Results 81 to 90 of about 8,564 (282)

On Modeling the Costs of Censorship [PDF]

open access: yes, 2014
We argue that the evaluation of censorship evasion tools should depend upon economic models of censorship. We illustrate our position with a simple model of the costs of censorship. We show how this model makes suggestions for how to evade censorship. In
Afroz, Sadia   +3 more
core   +1 more source

Patient‐specific pharmacogenomics demonstrates xCT as predictive therapeutic target in colon cancer with possible implications in tumor connectivity

open access: yesMolecular Oncology, EarlyView.
This study integrates transcriptomic profiling of matched tumor and healthy tissues from 32 colorectal cancer patients with functional validation in patient‐derived organoids, revealing dysregulated metabolic programs driven by overexpressed xCT (SLC7A11) and SLC3A2, identifying an oncogenic cystine/glutamate transporter signature linked to ...
Marco Strecker   +16 more
wiley   +1 more source

Aggressive prostate cancer is associated with pericyte dysfunction

open access: yesMolecular Oncology, EarlyView.
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero   +11 more
wiley   +1 more source

Reduced vascular leakage correlates with breast carcinoma T regulatory cell infiltration but not with metastatic propensity

open access: yesMolecular Oncology, EarlyView.
A mouse model for vascular normalization and a human breast cancer cohort were studied to understand the relationship between vascular leakage and tumor immune suppression. For this, endothelial and immune cell RNAseq, staining for vascular function, and immune cell profiling were employed.
Liqun He   +8 more
wiley   +1 more source

A Proposed Algorithm for Steganography

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2017
Steganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key ...
A.O. Ibadi, O. Z. Akif
doaj  

Liquid biopsy epigenetics: establishing a molecular profile based on cell‐free DNA

open access: yesMolecular Oncology, EarlyView.
Cell‐free DNA (cfDNA) fragments in plasma from cancer patients carry epigenetic signatures reflecting their cells of origin. These epigenetic features include DNA methylation, nucleosome modifications, and variations in fragmentation. This review describes the biological properties of each feature and explores optimal strategies for harnessing cfDNA ...
Christoffer Trier Maansson   +2 more
wiley   +1 more source

AUDIO CRYPTANALYSIS- AN APPLICATION OF SYMMETRIC KEY CRYPTOGRAPHY AND AUDIO STEGANOGRAPHY

open access: yesICTACT Journal on Communication Technology, 2016
In the recent trend of network and technology, “Cryptography” and “Steganography” have emerged out as the essential elements of providing network security. Although Cryptography plays a major role in the fabrication and modification of the secret message
Smita Paira, Sourabh Chandra
doaj  

Adaptive Image Steganography Algorithm Based on Deep Reinforcement Learning [PDF]

open access: yesJisuanji gongcheng
This study proposes an Adaptive Image Steganography Algorithm based on Deep Reinforcement Learning (AISA-DRL) to realize a balance among lightweight steganography, optimal embedding positioning, and high hidden outputs. A lightweight secure steganography
Qing QIAN, Yong LONG, Zhongyuan JIANG, Chunhong DUAN, Hong WANG
doaj   +1 more source

Improving PARP inhibitor efficacy in bladder cancer without genetic BRCAness by combination with PLX51107

open access: yesMolecular Oncology, EarlyView.
Clinical trials on PARP inhibitors in urothelial carcinoma (UC) showed limited efficacy and a lack of predictive biomarkers. We propose SLFN5, SLFN11, and OAS1 as UC‐specific response predictors. We suggest Talazoparib as the better PARP inhibitor for UC than Olaparib.
Jutta Schmitz   +15 more
wiley   +1 more source

Hiding image into image with hybrid attention mechanism based on GANs

open access: yesIET Image Processing
Image steganography is the art of concealing secret information within images to prevent detection. In deep‐learning‐based image steganography, a common practice is to fuse the secret image with the cover image to directly generate the stego image ...
Yuling Zhu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy