Results 81 to 90 of about 257,742 (291)
Generic Attacks on Double Block Length Sponge Hashing
The sponge construction is one of the main modes of operation for hash functions. Using a permutation of width b = r + c, the sponge construction with rate r and capacity c is indifferentiable up to Ω(2c/2) permutation calls.
Gaëtan Leurent, César Mathéus
doaj +1 more source
Sphingomonas paucimobilis‐Driven Epithelial–Endothelial Transition in Adenomyosis Pathogenesis
This study identifies epithelial–endothelial transition (EET) as a novel adenomyosis pathogenic mechanism driven by Sphingomonas paucimobilis colonization. Systematic inhibitor experiments validate a TNFα→NF‐κB→MMP signaling cascade essential for EET. Critically, bacterial culture supernatant fails to induce pathological changes, demonstrating viable ...
Peigen Chen +7 more
wiley +1 more source
Enhanced membership inference attack method leveraging data characteristics
Aiming at the problem that the existing membership inference attack (MIA) methods only present generic testing results and had not sufficiently evaluated the effectiveness of such attacks, which could mislead attackers, multiple test scenarios were first
NIU Jun +6 more
doaj +2 more sources
This study performs pan‐viromic profiling of 14,529 samples from 5,710 domestic herbivores across five Chinese provinces, establishing the DhCN‐Virome (1,085,360 viral metagenomes). It reveals species/sample‐specific viromic signatures and cross‐species transmission dynamics, aiding unified disease control.
Yue Sun +19 more
wiley +1 more source
Cooperative spectrum sensing (CSS) is envisaged as a powerful approach to improve the utilization of scarce radio spectrum resources, but it is threatened by Byzantine attack.
Jun Wu +4 more
doaj +1 more source
The severity of acute pancreatitis (AP) is linked to reduced abundance of Bifidobacterium pseudolongum (B. pseudolongum). Administration of B. pseudolongum or its key metabolite acetate alleviates pancreatic and systemic inflammation by suppressing M1 macrophage polarization.
Langyi Guan +16 more
wiley +1 more source
Unlock the Door to my Secrets, but don’t Forget to Glitch
In this work, we look into an attack vector known as flash erase suppression. Many microcontrollers have a feature that allows the debug interface protection to be deactivated after wiping the entire flash memory.
Marc Schink +6 more
doaj +1 more source
A Structural Attack on Type-I Generalized Feistel Networks
This paper presents generic structural cryptanalysis against type-I generalized Feistel networks (GFN), in which all the inner transformations are unknown. The target of our attack is to retrieve all the unknown round functions.
Ting Cui, Shiwei Chen, Haoran Zheng
doaj +1 more source
Computational Study of a Generic T-tail Transport [PDF]
This paper presents a computational study on the static and dynamic stability characteristics of a generic transport T-tail configuration under a NASA research program to improve stall models for civil transports.
Cunningham, Kevin +5 more
core +1 more source
Oncolytic Probiotics with Molecular Pili for Solid Tumor Therapy
This study identifies Lactobacillus rhamnosus as an intrinsic oncolytic agent that triggers tumor metabolic collapse via calcium‐dependent ROS bursts. By chemically anchoring collagen‐targeting “molecular pili” to the bacterial surface, the engineered non‐transgenic probiotic (LR@MP) achieves targeted colonization and potent solid tumor suppression ...
Haodong Ge +14 more
wiley +1 more source

