Results 91 to 100 of about 19,760 (270)
Protein complexes like KIBRA‐PKMζ are crucial for maintaining memories, forming month‐long protein traces in memory‐tagged neurons, but conventional RNA‐seq analysis fails to detect their transcript changes, leaving memory molecules undetected in the shadows of abundantly‐expressed genes.
Jiyeon Han +10 more
wiley +1 more source
Zhang et al. identify M7core, a critical cGAS‐STING pathway‐driven gene signature that is activated in most lupus patients’ blood and links to lupus disease severity, lymphopenia, and lupus nephritis. They further reveal the diagnostic and pathogenic characteristics of M7core and emphasize the importance of assessing pathway activity before initiating ...
Lele Zhang +13 more
wiley +1 more source
Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu +4 more
wiley +1 more source
Secure Proxy Re-Encryption Protocol for FANETs Resistant to Chosen-Ciphertext Attacks
In emergency situations, ensuring the secure transmission of medical information is critical. While existing schemes address on-road emergencies, off-road scenarios present unique challenges due to hazardous locations inaccessible to conventional ...
Hyun-A Park
doaj +1 more source
Schematic illustration of SiNDs composite materials synthesis and its internal photophysical process mechanism. And an AI‐assisted dynamic information encryption process. ABSTRACT Persistent luminescence materials typically encounter an intrinsic trade‐off between high phosphorescence quantum yield (PhQY) and ultralong phosphorescence lifetime.
Yulu Liu +9 more
wiley +1 more source
Background: The sharing of electronic health records among hospitals is crucial for ensuring consistent patient treatment. However, the process remains challenging due to the existence of varied systems, privacy concerns and interoperability issues.
Devaramane Yogaraj Ashwini +1 more
doaj +1 more source
Server-aided access control for cloud computing
With the massive diffusion of cloud computing,more and more sensitive data is being centralized into the cloud for sharing,which brings forth new challenges for the security and privacy of outsourced data.To address these challenges,the server-aided ...
WENG Jian,WENG Jia-si,LIUJia-nan,HOU Lin
doaj +1 more source
This review surveys nanoparticle‐based strategies to enhance adoptive cell therapy, particularly CAR‐T cell approaches, in solid tumor treatment. It describes how nanoparticles can improve tumor immunogenicity and T‐cell infiltration while reducing toxicity, and how they enable in vivo CAR‐T cell generation.
Erica Frostegård +19 more
wiley +1 more source
Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation. [PDF]
Lin HY, Tsai TT, Ting PY, Fan YR.
europepmc +1 more source
Proxy re‐encryption via indistinguishability obfuscation
AbstractIn this paper, we present a proxy re‐encryption (PRE) scheme via an indistinguishability obfuscation () by adding two algorithms to the public key encryption scheme by Sahai and Waters' (STOC 2014). Although a re‐encryption function from one public key to another can be considered as a randomized functionality on the underlying plaintext and ...
Satsuya Ohata, Kanta Matsuura
openaire +1 more source

