Results 41 to 50 of about 22,093 (250)
Towards accurate detection of obfuscated web tracking [PDF]
Web tracking is currently recognized as one of the most important privacy threats on the Internet. Over the last years, many methodologies have been developed to uncover web trackers.
Barlet Ros, Pere +2 more
core +1 more source
CodeCipher: Learning to Obfuscate Source Code Against LLMs
While large code language models have made significant strides in AI-assisted coding tasks, there are growing concerns about privacy challenges. The user code is transparent to the cloud LLM service provider, inducing risks of unauthorized training, reading, and execution of the user code.
Yalan Lin +3 more
openaire +2 more sources
Software obfuscation or obscuring a software is an approach to defeat the practice of reverse engineering a software for using its functionality illegally in the development of another software. Java applications are more amenable to reverse engineering and re-engineering attacks through methods such as decompilation because Java class files store the ...
Praveen Sivadasan +2 more
openaire +2 more sources
The energetic offset between the donor and the acceptor components in organic photoactive layers is central to the tradeoff between photovoltage and photocurrent losses. This Perspective covers the most important issues surrounding this topic in non‐fullerene acceptor blends, from the difficulty of accurately determining state energies and driving ...
Dieter Neher, Manasi Pranav
wiley +1 more source
Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore +20 more
wiley +1 more source
We uncover a large variety of putative inhibitory ligand‐gated ion channels (LGICs) in the phylum Cnidaria, the sister group to all bilaterian animals. Phylogenetic analysis suggests a complex evolutionary history of inhibitory LGICs with diverse neurotransmitter ligands.
Abhilasha Ojha +13 more
wiley +1 more source
Postsynaptic Complexin Mediates Constitutive Exocytosis of Nicotinic Acetylcholine Receptor
Beyond its established presynaptic role, complexin is identified as a postsynaptic regulator of neurotransmitter receptor trafficking. By promoting constitutive and activity‐dependent exocytosis of nicotinic acetylcholine receptors, complexin controls spontaneous synaptic signaling at the C.
Ya Wang +4 more
wiley +1 more source
Diversified Compilation Method Based on LLVM [PDF]
When diversifying projects composed of multiple C/C++ source files, most of the existing software diversification tools adopt the same diversification method for all functions in a single C/C++ source file, which leads to a single diversification method ...
CHEN Yingchao, WANG Junchao, PANG Jianmin, YUE Feng
doaj +1 more source
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang +7 more
wiley +1 more source
DeepAPT: Nation-State APT Attribution Using End-to-End Deep Neural Networks
In recent years numerous advanced malware, aka advanced persistent threats (APT) are allegedly developed by nation-states. The task of attributing an APT to a specific nation-state is extremely challenging for several reasons.
E Stamatatos +6 more
core +1 more source

