Results 91 to 100 of about 53,608 (389)

Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization

open access: yesIEEE Transactions on Dependable and Secure Computing, 2019
Deep neural networks (DNNs) have been proven vulnerable to backdoor attacks, where hidden features (patterns) trained to a normal model, which is only activated by some specific input (called triggers), trick the model into producing unexpected behavior.
Shaofeng Li   +4 more
semanticscholar   +1 more source

The Saccharomyces cerevisiae amino acid transporter Lyp1 has a broad substrate spectrum

open access: yesFEBS Letters, EarlyView.
In Saccharomyces cerevisiae, Yeast Amino acid Transporter family members mediate the import of amino acids, ranging from substrate specialists to generalists. Here, we show that the specialist transporter, Lyp1, has a broader substrate spectrum than previously described, with affinity constants spanning from micromolar to millimolar.
Foteini Karapanagioti   +3 more
wiley   +1 more source

A Survey on different techniques of steganography

open access: yesMATEC Web of Conferences, 2016
Steganography is important due to the exponential development and secret communication of potential computer users over the internet. Steganography is the art of invisible communication to keep secret information inside other information. Steganalysis is
Kaur Harpreet, Rani Jyoti
doaj   +1 more source

Review on Steganography and Cryptography

open access: yes, 2023
tion security is a very useful term when it comes to the transmission of secret data or information between two objects or devices. Generally, cryptography is used for hiding information and sending messages in textual form. There are many techniques and algorithms that have come into the picture when it comes to hiding information.
Nilofar Mulla   +6 more
openaire   +1 more source

Steganographic Generative Adversarial Networks

open access: yes, 2019
Steganography is collection of methods to hide secret information ("payload") within non-secret information "container"). Its counterpart, Steganalysis, is the practice of determining if a message contains a hidden payload, and recovering it if possible.
Burnaev, Evgeny   +2 more
core   +1 more source

Social context prevents heat hormetic effects against mutagens during fish development

open access: yesFEBS Letters, EarlyView.
This study shows that sublethal heat stress protects fish embryos against ultraviolet radiation, a concept known as ‘hormesis’. However, chemical stress transmission between fish embryos negates this protective effect. By providing evidence for the mechanistic molecular basis of heat stress hormesis and interindividual stress communication, this study ...
Lauric Feugere   +5 more
wiley   +1 more source

Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques

open access: yesIEEE Transactions on Systems, Man, and Cybernetics: Systems, 2020
Internet of Things (IoT) is a domain wherein which the transfer of data is taking place every single second. The security of these data is a challenging task; however, security challenges can be mitigated with cryptography and steganography techniques ...
Manju Khari   +5 more
semanticscholar   +1 more source

Universal Image Steganalytic Method [PDF]

open access: yes, 2014
In the paper we introduce a new universal steganalytic method in JPEG file format that is detecting well-known and also newly developed steganographic methods.
Banoci, V.   +3 more
core   +1 more source

miRNA‐29 regulates epidermal and mesenchymal functions in skin repair

open access: yesFEBS Letters, EarlyView.
miRNA‐29 inhibits cell‐to‐cell and cell‐to‐matrix adhesion by silencing mRNA targets. Adhesion is controlled by complex interactions between many types of molecules coded by mRNAs. This is crucial for keeping together the layers of the skin and for regenerating the skin after wounding.
Lalitha Thiagarajan   +10 more
wiley   +1 more source

Covert Channels in SIP for VoIP signalling

open access: yes, 2008
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call.
B. Lampson   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy