Results 91 to 100 of about 53,608 (389)
Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization
Deep neural networks (DNNs) have been proven vulnerable to backdoor attacks, where hidden features (patterns) trained to a normal model, which is only activated by some specific input (called triggers), trick the model into producing unexpected behavior.
Shaofeng Li+4 more
semanticscholar +1 more source
The Saccharomyces cerevisiae amino acid transporter Lyp1 has a broad substrate spectrum
In Saccharomyces cerevisiae, Yeast Amino acid Transporter family members mediate the import of amino acids, ranging from substrate specialists to generalists. Here, we show that the specialist transporter, Lyp1, has a broader substrate spectrum than previously described, with affinity constants spanning from micromolar to millimolar.
Foteini Karapanagioti+3 more
wiley +1 more source
A Survey on different techniques of steganography
Steganography is important due to the exponential development and secret communication of potential computer users over the internet. Steganography is the art of invisible communication to keep secret information inside other information. Steganalysis is
Kaur Harpreet, Rani Jyoti
doaj +1 more source
Review on Steganography and Cryptography
tion security is a very useful term when it comes to the transmission of secret data or information between two objects or devices. Generally, cryptography is used for hiding information and sending messages in textual form. There are many techniques and algorithms that have come into the picture when it comes to hiding information.
Nilofar Mulla+6 more
openaire +1 more source
Steganographic Generative Adversarial Networks
Steganography is collection of methods to hide secret information ("payload") within non-secret information "container"). Its counterpart, Steganalysis, is the practice of determining if a message contains a hidden payload, and recovering it if possible.
Burnaev, Evgeny+2 more
core +1 more source
Social context prevents heat hormetic effects against mutagens during fish development
This study shows that sublethal heat stress protects fish embryos against ultraviolet radiation, a concept known as ‘hormesis’. However, chemical stress transmission between fish embryos negates this protective effect. By providing evidence for the mechanistic molecular basis of heat stress hormesis and interindividual stress communication, this study ...
Lauric Feugere+5 more
wiley +1 more source
Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques
Internet of Things (IoT) is a domain wherein which the transfer of data is taking place every single second. The security of these data is a challenging task; however, security challenges can be mitigated with cryptography and steganography techniques ...
Manju Khari+5 more
semanticscholar +1 more source
Universal Image Steganalytic Method [PDF]
In the paper we introduce a new universal steganalytic method in JPEG file format that is detecting well-known and also newly developed steganographic methods.
Banoci, V.+3 more
core +1 more source
miRNA‐29 regulates epidermal and mesenchymal functions in skin repair
miRNA‐29 inhibits cell‐to‐cell and cell‐to‐matrix adhesion by silencing mRNA targets. Adhesion is controlled by complex interactions between many types of molecules coded by mRNAs. This is crucial for keeping together the layers of the skin and for regenerating the skin after wounding.
Lalitha Thiagarajan+10 more
wiley +1 more source
Covert Channels in SIP for VoIP signalling
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call.
B. Lampson+3 more
core +1 more source