Results 41 to 50 of about 19,937 (276)

Artificial Intelligence‐Assisted Workflow for Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling

open access: yesAdvanced Materials, EarlyView.
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll   +19 more
wiley   +1 more source

Software watermarking scheme with cloud computing constraints

open access: yes网络与信息安全学报, 2016
A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the ...
Guang SUN   +6 more
doaj   +3 more sources

Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey [PDF]

open access: yes, 2015
Malwares are big threat to digital world and evolving with high complexity. It can penetrate networks, steal confidential information from computers, bring down servers and can cripple infrastructures etc.
Sahay, S. K., Sharma, Ashu
core   +1 more source

On the Concept of Software Obfuscation in Computer Security

open access: yes, 2007
Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents extracting of some valuable information from the text of a program.
Nikolay Kuzurin   +3 more
openaire   +1 more source

Textile Actuation Based on In‐Air Actuating Polypyrrole‐Based Tape Yarns for Wearable Soft Robotics: Toward On‐Body Applications

open access: yesAdvanced Robotics Research, EarlyView.
This work reports on the actuation behavior of CP‐based polypyrrole/PVdF TYs soaked in electrolyte/ionic liquids and woven actuators where such TYs are integrated. These studies are important toward the creation of on‐body applications such as wearable soft robotics, where textiles offer many advantages such as increased force, integrated electrical ...
Carin Backe   +4 more
wiley   +1 more source

The method of generation program code with indistinguishable functionality

open access: yesБезопасность информационных технологий, 2017
The paper presents an obfuscation problem, in which indistinguishability is considered relatively to programs with distinguishable functionality. The functionality remains undisclosed owing to unknown parameters in the program’s input.
Mikhail Andreevich Styugin
doaj   +1 more source

Targeting UXS1‐Dependent Glucuronate Detoxification Potentiates Metformin's Anti‐Tumor Efficacy in Lung Adenocarcinoma

open access: yesAdvanced Science, EarlyView.
This study reveals that metformin promotes glucuronic acid metabolism in lung adenocarcinoma by activating UGDH S476 phosphorylation and enhancing the conversion of UDPG to UDPGA based on metabolomics analysis. Through compound virtual screening, it is found that plantainoside targeting UGDH downstream UXS1 leads to UDPGA toxicity accumulation ...
Qihai Sui   +14 more
wiley   +1 more source

Marburg Virus Glycoprotein Is a Remarkable Virulent Factor Linked to Hemorrhagic Pathology: Evidence from Multimodal Experimental Systems

open access: yesAdvanced Science, EarlyView.
By integrating data from in vitro, ex vivo, and in vivo models, our research identifies the MARV glycoprotein as a remarkable hemorrhagic factor, filling a major gap in this important field. It also provides practical experimental tools for the basic research on viral pathogenesis and applied research aimed at antiviral intervention for hemorrhagic ...
Ting Yao   +11 more
wiley   +1 more source

OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Software obfuscation is a powerful tool to protect the intellectual property or secret keys inside programs. Strong software obfuscation is crucial in the context of untrusted execution environments (e.g., subject to malware infection) or to face ...
Darius Mercadier   +3 more
doaj   +1 more source

Extended Report on the Obfuscated Integration of Software Protections

open access: yesCoRR, 2019
34 pages, 31 figures, 9 tables, short journal version submitted for peer ...
Jens Van den Broeck   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy