Results 51 to 60 of about 19,937 (276)

Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53

open access: yesAdvanced Science, EarlyView.
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore   +20 more
wiley   +1 more source

A Framework to Quantify the Quality of Source Code Obfuscation

open access: yesApplied Sciences
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin   +4 more
doaj   +1 more source

Vectorization, Obfuscation and P4 LLVM Tool-chain [PDF]

open access: yes, 2018
This thesis broadly focuses on three different areas: Loop Vectorization, Code Obfuscation, and P4LLVM compiler. The work in Loop vectorization starts with a comparison of Auto-vectorization of GCC, ICC and LLVM compilers and show their strengths and ...
Kumar, Dangeti Tharun   +1 more
core  

Functional Analysis of Ligand‐Gated Chloride Channels in a Cnidarian Sheds Light on the Evolution of Inhibitory Signaling

open access: yesAdvanced Science, EarlyView.
We uncover a large variety of putative inhibitory ligand‐gated ion channels (LGICs) in the phylum Cnidaria, the sister group to all bilaterian animals. Phylogenetic analysis suggests a complex evolutionary history of inhibitory LGICs with diverse neurotransmitter ligands.
Abhilasha Ojha   +13 more
wiley   +1 more source

A Method for Construction of Software Protection Technology Application Sequence Based on Petri Net With Inhibitor Arcs

open access: yesIEEE Access, 2018
In the field of software protection, when there is a dependence between the various software protection technologies, the application order of these technologies must be arranged in a correct way in order to maximize the protection effect.
Qing Su, Fan He, Naiqi Wu, Zhiyi Lin
doaj   +1 more source

Nigra‐Subthalamic Dopaminergic Circuitry Modulates and Represents Distinct Pain Modality in Physiological and Pain States in Mice

open access: yesAdvanced Science, EarlyView.
Nigral dopaminergic (DA) neurons modulate and represent pain with a preference to a particular modality (mechanical) and laterality (contralateral), which are controlled by nigral GABAergic neurons. The pain modulation is mimicked by the nigro‐subthalamic projection and its downstream neurons, involving D2‐like receptors.
Ying Ji   +13 more
wiley   +1 more source

Vulnerability Analysis and Detection of Android System Signature [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the problem that an attacker can issue pirated software by re-signing the vulnerabilities in the self-signature process of Android system application program,this paper analyses the digital signature and verification process of Android system ...
LIAO Fangyuan, GAN Zhiwang
doaj   +1 more source

Postsynaptic Complexin Mediates Constitutive Exocytosis of Nicotinic Acetylcholine Receptor

open access: yesAdvanced Science, EarlyView.
Beyond its established presynaptic role, complexin is identified as a postsynaptic regulator of neurotransmitter receptor trafficking. By promoting constitutive and activity‐dependent exocytosis of nicotinic acetylcholine receptors, complexin controls spontaneous synaptic signaling at the C.
Ya Wang   +4 more
wiley   +1 more source

Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges

open access: yesAlgorithms
Code obfuscation has become an essential practice in modern software development, designed to make source or machine code challenging for both humans and computers to comprehend.
Tomer Raitsis   +5 more
doaj   +1 more source

DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps

open access: yesIEEE Access, 2020
The Android packing techniques were originally used to pack and conceal important information of the apps to prevent malicious developers from deconstructing the software logic.
Caijun Sun   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy