Results 61 to 70 of about 19,739 (264)
Immobilizing CoPc on a carbon support switches its CO2 reduction selectivity from CO to CH3OH. Multiscale simulations reveal that the support actively modulates the catalytic environment by inducing desolvation of bottom layer of CoPc, which lowers the protonation barrier while leaving CO desorption nearly unaffected.
Ke Ye +3 more
wiley +2 more sources
Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges
Code obfuscation has become an essential practice in modern software development, designed to make source or machine code challenging for both humans and computers to comprehend.
Tomer Raitsis +5 more
doaj +1 more source
DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps
The Android packing techniques were originally used to pack and conceal important information of the apps to prevent malicious developers from deconstructing the software logic.
Caijun Sun +5 more
doaj +1 more source
Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore +20 more
wiley +1 more source
Atomic‐Scale Insights into Yttrium‐Induced Grain Boundary Structure Modification in Al2O3
Using advanced STEM characterization combined with NNP‐based MCMD calculations, it is revealed that Y segregation at ∑13 Al2O3 GB involves not only simple substitution of Y for Al atoms but also structural adaptation with a change in GB atomic density, leading to minimized excess volume and lowest GB energy.
Jingyuan Yan +7 more
wiley +1 more source
A note on the concept of obfuscation.
In this paper we address the issue of defining security of program obfuscation. We argue that requirements to obfuscated programs may be different and are dependent on potential applications. Therefore three distinct models are suggested for studying the
N.P. Varnovsky
doaj
Multi‐View Biomedical Foundation Models for Molecule‐Target and Property Prediction
Molecular foundation models can provide accurate predictions for a large set of downstream tasks. We develop MMELON, an approach that integrates pre‐trained graph, image, and text foundation models and validate our multi‐view model on over 120 tasks, including GPCR binding.
Parthasarathy Suryanarayanan +17 more
wiley +1 more source
Diversified Compilation Method Based on LLVM [PDF]
When diversifying projects composed of multiple C/C++ source files, most of the existing software diversification tools adopt the same diversification method for all functions in a single C/C++ source file, which leads to a single diversification method ...
CHEN Yingchao, WANG Junchao, PANG Jianmin, YUE Feng
doaj +1 more source
Eight years of rider measurement in the Android malware ecosystem: evolution and lessons learned [PDF]
Despite the growing threat posed by Android malware, the research community is still lacking a comprehensive view of common behaviors and trends exposed by malware families active on the platform.
Stringhini, Gianluca +1 more
core
On the Activity Privacy of Blockchain for IoT
Security is one of the fundamental challenges in the Internet of Things (IoT) due to the heterogeneity and resource constraints of the IoT devices.
Dorri, Ali +3 more
core +1 more source

