Results 131 to 140 of about 680,970 (356)
Efficient black-box attack with surrogate models and multiple universal adversarial perturbations
Deep learning models are inherently vulnerable to adversarial examples, particularly in black-box settings where attackers have limited knowledge of the target model.
Tao Ma +4 more
doaj +1 more source
Cell surface interactome analysis identifies TSPAN4 as a negative regulator of PD‐L1 in melanoma
Using cell surface proximity biotinylation, we identified tetraspanin TSPAN4 within the PD‐L1 interactome of melanoma cells. TSPAN4 negatively regulates PD‐L1 expression and lateral mobility by limiting its interaction with CMTM6 and promoting PD‐L1 degradation.
Guus A. Franken +7 more
wiley +1 more source
LDAcoop: Integrating non‐linear population dynamics into the analysis of clonogenic growth in vitro
Limiting dilution assays (LDAs) quantify clonogenic growth by seeding serial dilutions of cells and scoring wells for colony formation. The fraction of negative wells is plotted against cells seeded and analyzed using the non‐linear modeling of LDAcoop.
Nikko Brix +13 more
wiley +1 more source
We show that the majority of the 18 analyzed recurrent cancer‐associated ERBB4 mutations are transforming. The most potent mutations are activating, co‐operate with other ERBB receptors, and are sensitive to pan‐ERBB inhibitors. Activating ERBB4 mutations also promote therapy resistance in EGFR‐mutant lung cancer.
Veera K. Ojala +15 more
wiley +1 more source
What's beyond query by example?
Over the last ten years, the crucial problem of information retrieval in multimedia documents has boosted research activities in the field of visual appearance indexing and retrieval by content. In the early research years, the concept of the «query by visual example» (QBVE) has been proposed and shown to be relevant for visual information retrieval ...
Boujemaa, Nozha +2 more
openaire +1 more source
Single circulating tumor cells (sCTCs) from high‐grade serous ovarian cancer patients were enriched, imaged, and genomically profiled using WGA and NGS at different time points during treatment. sCTCs revealed enrichment of alterations in Chromosomes 2, 7, and 12 as well as persistent or emerging oncogenic CNAs, supporting sCTC identity.
Carolin Salmon +9 more
wiley +1 more source
Query-by-example keyword spotting using long short-term memory networks
Guoguo Chen +2 more
semanticscholar +1 more source
Tumor mutational burden as a determinant of metastatic dissemination patterns
This study performed a comprehensive analysis of genomic data to elucidate whether metastasis in certain organs share genetic characteristics regardless of cancer type. No robust mutational patterns were identified across different metastatic locations and cancer types.
Eduardo Candeal +4 more
wiley +1 more source
A query by example approach for XML querying
XML, as a general-purpose annotation system for creating custom markup languages, is becoming more and more important. XML annotations give structure to plain documents and help to interpret their content, making them human or machine readable. However, mechanisms to pretty-print those annotated documents or process them in order to extract information
Ferreira, Flávio Xavier +4 more
openaire +1 more source
Tumour–host interactions in Drosophila: mechanisms in the tumour micro‐ and macroenvironment
This review examines how tumour–host crosstalk takes place at multiple levels of biological organisation, from local cell competition and immune crosstalk to organism‐wide metabolic and physiological collapse. Here, we integrate findings from Drosophila melanogaster studies that reveal conserved mechanisms through which tumours hijack host systems to ...
José Teles‐Reis, Tor Erik Rusten
wiley +1 more source

