Results 91 to 100 of about 372,889 (280)

MultiGLICE: Combining Graph Neural Networks and Program Slicing for Multiclass Software Vulnerability Detection

open access: yesComputers
This paper presents MultiGLICE (Multi class Graph Neural Network with Program Slice), a model for static code analysis to detect security vulnerabilities.
Wesley de Kraker   +2 more
doaj   +1 more source

Super‐Refractory Status Epilepticus (SRSE) in a Patient With Compound Heterozygous OPA1 Variants: Case Report and Literature Review

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Super‐Refractory Status Epilepticus (SRSE) is a rare, life‐threatening neurological emergency with unclear etiology in many cases. Mitochondrial dysfunction, often due to disease‐causing genetic variants, is increasingly recognized as a cause, with each gene producing distinct pathophysiological mechanisms.
Pouria Mohammadi   +2 more
wiley   +1 more source

Structure-Enhanced Prompt Learning for Graph-Based Code Vulnerability Detection

open access: yesApplied Sciences
Recent advances in prompt learning have opened new avenues for enhancing natural language understanding in domain-specific tasks, including code vulnerability detection.
Wei Chang, Chunyang Ye, Hui Zhou
doaj   +1 more source

ALS With and Without Upper Motor Neuron Signs: A Comparative Study Supporting the Gold Coast Criteria

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective The Gold Coast criteria permit diagnosis of amyotrophic lateral sclerosis (ALS) even without upper motor neuron (UMN) signs. However, whether ALS patients with UMN signs (ALSwUMN) and those without (ALSwoUMN) share similar characteristics and prognoses remains unclear.
Hee‐Jae Jung   +7 more
wiley   +1 more source

Whole‐Body Pattern of Muscle Degeneration and Progression in Sarcoglycanopathies

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To characterize whole‐body intramuscular fat distribution pattern in patients with sarcoglycanopathies and explore correlations with disease severity, duration and age at onset. Methods Retrospective, cross‐sectional, multicentric study enrolling patients with variants in one of the four sarcoglycan genes who underwent whole‐body ...
Laura Costa‐Comellas   +39 more
wiley   +1 more source

Backdoor Attacks to Deep Neural Networks: A Survey of the Literature, Challenges, and Future Research Directions

open access: yesIEEE Access
Deep neural network (DNN) classifiers are potent instruments that can be used in various security-sensitive applications. Nonetheless, they are vulnerable to certain attacks that impede or distort their learning process.
Orson Mengara   +2 more
doaj   +1 more source

Traumatic Microhemorrhages Are Not Synonymous With Axonal Injury

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Diffuse axonal injury (DAI) is caused by acceleration‐deceleration forces during trauma that shear white matter tracts. Susceptibility‐weighted MRI (SWI) identifies microbleeds that are considered the radiologic hallmark of DAI and are used in clinical prognostication.
Karinn Sytsma   +9 more
wiley   +1 more source

Spinal Cord Infarction Versus Idiopathic Transverse Myelitis: Clinical, Radiological, and Functional Insights From a Retrospective Cohort Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Introduction Spinal cord infarction (SCI) is a rare but devastating myelopathy, characterized by a high disability rate and an unfavorable prognosis. It has often been underdiagnosed and misdiagnosed as idiopathic transverse myelitis (ITM). This study aimed to describe the clinical features, radiological biomarkers, treatments, and functional ...
Zeqiang Ji   +13 more
wiley   +1 more source

AI-Powered Vulnerability Detection and Patch Management in Cybersecurity: A Systematic Review of Techniques, Challenges, and Emerging Trends

open access: yesMachine Learning and Knowledge Extraction
With the increasing complexity of cyber threats and the inefficiency of traditional vulnerability management, artificial intelligence has been increasingly integrated into cybersecurity.
Malek Malkawi, Reda Alhajj
doaj   +1 more source

Home - About - Disclaimer - Privacy