Results 81 to 90 of about 30,382 (272)

Functional Analysis of Ligand‐Gated Chloride Channels in a Cnidarian Sheds Light on the Evolution of Inhibitory Signaling

open access: yesAdvanced Science, EarlyView.
We uncover a large variety of putative inhibitory ligand‐gated ion channels (LGICs) in the phylum Cnidaria, the sister group to all bilaterian animals. Phylogenetic analysis suggests a complex evolutionary history of inhibitory LGICs with diverse neurotransmitter ligands.
Abhilasha Ojha   +13 more
wiley   +1 more source

Design Protection Using Logic Encryption and Scan-Chain Obfuscation Techniques [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2019
Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced to protect their designs from the threats posed by the foundries. Few of the threats are IP piracy, counterfeiting and reverse engineering. To overcome these,
V.A. Deepak   +2 more
doaj   +1 more source

Obfuscation in Bitcoin: Techniques and Politics

open access: yes, 2017
In the cryptographic currency Bitcoin, all transactions are recorded in the blockchain - a public, global, and immutable ledger. Because transactions are public, Bitcoin and its users employ obfuscation to maintain a degree of financial privacy. Critically, and in contrast to typical uses of obfuscation, in Bitcoin obfuscation is not aimed against the ...
Narayanan, Arvind, Möser, Malte
openaire   +2 more sources

Context‐Dependent Role of GDF15: GDF15+ Tumor‐Associated Macrophages Suppress OSCC Progression by Enhancing Phagocytosis

open access: yesAdvanced Science, EarlyView.
This study identifies GDF15+ TAMs as a cell subset mediating tumor regression after immunotherapy. Macrophage‐intrinsic GDF15 enhances phagocytosis and antigen cross‐presentation to CD8+ T cells through the NF‐κB signaling pathway, thereby inhibiting tumor progression.
Xinyu Zhou   +9 more
wiley   +1 more source

Identifying obfuscated code through graph-based semantic analysis of binary code

open access: yesApplied Network Science
Protecting sensitive program content is a critical concern in various situations, ranging from legitimate use cases to unethical contexts. Obfuscation is one of the most used techniques to ensure such a protection.
Roxane Cohen   +3 more
doaj   +1 more source

Nigra‐Subthalamic Dopaminergic Circuitry Modulates and Represents Distinct Pain Modality in Physiological and Pain States in Mice

open access: yesAdvanced Science, EarlyView.
Nigral dopaminergic (DA) neurons modulate and represent pain with a preference to a particular modality (mechanical) and laterality (contralateral), which are controlled by nigral GABAergic neurons. The pain modulation is mimicked by the nigro‐subthalamic projection and its downstream neurons, involving D2‐like receptors.
Ying Ji   +13 more
wiley   +1 more source

DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps

open access: yesIEEE Access, 2020
The Android packing techniques were originally used to pack and conceal important information of the apps to prevent malicious developers from deconstructing the software logic.
Caijun Sun   +5 more
doaj   +1 more source

Interest-Based Access Control for Content Centric Networks (extended version)

open access: yes, 2015
Content-Centric Networking (CCN) is an emerging network architecture designed to overcome limitations of the current IP-based Internet. One of the fundamental tenets of CCN is that data, or content, is a named and addressable entity in the network ...
Ghali, Cesar   +3 more
core   +1 more source

Postsynaptic Complexin Mediates Constitutive Exocytosis of Nicotinic Acetylcholine Receptor

open access: yesAdvanced Science, EarlyView.
Beyond its established presynaptic role, complexin is identified as a postsynaptic regulator of neurotransmitter receptor trafficking. By promoting constitutive and activity‐dependent exocytosis of nicotinic acetylcholine receptors, complexin controls spontaneous synaptic signaling at the C.
Ya Wang   +4 more
wiley   +1 more source

DNNobfus: a study on obfuscation-based edge-side model protection framework

open access: yes网络与信息安全学报
The proliferation of artificial intelligence models has rendered them vulnerable to a myriad of security threats. The extensive integration of deep learning models into edge devices has introduced novel security challenges. Given the analogous structural
SONG Feiyang   +6 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy