Results 71 to 80 of about 49,594 (257)

Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis

open access: yesComputers
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh   +4 more
doaj   +1 more source

Differential Data Analysis for Recommender Systems

open access: yes, 2013
We present techniques to characterize which data is important to a recommender system and which is not. Important data is data that contributes most to the accuracy of the recommendation algorithm, while less important data contributes less to the ...
Chow, Richard   +3 more
core   +1 more source

Textile Actuation Based on In‐Air Actuating Polypyrrole‐Based Tape Yarns for Wearable Soft Robotics: Toward On‐Body Applications

open access: yesAdvanced Robotics Research, EarlyView.
This work reports on the actuation behavior of CP‐based polypyrrole/PVdF TYs soaked in electrolyte/ionic liquids and woven actuators where such TYs are integrated. These studies are important toward the creation of on‐body applications such as wearable soft robotics, where textiles offer many advantages such as increased force, integrated electrical ...
Carin Backe   +4 more
wiley   +1 more source

Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53

open access: yesAdvanced Science, EarlyView.
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore   +20 more
wiley   +1 more source

A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation

open access: yes, 2015
QoS-based Web service recommendation has recently gained much attention for providing a promising way to help users find high-quality services. To facilitate such recommendations, existing studies suggest the use of collaborative filtering techniques for
He, Pinjia   +3 more
core   +1 more source

Context‐Dependent Role of GDF15: GDF15+ Tumor‐Associated Macrophages Suppress OSCC Progression by Enhancing Phagocytosis

open access: yesAdvanced Science, EarlyView.
This study identifies GDF15+ TAMs as a cell subset mediating tumor regression after immunotherapy. Macrophage‐intrinsic GDF15 enhances phagocytosis and antigen cross‐presentation to CD8+ T cells through the NF‐κB signaling pathway, thereby inhibiting tumor progression.
Xinyu Zhou   +9 more
wiley   +1 more source

Bilirubin as a Modulator of WNK1 Protein Signaling: Implications for Neuroinflammatory Diseases

open access: yesAdvanced Science, EarlyView.
ABSTRACT Previously regarded merely as a potentially harmful waste product of heme catabolism, bilirubin has now emerged as a pleiotropic molecule with potent antioxidant, anti‐inflammatory, and hormone‐like properties. Recent findings have revealed protective effects against cardiovascular, metabolic, autoimmune, and neoplastic diseases, as well as ...
Sri Jayanti   +3 more
wiley   +1 more source

DNNobfus: a study on obfuscation-based edge-side model protection framework

open access: yes网络与信息安全学报
The proliferation of artificial intelligence models has rendered them vulnerable to a myriad of security threats. The extensive integration of deep learning models into edge devices has introduced novel security challenges. Given the analogous structural
SONG Feiyang   +6 more
doaj   +3 more sources

Postsynaptic Complexin Mediates Constitutive Exocytosis of Nicotinic Acetylcholine Receptor

open access: yesAdvanced Science, EarlyView.
Beyond its established presynaptic role, complexin is identified as a postsynaptic regulator of neurotransmitter receptor trafficking. By promoting constitutive and activity‐dependent exocytosis of nicotinic acetylcholine receptors, complexin controls spontaneous synaptic signaling at the C.
Ya Wang   +4 more
wiley   +1 more source

The Effectiveness Of Bytecode Decompilation [PDF]

open access: yes
High-level bytecodes used by object-oriented managed execution environments make it easy to decompile them. This paper studies the reasons that make bytecode decompilers such efficient and presents basic obfuscation techniques as an efficient protection ...
Robert Enyedi
core  

Home - About - Disclaimer - Privacy