Results 121 to 130 of about 2,252,336 (338)

Development of a Prediction Model for Progression Risk in High‐Grade Gliomas Based on Habitat Radiomics and Pathomics

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To investigate the value of constructing models based on habitat radiomics and pathomics for predicting the risk of progression in high‐grade gliomas. Methods This study conducted a retrospective analysis of preoperative magnetic resonance (MR) images and pathological sections from 72 patients diagnosed with high‐grade gliomas (52 ...
Yuchen Zhu   +14 more
wiley   +1 more source

Clinical Spectrum and Outcomes of SOX1 Antibody‐Associated Paraneoplastic Neurological Syndromes: A Chinese Cohort Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background SOX1 antibody‐positive paraneoplastic neurological syndromes (PNS) exhibit significant population‐specific clinical heterogeneity. While Western cohorts predominantly manifest Lambert‐Eaton myasthenic syndrome (65%–80%), comprehensive clinical characterization and treatment response data in Asian populations remain critically ...
Jin‐Long Ye   +11 more
wiley   +1 more source

Remote Assessment of Ataxia Severity in SCA3 Across Multiple Centers and Time Points

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Spinocerebellar ataxia type 3 (SCA3) is a genetically defined ataxia. The Scale for Assessment and Rating of Ataxia (SARA) is a clinician‐reported outcome that measures ataxia severity at a single time point. In its standard application, SARA fails to capture short‐term fluctuations, limiting its sensitivity in trials.
Marcus Grobe‐Einsler   +20 more
wiley   +1 more source

Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples

open access: yesIEEE Access, 2019
Deep Neural Networks (DNNs) have been gaining state-of-the-art achievement compared with many traditional Machine Learning (ML) models in diverse fields. However, adversarial examples challenge the further deployment and application of DNNs. Analysis has
Yixiang Wang   +5 more
doaj   +1 more source

Clustering Algorithm Reveals Dopamine‐Motor Mismatch in Cognitively Preserved Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To explore the relationship between dopaminergic denervation and motor impairment in two de novo Parkinson's disease (PD) cohorts. Methods n = 249 PD patients from Parkinson's Progression Markers Initiative (PPMI) and n = 84 from an external clinical cohort.
Rachele Malito   +14 more
wiley   +1 more source

A Systematic Review on the Practicality of Poisoning Defenses in Federated IoT Systems

open access: yesIEEE Access
Federated Learning (FL) is increasingly vital for Internet of Things (IoT) applications, yet it remains vulnerable to poisoning attacks that compromise model integrity.
Anthony Jacklingo Kwame Quansah Junior   +6 more
doaj   +1 more source

Privacy patterns

open access: yes2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016
8 pages, 12 August 2016. To be presented orally at PST 2016 (http://pst2016.unitec.ac.nz/) on 13 December 2016.
openaire   +2 more sources

Five‐Year Disease Progression in Synuclein Seeding Positive Sporadic Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To provide a comprehensive description of disease progression in synuclein seeding assay (SAA) positive sporadic Parkinson Disease participants, using Neuronal Synuclein Disease integrated biological and functional impairment staging framework.
Paulina Gonzalez‐Latapi   +19 more
wiley   +1 more source

Detecting Android Locker-Ransomware on Chinese Social Networks

open access: yesIEEE Access, 2019
In recent years, an increasing amount of locker-ransomware has been posing a great threat to the Android platform as well as users' properties. Locker-ransomware blackmails victims for ransom by compulsorily locking the devices.
Dan Su   +3 more
doaj   +1 more source

Amplifying Privacy in Privacy Amplification [PDF]

open access: yes, 2014
We study the classical problem of privacy amplification, where two parties Alice and Bob share a weak secret X of min-entropy k, and wish to agree on secret key R of length m over a public communication channel completely controlled by a computationally unbounded attacker Eve.
Divesh Aggarwal   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy