [PDF]
As an extension of cloud computing, fog computing has received more attention in recent years. It can solve problems such as high latency, lack of support for mobility and location awareness in cloud computing. In the Internet of Things (IoT), a series of IoT devices can be connected to the fog nodes that assist a cloud service center to store and ...
Yinghui Zhang +6 more
openaire +3 more sources
Stochastic nanoscale physical cues induce glioblastoma (GBM)‐associated transcriptional traits in naïve astrocytes leading to spontaneous formation of spheroids. Cells within spheroids express activated‐MMP2 and a differential gene expression pattern involving P53 and NOTCH3, providing evidence for a role for changes in brain topography, as observed in
Laurent Starck +8 more
wiley +1 more source
One Breaker is Enough: Hidden Topology Attacks on Power Grids
A coordinated cyber-attack on grid meter readings and breaker statuses can lead to incorrect state estimation that can subsequently destabilize the grid. This paper studies cyber-attacks by an adversary that changes breaker statuses on transmission lines
Baldick, Ross +2 more
core +1 more source
This study identifies B4GALNT4 as a key driver of prostate cancer (PCa). It shows that B4GALNT4 glycosylates PDK1 protein at the N531 site, which stabilizes the PDK1 and constitutively activates the PI3K‐AKT pathway. This mechanism promotes tumor cell proliferation, migration, and invasion. The findings establish the B4GALNT4‐PDK1 glycosylation axis as
Shaoqin Jiang +12 more
wiley +1 more source
Tuning Windowed Chi-Squared Detectors for Sensor Attacks
A model-based windowed chi-squared procedure is proposed for identifying falsified sensor measurements. We employ the widely-used static chi-squared and the dynamic cumulative sum (CUSUM) fault/attack detection procedures as benchmarks to compare the ...
aström +6 more
core +1 more source
Lipid overload suppresses SREBF2‐mediated FNTB expression, leading to defective Lamin A maturation and nuclear envelope instability. This nuclear catastrophe triggers a pro‐fibrotic senescence program in cardiomyocytes. Notably, restoring nuclear integrity via AAV9‐based gene therapy effectively attenuates cardiac remodeling, identifying the ...
Yuxiao Chen +16 more
wiley +1 more source
Fast Sequence Component Analysis for Attack Detection in Synchrophasor Networks [PDF]
Modern power systems have begun integrating synchrophasor technologies into part of daily operations. Given the amount of solutions offered and the maturity rate of application development it is not a matter of "if" but a matter of "when" in regards to ...
Barella, Richard +6 more
core +2 more sources

