Results 151 to 160 of about 10,571 (279)
SPKSE: secure public key searchable encryption withstand keyword guessing attacks. [PDF]
Shi D, Xu M, Cao C, Cheng H.
europepmc +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
A compact public key encryption with equality test for lattice in cloud computing. [PDF]
He J, Ye Q, Yang Z, Wang S, Wang J.
europepmc +1 more source
Cubebene‐related sesquiterpenes, found across diverse biological sources, exhibit promising pharmacological activities, including anti‐inflammatory, neuroprotective, and anticancer effects. This review highlights their molecular diversity, ADME profiles, and predicted multitarget interactions, underscoring their therapeutic relevance and potential in ...
Khadija Boualam +4 more
wiley +1 more source
Privacy preservation in blockchain-based healthcare data sharing: A systematic review. [PDF]
Li K, Lohachab A, Dumontier M, Urovi V.
europepmc +1 more source
EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems. [PDF]
Chen Y, Dong G, Xu C, Hao Y, Zhao Y.
europepmc +1 more source
Ivermectin Toxicity in Humans and Animals: Clinical Spectrum, Mechanisms, and Management
ABSTRACT Ivermectin is a widely used macrocyclic lactone with established efficacy against a broad range of parasitic infections in humans and animals and a long‐standing reputation for clinical safety. However, increasing evidence indicates that ivermectin can produce clinically relevant toxicity under specific conditions, particularly involving the ...
Serkan Yilmaz +3 more
wiley +1 more source
To address the challenges of secure data retrieval and sharing in the industrial Internet of things (IIoT), as well as the vulnerability to offline keyword guessing attacks when using public-key encrypted indexes, a blockchain-based user-friendly data ...
ZHANG Bo, LI Zhecheng, XU Xingshuai
doaj
A secure data sharing scheme based on broadcast signcryption in data center. [PDF]
Dong R, Li Y, Zhu L.
europepmc +1 more source
A Network‐Based Approach to Understanding Key Signaling Pathways in Intervertebral Disc Biology
A literature‐based signaling network capturing the most relevant pathways in human nucleus pulposus cells was first constructed from curated biological evidence. The network was then translated into a system of ordinary differential equations to derive steady‐state solutions and define median baseline activity levels.
Sofia Tseranidou +11 more
wiley +1 more source

