Results 71 to 80 of about 49,594 (257)
Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh +4 more
doaj +1 more source
Differential Data Analysis for Recommender Systems
We present techniques to characterize which data is important to a recommender system and which is not. Important data is data that contributes most to the accuracy of the recommendation algorithm, while less important data contributes less to the ...
Chow, Richard +3 more
core +1 more source
This work reports on the actuation behavior of CP‐based polypyrrole/PVdF TYs soaked in electrolyte/ionic liquids and woven actuators where such TYs are integrated. These studies are important toward the creation of on‐body applications such as wearable soft robotics, where textiles offer many advantages such as increased force, integrated electrical ...
Carin Backe +4 more
wiley +1 more source
Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore +20 more
wiley +1 more source
A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation
QoS-based Web service recommendation has recently gained much attention for providing a promising way to help users find high-quality services. To facilitate such recommendations, existing studies suggest the use of collaborative filtering techniques for
He, Pinjia +3 more
core +1 more source
This study identifies GDF15+ TAMs as a cell subset mediating tumor regression after immunotherapy. Macrophage‐intrinsic GDF15 enhances phagocytosis and antigen cross‐presentation to CD8+ T cells through the NF‐κB signaling pathway, thereby inhibiting tumor progression.
Xinyu Zhou +9 more
wiley +1 more source
Bilirubin as a Modulator of WNK1 Protein Signaling: Implications for Neuroinflammatory Diseases
ABSTRACT Previously regarded merely as a potentially harmful waste product of heme catabolism, bilirubin has now emerged as a pleiotropic molecule with potent antioxidant, anti‐inflammatory, and hormone‐like properties. Recent findings have revealed protective effects against cardiovascular, metabolic, autoimmune, and neoplastic diseases, as well as ...
Sri Jayanti +3 more
wiley +1 more source
DNNobfus: a study on obfuscation-based edge-side model protection framework
The proliferation of artificial intelligence models has rendered them vulnerable to a myriad of security threats. The extensive integration of deep learning models into edge devices has introduced novel security challenges. Given the analogous structural
SONG Feiyang +6 more
doaj +3 more sources
Postsynaptic Complexin Mediates Constitutive Exocytosis of Nicotinic Acetylcholine Receptor
Beyond its established presynaptic role, complexin is identified as a postsynaptic regulator of neurotransmitter receptor trafficking. By promoting constitutive and activity‐dependent exocytosis of nicotinic acetylcholine receptors, complexin controls spontaneous synaptic signaling at the C.
Ya Wang +4 more
wiley +1 more source
The Effectiveness Of Bytecode Decompilation [PDF]
High-level bytecodes used by object-oriented managed execution environments make it easy to decompile them. This paper studies the reasons that make bytecode decompilers such efficient and presents basic obfuscation techniques as an efficient protection ...
Robert Enyedi
core

