Results 81 to 90 of about 3,048 (208)
The research of searchable symmetric encryption (SSE) has been focused on the trade-off between security, performance, and functionality. Recently proposed Hidden Cross-Tags (HXT) protocol improves the Oblivious Cross-Tags (OXT) by avoiding the leakage ...
Changshe Ma, Yiping Gu, Hongfei Li
doaj +1 more source
This study discovered a new pathway that tells fruit flies when to stop eating. It found that rising blood sugar (fructose) is detected by a sensor called GR43a. This triggers a chain reaction involving the satiety signal sulfakinin and its receptor, ultimately activating a final satiety signal, ILP5.
Hong‐Fei Li +7 more
wiley +1 more source
M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices
Searchable encryption allows mobile devices with limited computing and storage resources to outsource data to an untrusted cloud server. Users are able to search and retrieve the outsourced data; however, it suffers from information and privacy leakage ...
Chongzhi Gao +5 more
doaj +1 more source
The Cloud we Share: Access Control on Symmetrically Encrypted Data in Untrusted Clouds
Along with the rapid growth of cloud environments, rises the problem of secure data storage-a problem that both businesses and end-users take into consideration before moving their data online. Recently, a lot of solutions have been proposed based either
Alexandros Bakas +3 more
doaj +1 more source
Linearizing and Forecasting: A Reservoir Computing Route to Digital Twins of the Brain
A new approach uses simple neural networks to create digital twins of brain activity, capturing how different patterns unfold over time. The method generates and recovers key dynamics even from noisy data. When applied to fMRI, it predicts brain signals and reveals distinctive activity patterns across regions and individuals, opening possibilities for ...
Gabriele Di Antonio +3 more
wiley +1 more source
ABSTRACT Triple‐negative breast cancer (TNBC) exhibits addiction to chronic endoplasmic reticulum (ER) stress, which sustains an aggressive metastatic phenotype through activation of the unfolded protein response (UPR). Here, we identify a previously unrecognized “ER‐stress addiction” axis in which the Hippo pathway effector TEAD4 directly ...
Yini Shang +9 more
wiley +1 more source
This study tests NeuroD1 AAV‐based gene therapy in a non‐human primate Alzheimer's disease model. The therapy prevents neuronal damage, inhibits hippocampal atrophy, and reduces neuroinflammation. It also repairs vascular and blood‐brain barrier damage, restores cerebrospinal fluid biomarkers, enhances hippocampal glucose metabolism, and improves ...
Zhouquan Jiang +21 more
wiley +1 more source
Integrating Spatial Proteogenomics in Cancer Research
Xx xx. ABSTRACT Background: Spatial proteogenomics marks a paradigm shift in oncology by integrating molecular analysis with spatial information from both spatial proteomics and other data modalities (e.g., spatial transcriptomics), thereby unveiling tumor heterogeneity and dynamic changes in the microenvironment.
Yida Wang +13 more
wiley +1 more source
Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud
Cloud and remote storage, which has become the preferred method for reducing the security risk and safeguarding our data, is widely used for backups or outsourcing.
Jianyi Zhang +4 more
doaj +1 more source
Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu +4 more
wiley +1 more source

