Results 41 to 50 of about 4,735 (235)
Secure Single-Server Nearly-Identical Image Deduplication [PDF]
Cloud computing is often utilized for file storage. Clients of cloud storage services want to ensure the privacy of their data, and both clients and servers want to use as little storage as possible. Cross-user deduplication is one method to reduce the amount of storage a server uses.
Takeshita, Jonathan +2 more
openaire +2 more sources
Osteosarcoma stemness is driven by the ITGB2‐COPS3‐SOX2 signaling axis. This study reveals that nuclear COPS3 stabilizes SOX2, which in turn undergoes liquid‐liquid phase separation to promote stemness. Based on this mechanism, a novel COPS3 inhibitor, Z‐5891, was developed, effectively suppressing tumor growth and stemness in vivo, offering a ...
Lei Guo +7 more
wiley +1 more source
Secure Encrypted Data With Authorized Deduplication in Cloud
In this paper, we propose a novel secure role re-encryption system (SRRS), which is based on convergent encryption and the role re-encryption algorithm to prevent the privacy data leakage in cloud and it also achieves the authorized deduplication and ...
Jinbo Xiong +4 more
doaj +1 more source
Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search
In the current era of information explosion, users’ demand for data storage is increasing, and data on the cloud has become the first choice of users and enterprises.
Le Li +3 more
doaj +1 more source
Understanding protein sequence–function relationships remains challenging due to poorly defined motifs and limited residue‐level annotations. An annotation‐agnostic framework is introduced that segments protein sequences into “protein words” using attention patterns from protein language models.
Hedi Chen +9 more
wiley +1 more source
A Reliability-Aware Approach for Resource Efficient Virtual Network Function Deployment [PDF]
OAPA Network function virtualization (NFV) is a promising technique aimed at reducing capital expenditures (CAPEX) and operating expenditures (OPEX), and improving the flexibility and scalability of an entire network.
Chang, V +7 more
core +1 more source
Large Language Model in Materials Science: Roles, Challenges, and Strategic Outlook
Large language models (LLMs) are reshaping materials science. Acting as Oracle, Surrogate, Quant, and Arbiter, they now extract knowledge, predict properties, gauge risk, and steer decisions within a traceable loop. Overcoming data heterogeneity, hallucinations, and poor interpretability demands domain‐adapted models, cross‐modal data standards, and ...
Jinglan Zhang +4 more
wiley +1 more source
Data Integrity Auditing (DIA) is a security service for verifying the integrity of outsourced data in Public Cloud Storage (PCS) by users or by Third-Party Auditors (TPAs) on behalf of the users. This paper proposes a novel DIA framework, called DIA-MTTP.
Reem Almarwani +2 more
doaj +1 more source
FTGRN introduces an LLM‐enhanced framework for gene regulatory network inference through a two‐stage workflow. It combines a Transformer‐based model, pretrained on GPT‐4 derived gene embeddings and regulatory knowledge, with a fine‐tuning stage utilizing single‐cell RNA‐seq data.
Guangzheng Weng +7 more
wiley +1 more source
A software approach to defeating side channels in last-level caches
We present a software approach to mitigate access-driven side-channel attacks that leverage last-level caches (LLCs) shared across cores to leak information between security domains (e.g., tenants in a cloud).
Arcangeli A. +6 more
core +1 more source

