Results 101 to 110 of about 372,889 (280)
Multi-Objective Seagull Optimization Algorithm with Deep Learning-Enabled Vulnerability Detection for Secure Cloud Environments. [PDF]
Aljebreen M +5 more
europepmc +1 more source
ABSTRACT Background SOX1 antibody‐positive paraneoplastic neurological syndromes (PNS) exhibit significant population‐specific clinical heterogeneity. While Western cohorts predominantly manifest Lambert‐Eaton myasthenic syndrome (65%–80%), comprehensive clinical characterization and treatment response data in Asian populations remain critically ...
Jin‐Long Ye +11 more
wiley +1 more source
CEVD: Cluster-Based Ensemble Learning for Cross-Project Vulnerability Detection
Deep learning has become an important approach for automated software vulnerability detection. However, due to domain shift, existing models often suffer from significant performance degradation when applied to unseen projects.
Yang Cao, Yunwei Dong, Jie Liu
doaj +1 more source
Evaluating Vulnerability Detection
Chain of thought reasoning for LLM and Line-level vulnerability improvement using cleaned ...
openaire +1 more source
ABSTRACT Objective To delineate specific in vivo white matter pathology in neuronal intranuclear inclusion disease (NIID) using diffusion spectrum imaging (DSI) and define its clinical relevance. Methods DSI was performed on 42 NIID patients and 38 matched controls.
Kaiyan Jiang +10 more
wiley +1 more source
iDetect for vulnerability detection in internet of things operating systems using machine learning. [PDF]
Al-Boghdady A, El-Ramly M, Wassif K.
europepmc +1 more source
Impact of Asymptomatic Intracranial Hemorrhage on Outcome After Endovascular Stroke Treatment
ABSTRACT Background Endovascular treatment (EVT) achieves high rates of recanalization in acute large‐vessel occlusion (LVO) stroke, but functional recovery remains heterogeneous. While symptomatic intracranial hemorrhage (sICH) has been well studied, the prognostic impact of asymptomatic intracranial hemorrhage (aICH) after EVT is less certain ...
Shihai Yang +22 more
wiley +1 more source
Research on RTF array overflow vulnerability detection
When the virtual function was executed,it could cause array overflow vulnerability due to error operation of the virtual function table of C++ object.By attacking the virtual function,it could cause the system crash,or even the attacker to control the ...
De-guang LE +4 more
doaj
Automatic detection method of software upgrade vulnerability based on network traffic analysis
During the software upgrade process,the lack of authentication for upgrade information or packages can lead to remote code execution vulnerabilities based on man-in-the-middle attack.An automatic detection method for upgrading vulnerabilities was ...
Jinhui TENG +3 more
doaj
Fluid Biomarkers of Disease Burden and Cognitive Dysfunction in Progressive Supranuclear Palsy
ABSTRACT Objective Identifying objective biomarkers for progressive supranuclear palsy (PSP) is crucial to improving diagnosis and establishing clinical trial and treatment endpoints. This study evaluated fluid biomarkers in PSP versus controls and their associations with regional 18F‐PI‐2620 tau‐PET, clinical, and cognitive outcomes.
Roxane Dilcher +10 more
wiley +1 more source

