Results 51 to 60 of about 25,319 (281)
CryptGraph: Privacy Preserving Graph Analytics on Encrypted Graph [PDF]
Many graph mining and analysis services have been deployed on the cloud, which can alleviate users from the burden of implementing and maintaining graph algorithms. However, putting graph analytics on the cloud can invade users' privacy.
Xie, Pengtao, Xing, Eric
core
This study identifies the HDAC6/GATA4/HtrA1 axis as a critical driver of cellular senescence in the inner ear. GATA4 nuclear translocation, facilitated by HDAC6 downregulation, transcriptionally activates HtrA1, promoting hair cell senescence, SASP, and audio‐vestibular dysfunction in models of Ménière's disease and age‐related audio‐vestibular ...
Na Zhang +16 more
wiley +1 more source
Recent Trends in Metabolomics by NMR Spectroscopy
AI tools were applied to analyze more than 5 000 publications indexed in Scopus (2018–2025), identifying key trends and research directions in NMR‐based metabolomics. The artificial intelligence‐assisted workflow classified papers into six main fields of application, human health, food and nutrition, veterinary science, plants, environment, and ...
Giorgio Di Paco +6 more
wiley +2 more sources
Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network
Privacy-preserving outsourcing algorithms for feature extraction not only reduce users' storage and computation overhead but also preserve the image privacy.
Xiaoqin Feng +4 more
doaj +1 more source
Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values [PDF]
Two-party secure function evaluation (SFE) has become significantly more feasible, even on resource-constrained devices, because of advances in server-aided computation systems.
Butler, Kevin +3 more
core
Secure outsourcing of scientific computations [PDF]
We investigate the outsourcing of numerical and scientific computations using the following framework: A customer who needs computations done but lacks the computational resources (computing power, appropriate software, or programming expertise) to do these locally would like to use an external agent to perform these computations. This currently arises
Mikhail J. Atallah +3 more
openaire +1 more source
Schematic diagram of our study showing that highly expressed POU2F1 in colorectal cancer (CRC) can directly accelerate the cytosolic lactate export to decrease PPP1R11 lactylation at K59, thereby attenuating the E3 ligase enzyme activity and protein stability of PPP1R11, which inhibits the ubiquitination of MDR2 at K413 and K538 but increases the ...
Longzheng Xia +8 more
wiley +1 more source
Although tremendous revolution has been made in the emerging cloud computing technologies over digital devices, privacy gradually becomes a big concern in outsourcing computation. Homomorphic encryption has been proposed to facilitate the preservation of
Jialin Li, Penghao Lu, Xuemin Lin
doaj +1 more source
Current technologies for spinal cord optogenetic stimulation rely on external power sources and face reliability constraints in freely behaving animals. Here, a fully implantable, battery‐powered optoelectronic device is introduced, enabling operation in any selected environment with wireless recharging for months‐long stimulation.
Shahriar Shalileh +8 more
wiley +1 more source
A hybrid cloud read aligner based on MinHash and kmer voting that preserves privacy
Outsourcing computation for genomic data processing offers the ability to allocate massive computing power and storage on demand. Here, Popic and Batzoglou develop a hybrid cloud aligner for sequence read mapping that preserves privacy with competitive ...
Victoria Popic, Serafim Batzoglou
doaj +1 more source

