Results 81 to 90 of about 30,382 (272)
We uncover a large variety of putative inhibitory ligand‐gated ion channels (LGICs) in the phylum Cnidaria, the sister group to all bilaterian animals. Phylogenetic analysis suggests a complex evolutionary history of inhibitory LGICs with diverse neurotransmitter ligands.
Abhilasha Ojha +13 more
wiley +1 more source
Design Protection Using Logic Encryption and Scan-Chain Obfuscation Techniques [PDF]
Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced to protect their designs from the threats posed by the foundries. Few of the threats are IP piracy, counterfeiting and reverse engineering. To overcome these,
V.A. Deepak +2 more
doaj +1 more source
Obfuscation in Bitcoin: Techniques and Politics
In the cryptographic currency Bitcoin, all transactions are recorded in the blockchain - a public, global, and immutable ledger. Because transactions are public, Bitcoin and its users employ obfuscation to maintain a degree of financial privacy. Critically, and in contrast to typical uses of obfuscation, in Bitcoin obfuscation is not aimed against the ...
Narayanan, Arvind, Möser, Malte
openaire +2 more sources
This study identifies GDF15+ TAMs as a cell subset mediating tumor regression after immunotherapy. Macrophage‐intrinsic GDF15 enhances phagocytosis and antigen cross‐presentation to CD8+ T cells through the NF‐κB signaling pathway, thereby inhibiting tumor progression.
Xinyu Zhou +9 more
wiley +1 more source
Identifying obfuscated code through graph-based semantic analysis of binary code
Protecting sensitive program content is a critical concern in various situations, ranging from legitimate use cases to unethical contexts. Obfuscation is one of the most used techniques to ensure such a protection.
Roxane Cohen +3 more
doaj +1 more source
Nigral dopaminergic (DA) neurons modulate and represent pain with a preference to a particular modality (mechanical) and laterality (contralateral), which are controlled by nigral GABAergic neurons. The pain modulation is mimicked by the nigro‐subthalamic projection and its downstream neurons, involving D2‐like receptors.
Ying Ji +13 more
wiley +1 more source
DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps
The Android packing techniques were originally used to pack and conceal important information of the apps to prevent malicious developers from deconstructing the software logic.
Caijun Sun +5 more
doaj +1 more source
Interest-Based Access Control for Content Centric Networks (extended version)
Content-Centric Networking (CCN) is an emerging network architecture designed to overcome limitations of the current IP-based Internet. One of the fundamental tenets of CCN is that data, or content, is a named and addressable entity in the network ...
Ghali, Cesar +3 more
core +1 more source
Postsynaptic Complexin Mediates Constitutive Exocytosis of Nicotinic Acetylcholine Receptor
Beyond its established presynaptic role, complexin is identified as a postsynaptic regulator of neurotransmitter receptor trafficking. By promoting constitutive and activity‐dependent exocytosis of nicotinic acetylcholine receptors, complexin controls spontaneous synaptic signaling at the C.
Ya Wang +4 more
wiley +1 more source
DNNobfus: a study on obfuscation-based edge-side model protection framework
The proliferation of artificial intelligence models has rendered them vulnerable to a myriad of security threats. The extensive integration of deep learning models into edge devices has introduced novel security challenges. Given the analogous structural
SONG Feiyang +6 more
doaj +3 more sources

