Results 41 to 50 of about 4,735 (235)

Secure Single-Server Nearly-Identical Image Deduplication [PDF]

open access: yes2020 29th International Conference on Computer Communications and Networks (ICCCN), 2020
Cloud computing is often utilized for file storage. Clients of cloud storage services want to ensure the privacy of their data, and both clients and servers want to use as little storage as possible. Cross-user deduplication is one method to reduce the amount of storage a server uses.
Takeshita, Jonathan   +2 more
openaire   +2 more sources

The ITGB2‐COPS3‐SOX2 Axis and SOX2 Liquid‐Liquid Phase Separation: Dual Mechanisms Governing Osteosarcoma Stemness

open access: yesAdvanced Science, EarlyView.
Osteosarcoma stemness is driven by the ITGB2‐COPS3‐SOX2 signaling axis. This study reveals that nuclear COPS3 stabilizes SOX2, which in turn undergoes liquid‐liquid phase separation to promote stemness. Based on this mechanism, a novel COPS3 inhibitor, Z‐5891, was developed, effectively suppressing tumor growth and stemness in vivo, offering a ...
Lei Guo   +7 more
wiley   +1 more source

Secure Encrypted Data With Authorized Deduplication in Cloud

open access: yesIEEE Access, 2019
In this paper, we propose a novel secure role re-encryption system (SRRS), which is based on convergent encryption and the role re-encryption algorithm to prevent the privacy data leakage in cloud and it also achieves the authorized deduplication and ...
Jinbo Xiong   +4 more
doaj   +1 more source

Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search

open access: yesIEEE Access, 2023
In the current era of information explosion, users’ demand for data storage is increasing, and data on the cloud has become the first choice of users and enterprises.
Le Li   +3 more
doaj   +1 more source

Automatically Defining Protein Words for Diverse Functional Predictions Based on Attention Analysis of a Protein Language Model

open access: yesAdvanced Science, EarlyView.
Understanding protein sequence–function relationships remains challenging due to poorly defined motifs and limited residue‐level annotations. An annotation‐agnostic framework is introduced that segments protein sequences into “protein words” using attention patterns from protein language models.
Hedi Chen   +9 more
wiley   +1 more source

A Reliability-Aware Approach for Resource Efficient Virtual Network Function Deployment [PDF]

open access: yes, 2018
OAPA Network function virtualization (NFV) is a promising technique aimed at reducing capital expenditures (CAPEX) and operating expenditures (OPEX), and improving the flexibility and scalability of an entire network.
Chang, V   +7 more
core   +1 more source

Large Language Model in Materials Science: Roles, Challenges, and Strategic Outlook

open access: yesAdvanced Intelligent Discovery, EarlyView.
Large language models (LLMs) are reshaping materials science. Acting as Oracle, Surrogate, Quant, and Arbiter, they now extract knowledge, predict properties, gauge risk, and steer decisions within a traceable loop. Overcoming data heterogeneity, hallucinations, and poor interpretability demands domain‐adapted models, cross‐modal data standards, and ...
Jinglan Zhang   +4 more
wiley   +1 more source

A novel approach to data integrity auditing in PCS: Minimising any Trust on Third Parties (DIA-MTTP).

open access: yesPLoS ONE, 2021
Data Integrity Auditing (DIA) is a security service for verifying the integrity of outsourced data in Public Cloud Storage (PCS) by users or by Third-Party Auditors (TPAs) on behalf of the users. This paper proposes a novel DIA framework, called DIA-MTTP.
Reem Almarwani   +2 more
doaj   +1 more source

A Generalizable Transformer Framework for Gene Regulatory Network Inference from Single‐Cell Transcriptomes

open access: yesAdvanced Intelligent Systems, EarlyView.
FTGRN introduces an LLM‐enhanced framework for gene regulatory network inference through a two‐stage workflow. It combines a Transformer‐based model, pretrained on GPT‐4 derived gene embeddings and regulatory knowledge, with a fine‐tuning stage utilizing single‐cell RNA‐seq data.
Guangzheng Weng   +7 more
wiley   +1 more source

A software approach to defeating side channels in last-level caches

open access: yes, 2016
We present a software approach to mitigate access-driven side-channel attacks that leverage last-level caches (LLCs) shared across cores to leak information between security domains (e.g., tenants in a cloud).
Arcangeli A.   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy