Results 81 to 90 of about 147,541 (282)

Breaking an image encryption algorithm based on chaos

open access: yes, 2011
Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of MCKBA and finds that it can be broken with a differential attack, which requires only four chosen ...
Arroyo D.   +4 more
core   +1 more source

Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy

open access: yesAdvanced Science, EarlyView.
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu   +4 more
wiley   +1 more source

An Economic Analysis of Privacy Protection and Statistical Accuracy as Social Choices [PDF]

open access: yes, 2018
Statistical agencies face a dual mandate to publish accurate statistics while protecting respondent privacy. Increasing privacy protection requires decreased accuracy.
Abowd, John M, Schmutte, Ian M
core   +1 more source

Performance of various quantum key distribution systems using 1.55 um up-conversion single-photon detectors

open access: yes, 2005
We compare the performance of various quantum key distribution (QKD) systems using a novel single-photon detector, which combines frequency up-conversion in a periodically poled lithium niobate (PPLN) waveguide and a silicon avalanche photodiode (APD ...
A. V. Vandevender   +11 more
core   +1 more source

A Note on Related-Tweakey Impossible Differential Attacks

open access: yesIACR Communications in Cryptology
In this note we review the technique proposed at ToSC 2018 by Sadeghi et al. for attacks built upon several related-tweakey impossible differential trails. We show that the initial encryption queries are improper and lead the authors to misevaluate a filtering value in the key recovery phase.
Bonnetain, Xavier, Lallemand, Virginie
openaire   +2 more sources

The Faraday Scalpel: Electrochemical Nerve Lesioning Mechanisms Studied in Invertebrate Models

open access: yesAdvanced Science, EarlyView.
Direct‐current produces nerve lesioning through discrete electrochemical reactions. Using hypoxia‐sensitive locust nerves and hypoxia‐tolerant leech nerves, we map three injury pathways: cathodic oxygen reduction, cathodic alkalization, and anodic chloride oxidation. These findings establish electrochemical lesioning—the “Faraday Scalpel”—as a precise,
Petra Ondráčková   +5 more
wiley   +1 more source

More Accurate Differential Properties of LED64 and Midori64

open access: yesIACR Transactions on Symmetric Cryptology, 2018
In differential cryptanalysis, a differential is more valuable than the single trail belonging to it in general. The traditional way to compute the probability of the differential is to sum the probabilities of all trails within it.
Ling Sun, Wei Wang, Meiqin Wang
doaj   +1 more source

Microstructure‐Resolved Modeling to Predicting and Regulating Lithium Plating‐Stripping Dynamics on Graphite Electrodes

open access: yesAdvanced Science, EarlyView.
ABSTRACT The lithium plating reaction in graphite electrodes acts as a root cause for the accelerated degradation and the internal short circuits in lithium‐ion batteries. Here, an electrochemical model based on multi‐scale microstructural images was established to identify lithium plating‐stripping processes, thereby supporting the predictive outcomes
Heng Huang   +9 more
wiley   +1 more source

Image Encryption Based on Diffusion and Multiple Chaotic Maps

open access: yes, 2011
In the recent world, security is a prime important issue, and encryption is one of the best alternative way to ensure security. More over, there are many image encryption schemes have been proposed, each one of them has its own strength and weakness ...
bagan, Dr. K. Bhoopathy   +2 more
core   +1 more source

Neuromodulator Dynamics Underlying Associative Learning in the Ventral Striatum's Olfactory Tubercle

open access: yesAdvanced Science, EarlyView.
Using fiber photometry and genetically encoded sensors, the dynamic release patterns of four neuromodulators in the olfactory tubercle (OT)—a brain region overlapping with the olfactory cortex and ventral striatum—were systematically monitored in response to external rewards and distinct reward‐associated learning processes.
Maojun Hong   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy