Results 61 to 70 of about 19,739 (264)

Support‐Induced Interfacial Effects Steer Methanol Selectivity in CO2 Electroreduction by Immobilized Cobalt Phthalocyanine

open access: yesAngewandte Chemie, EarlyView.
Immobilizing CoPc on a carbon support switches its CO2 reduction selectivity from CO to CH3OH. Multiscale simulations reveal that the support actively modulates the catalytic environment by inducing desolvation of bottom layer of CoPc, which lowers the protonation barrier while leaving CO desorption nearly unaffected.
Ke Ye   +3 more
wiley   +2 more sources

Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges

open access: yesAlgorithms
Code obfuscation has become an essential practice in modern software development, designed to make source or machine code challenging for both humans and computers to comprehend.
Tomer Raitsis   +5 more
doaj   +1 more source

DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps

open access: yesIEEE Access, 2020
The Android packing techniques were originally used to pack and conceal important information of the apps to prevent malicious developers from deconstructing the software logic.
Caijun Sun   +5 more
doaj   +1 more source

Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53

open access: yesAdvanced Science, EarlyView.
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore   +20 more
wiley   +1 more source

Atomic‐Scale Insights into Yttrium‐Induced Grain Boundary Structure Modification in Al2O3

open access: yesAdvanced Science, EarlyView.
Using advanced STEM characterization combined with NNP‐based MCMD calculations, it is revealed that Y segregation at ∑13 Al2O3 GB involves not only simple substitution of Y for Al atoms but also structural adaptation with a change in GB atomic density, leading to minimized excess volume and lowest GB energy.
Jingyuan Yan   +7 more
wiley   +1 more source

A note on the concept of obfuscation.

open access: yesТруды Института системного программирования РАН, 2004
In this paper we address the issue of defining security of program obfuscation. We argue that requirements to obfuscated programs may be different and are dependent on potential applications. Therefore three distinct models are suggested for studying the
N.P. Varnovsky
doaj  

Multi‐View Biomedical Foundation Models for Molecule‐Target and Property Prediction

open access: yesAdvanced Science, EarlyView.
Molecular foundation models can provide accurate predictions for a large set of downstream tasks. We develop MMELON, an approach that integrates pre‐trained graph, image, and text foundation models and validate our multi‐view model on over 120 tasks, including GPCR binding.
Parthasarathy Suryanarayanan   +17 more
wiley   +1 more source

Diversified Compilation Method Based on LLVM [PDF]

open access: yesJisuanji gongcheng
When diversifying projects composed of multiple C/C++ source files, most of the existing software diversification tools adopt the same diversification method for all functions in a single C/C++ source file, which leads to a single diversification method ...
CHEN Yingchao, WANG Junchao, PANG Jianmin, YUE Feng
doaj   +1 more source

Eight years of rider measurement in the Android malware ecosystem: evolution and lessons learned [PDF]

open access: yes, 2018
Despite the growing threat posed by Android malware, the research community is still lacking a comprehensive view of common behaviors and trends exposed by malware families active on the platform.
Stringhini, Gianluca   +1 more
core  

On the Activity Privacy of Blockchain for IoT

open access: yes, 2019
Security is one of the fundamental challenges in the Internet of Things (IoT) due to the heterogeneity and resource constraints of the IoT devices.
Dorri, Ali   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy