Results 91 to 100 of about 19,760 (270)

Persistently Increased Expression of PKMzeta and Unbiased Gene Expression Profiles Identify Hippocampal Molecular Traces of a Long‐Term Active Place Avoidance Memory and “Shadow” Proteins

open access: yesAdvanced Science, EarlyView.
Protein complexes like KIBRA‐PKMζ are crucial for maintaining memories, forming month‐long protein traces in memory‐tagged neurons, but conventional RNA‐seq analysis fails to detect their transcript changes, leaving memory molecules undetected in the shadows of abundantly‐expressed genes.
Jiyeon Han   +10 more
wiley   +1 more source

Integrative Analyses Identify a cGAS‐STING Pathway‐Driven Signature With Context‐Dependent Roles in Systemic Lupus Erythematosus

open access: yesAdvanced Science, EarlyView.
Zhang et al. identify M7core, a critical cGAS‐STING pathway‐driven gene signature that is activated in most lupus patients’ blood and links to lupus disease severity, lymphopenia, and lupus nephritis. They further reveal the diagnostic and pathogenic characteristics of M7core and emphasize the importance of assessing pathway activity before initiating ...
Lele Zhang   +13 more
wiley   +1 more source

Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy

open access: yesAdvanced Science, EarlyView.
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu   +4 more
wiley   +1 more source

Secure Proxy Re-Encryption Protocol for FANETs Resistant to Chosen-Ciphertext Attacks

open access: yesApplied Sciences
In emergency situations, ensuring the secure transmission of medical information is critical. While existing schemes address on-road emergencies, off-road scenarios present unique challenges due to hazardous locations inaccessible to conventional ...
Hyun-A Park
doaj   +1 more source

Urea‐Formaldehyde Resin Confined Silicon Nanodots Composites: High‐Performance and Ultralong Persistent Luminescence for Dynamic AI Information Encryption

open access: yesAdvanced Science, EarlyView.
Schematic illustration of SiNDs composite materials synthesis and its internal photophysical process mechanism. And an AI‐assisted dynamic information encryption process. ABSTRACT Persistent luminescence materials typically encounter an intrinsic trade‐off between high phosphorescence quantum yield (PhQY) and ultralong phosphorescence lifetime.
Yulu Liu   +9 more
wiley   +1 more source

Blockchain-Based Framework for Enhancing Interoperability and Security in EHR Exchange Using Lightweight ECC Proxy Re-Encryption

open access: yesActa Informatica Pragensia
Background: The sharing of electronic health records among hospitals is crucial for ensuring consistent patient treatment. However, the process remains challenging due to the existence of varied systems, privacy concerns and interoperability issues.
Devaramane Yogaraj Ashwini   +1 more
doaj   +1 more source

Server-aided access control for cloud computing

open access: yes网络与信息安全学报, 2016
With the massive diffusion of cloud computing,more and more sensitive data is being centralized into the cloud for sharing,which brings forth new challenges for the security and privacy of outsourced data.To address these challenges,the server-aided ...
WENG Jian,WENG Jia-si,LIUJia-nan,HOU Lin
doaj   +1 more source

Nanomedicine Meets Immunotherapy: Advancing Adoptive Cell Therapy with Nanoparticles in the Treatment of Cancer with Sustainability Perspectives

open access: yesAdvanced Science, EarlyView.
This review surveys nanoparticle‐based strategies to enhance adoptive cell therapy, particularly CAR‐T cell approaches, in solid tumor treatment. It describes how nanoparticles can improve tumor immunogenicity and T‐cell infiltration while reducing toxicity, and how they enable in vivo CAR‐T cell generation.
Erica Frostegård   +19 more
wiley   +1 more source

Proxy re‐encryption via indistinguishability obfuscation

open access: yesSecurity and Communication Networks, 2016
AbstractIn this paper, we present a proxy re‐encryption (PRE) scheme via an indistinguishability obfuscation () by adding two algorithms to the public key encryption scheme by Sahai and Waters' (STOC 2014). Although a re‐encryption function from one public key to another can be considered as a randomized functionality on the underlying plaintext and ...
Satsuya Ohata, Kanta Matsuura
openaire   +1 more source

Home - About - Disclaimer - Privacy