Results 111 to 120 of about 2,375,414 (378)
Could Your Mobile Broadband Internet Provider Threaten Your Digital Privacy?
Even Becker
openalex +1 more source
Using single‐molecule whispering gallery mode sensors, neurotransmitter‐specific membrane binding signatures are measured that reveal intrinsically distinct interaction kinetics and orientations on a lipid membrane. Abstract Neurotransmitters (NTs) have traditionally been understood to act via aqueous‐phase receptor binding, but growing evidence ...
Thomas L. Derrien +4 more
wiley +1 more source
Acoustic holograms act as key tools for information encryption, yet current schemes limit encryption dimensionality/security and require time‐consuming decryption. A compact device integrates multi‐dimensional cascaded acoustic holography with particle manipulation, employs extra secret keys, enables rapid decryption, and is validated via 1D/2D/3D ...
Qin Lin +8 more
wiley +1 more source
Security Risk Management for the Internet of Things: Technologies and Techniques for IoT Security, Privacy and Data Protection [PDF]
Masaaki Nagahara
openalex +1 more source
Solid Harmonic Wavelet Bispectrum for Image Analysis
The Solid Harmonic Wavelet Bispectrum (SHWB), a rotation‐ and translation‐invariant descriptor that captures higher‐order (phase) correlations in signals, is introduced. Combining wavelet scattering, bispectral analysis, and group theory, SHWB achieves interpretable, data‐efficient representations and demonstrates competitive performance across texture,
Alex Brown +3 more
wiley +1 more source
The Impact of Banking Industry on Customers Perception of Privacy, Risk and Security on Internet Banking Usage [PDF]
Mukolu M.O, ADELEKE K.O, ILLUGBEMI A.O
openalex +1 more source
The MR‐DELTAnet model utilizes longitudinal MRI to predict treatment response after neoadjuvant chemoradiotherapy in locally rectal cancer patients, accurately identifying patients likely to achieve pathological complete response for personalized management.
Wuteng Cao +14 more
wiley +1 more source
The Anonymous Poster: How to Protect Internet Users’ Privacy and Prevent Abuse [PDF]
The threat of anonymous Internet posting to individual privacy has been met with congressional and judicial indecisiveness. Part of the problem stems from the inherent conflict between punishing those who disrespect one\u27s privacy by placing a burden ...
Ness, Scott
core +1 more source
Cytokine‐engineered CAR‐T cells represent a promising immunotherapy against malignancies due to direct tumor killing and potent immunity response. However, significant toxicities, including CRS and ICANS, have restricted clinical applications. How to keep the risk‐benefit balance of the advanced therapy is of great importance for maximizing the benefit
Xinru Zhang +7 more
wiley +1 more source

