Results 51 to 60 of about 25,319 (281)

CryptGraph: Privacy Preserving Graph Analytics on Encrypted Graph [PDF]

open access: yes, 2015
Many graph mining and analysis services have been deployed on the cloud, which can alleviate users from the burden of implementing and maintaining graph algorithms. However, putting graph analytics on the cloud can invade users' privacy.
Xie, Pengtao, Xing, Eric
core  

GATA4‐Driven Transcription of HtrA1 Promotes Cellular Senescence in Ménière's Disease and Age‐Related Audio‐Vestibular Dysfunction

open access: yesAdvanced Science, EarlyView.
This study identifies the HDAC6/GATA4/HtrA1 axis as a critical driver of cellular senescence in the inner ear. GATA4 nuclear translocation, facilitated by HDAC6 downregulation, transcriptionally activates HtrA1, promoting hair cell senescence, SASP, and audio‐vestibular dysfunction in models of Ménière's disease and age‐related audio‐vestibular ...
Na Zhang   +16 more
wiley   +1 more source

Recent Trends in Metabolomics by NMR Spectroscopy

open access: yesAngewandte Chemie, EarlyView.
AI tools were applied to analyze more than 5 000 publications indexed in Scopus (2018–2025), identifying key trends and research directions in NMR‐based metabolomics. The artificial intelligence‐assisted workflow classified papers into six main fields of application, human health, food and nutrition, veterinary science, plants, environment, and ...
Giorgio Di Paco   +6 more
wiley   +2 more sources

Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network

open access: yesIEEE Access, 2018
Privacy-preserving outsourcing algorithms for feature extraction not only reduce users' storage and computation overhead but also preserve the image privacy.
Xiaoqin Feng   +4 more
doaj   +1 more source

Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values [PDF]

open access: yes, 2015
Two-party secure function evaluation (SFE) has become significantly more feasible, even on resource-constrained devices, because of advances in server-aided computation systems.
Butler, Kevin   +3 more
core  

Secure outsourcing of scientific computations [PDF]

open access: yes, 2002
We investigate the outsourcing of numerical and scientific computations using the following framework: A customer who needs computations done but lacks the computational resources (computing power, appropriate software, or programming expertise) to do these locally would like to use an external agent to perform these computations. This currently arises
Mikhail J. Atallah   +3 more
openaire   +1 more source

POU2F1 Promotes Chemoresistance in Colorectal Cancer Cells via Attenuates the MDR2 Degradation Mediated by PPP1R11 Lactylation

open access: yesAdvanced Science, EarlyView.
Schematic diagram of our study showing that highly expressed POU2F1 in colorectal cancer (CRC) can directly accelerate the cytosolic lactate export to decrease PPP1R11 lactylation at K59, thereby attenuating the E3 ligase enzyme activity and protein stability of PPP1R11, which inhibits the ubiquitination of MDR2 at K413 and K538 but increases the ...
Longzheng Xia   +8 more
wiley   +1 more source

Secure and Evaluable Clustering Based on a Multifunctional and Privacy-Preserving Outsourcing Computation Toolkit

open access: yesIEEE Access, 2022
Although tremendous revolution has been made in the emerging cloud computing technologies over digital devices, privacy gradually becomes a big concern in outsourcing computation. Homomorphic encryption has been proposed to facilitate the preservation of
Jialin Li, Penghao Lu, Xuemin Lin
doaj   +1 more source

Wireless, Adaptable and Fully Implantable Battery‐powered Devices for Optical Stimulation of the Spinal Cord in Small Rodents

open access: yesAdvanced Science, EarlyView.
Current technologies for spinal cord optogenetic stimulation rely on external power sources and face reliability constraints in freely behaving animals. Here, a fully implantable, battery‐powered optoelectronic device is introduced, enabling operation in any selected environment with wireless recharging for months‐long stimulation.
Shahriar Shalileh   +8 more
wiley   +1 more source

A hybrid cloud read aligner based on MinHash and kmer voting that preserves privacy

open access: yesNature Communications, 2017
Outsourcing computation for genomic data processing offers the ability to allocate massive computing power and storage on demand. Here, Popic and Batzoglou develop a hybrid cloud aligner for sequence read mapping that preserves privacy with competitive ...
Victoria Popic, Serafim Batzoglou
doaj   +1 more source

Home - About - Disclaimer - Privacy