Results 141 to 150 of about 372,889 (280)
Two kinds of self‐assembled RNA micelles were used to co‐deliver synergistic siRNA and nucleoside analogues for the treatment of colorectal cancer lung metastases. Near‐complete elimination of lung cancer metastases was confirmed in an orthotopic lung metastasis model constructed using human colorectal cancer lung metastases patient surgical samples to
Kai Jin +4 more
wiley +1 more source
Code vulnerability detection based on augmented program dependency graph and optimized CodeBERT. [PDF]
Zou Z +5 more
europepmc +1 more source
A hydrogel–liquid metal composite peripheral nerve interface (HLB‐PNI) combines electrically durable electrodes and tissue‐adhesive hydrogel for tissue‐adaptive implantation. In nerve‐injured rats, it enables the diagnosis of sensory‐motor connectivity via stimulation and neural signal recording.
Yewon Kim +5 more
wiley +1 more source
An elegant intellectual engine towards automation of blockchain smart contract vulnerability detection. [PDF]
Raju B, K GD.
europepmc +1 more source
Permanent magnets derive their extraordinary strength from deep, universal electronic‐structure principles that control magnetization, anisotropy, and intrinsic performance. This work uncovers those governing rules, examines modern modeling and AI‐driven discovery methods, identifies critical bottlenecks, and reveals electronic fingerprints shared ...
Prashant Singh
wiley +1 more source
On the effects of program slicing for vulnerability detection during code inspection. [PDF]
Papotti A, Tuma K, Massacci F.
europepmc +1 more source
Meta‐Rod Mechanical Metamaterials With Programmable Reconfiguration
Existing mechanical metamaterials achieve programmable large deformations in planar square or cubic configurations, restricted by required complex boundary conditions. This research proposes a 1D metamaterial, Meta‐rod, with linear, bending, twisting, area, and volume deformation modes.
Atharva Pande, Lyes Kadem, Hang Xu
wiley +1 more source
Deep learning-based methodology for vulnerability detection in smart contracts. [PDF]
Wang Z +5 more
europepmc +1 more source
The facet‐engineered ZnO/Zn3In2S6 heterostructure, dominated by {001} plane coupling, exposes abundant unsaturated Zn sites with elongated Zn─O bonds, directing photoexcited charge carriers along an S‐scheme pathway and suppressing recombination. Enhanced interfacial Zn adsorption toward bisphenol A and methylene blue further synergistically promotes ...
Yang Yang +6 more
wiley +1 more source
Research progress on detection of software vulnerabilities based on code similarity
Software vulnerabilities have long been a key threat to the field of network and information security, and vulnerability detection is the primary technical means to mitigate such threats.
LI Qinghao +3 more
doaj

