Results 81 to 90 of about 147,541 (282)
Breaking an image encryption algorithm based on chaos
Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of MCKBA and finds that it can be broken with a differential attack, which requires only four chosen ...
Arroyo D. +4 more
core +1 more source
Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu +4 more
wiley +1 more source
An Economic Analysis of Privacy Protection and Statistical Accuracy as Social Choices [PDF]
Statistical agencies face a dual mandate to publish accurate statistics while protecting respondent privacy. Increasing privacy protection requires decreased accuracy.
Abowd, John M, Schmutte, Ian M
core +1 more source
We compare the performance of various quantum key distribution (QKD) systems using a novel single-photon detector, which combines frequency up-conversion in a periodically poled lithium niobate (PPLN) waveguide and a silicon avalanche photodiode (APD ...
A. V. Vandevender +11 more
core +1 more source
A Note on Related-Tweakey Impossible Differential Attacks
In this note we review the technique proposed at ToSC 2018 by Sadeghi et al. for attacks built upon several related-tweakey impossible differential trails. We show that the initial encryption queries are improper and lead the authors to misevaluate a filtering value in the key recovery phase.
Bonnetain, Xavier, Lallemand, Virginie
openaire +2 more sources
The Faraday Scalpel: Electrochemical Nerve Lesioning Mechanisms Studied in Invertebrate Models
Direct‐current produces nerve lesioning through discrete electrochemical reactions. Using hypoxia‐sensitive locust nerves and hypoxia‐tolerant leech nerves, we map three injury pathways: cathodic oxygen reduction, cathodic alkalization, and anodic chloride oxidation. These findings establish electrochemical lesioning—the “Faraday Scalpel”—as a precise,
Petra Ondráčková +5 more
wiley +1 more source
More Accurate Differential Properties of LED64 and Midori64
In differential cryptanalysis, a differential is more valuable than the single trail belonging to it in general. The traditional way to compute the probability of the differential is to sum the probabilities of all trails within it.
Ling Sun, Wei Wang, Meiqin Wang
doaj +1 more source
ABSTRACT The lithium plating reaction in graphite electrodes acts as a root cause for the accelerated degradation and the internal short circuits in lithium‐ion batteries. Here, an electrochemical model based on multi‐scale microstructural images was established to identify lithium plating‐stripping processes, thereby supporting the predictive outcomes
Heng Huang +9 more
wiley +1 more source
Image Encryption Based on Diffusion and Multiple Chaotic Maps
In the recent world, security is a prime important issue, and encryption is one of the best alternative way to ensure security. More over, there are many image encryption schemes have been proposed, each one of them has its own strength and weakness ...
bagan, Dr. K. Bhoopathy +2 more
core +1 more source
Neuromodulator Dynamics Underlying Associative Learning in the Ventral Striatum's Olfactory Tubercle
Using fiber photometry and genetically encoded sensors, the dynamic release patterns of four neuromodulators in the olfactory tubercle (OT)—a brain region overlapping with the olfactory cortex and ventral striatum—were systematically monitored in response to external rewards and distinct reward‐associated learning processes.
Maojun Hong +7 more
wiley +1 more source

