Results 41 to 50 of about 372,889 (280)

DeepSQLi: Deep Semantic Learning for Testing SQL Injection

open access: yes, 2020
Security is unarguably the most serious concern for Web applications, to which SQL injection (SQLi) attack is one of the most devastating attacks. Automatically testing SQLi vulnerabilities is of ultimate importance, yet is unfortunately far from trivial
Anna Huang Cheng-Zhi   +15 more
core   +1 more source

Organ‐specific redox imbalances in spinal muscular atrophy mice are partially rescued by SMN antisense oligonucleotides

open access: yesFEBS Letters, EarlyView.
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley   +1 more source

Assessing the Security of Campus Networks: The Case of Seven Universities

open access: yesSensors, 2021
The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers have no complete picture of the network security because of its special management and the rapid
Rui Zheng   +4 more
doaj   +1 more source

Mechanisms of IgE‐mediated food allergy and the role of allergen‐specific B cells

open access: yesFEBS Letters, EarlyView.
Food allergy arises when allergen‐specific B cells preferentially produce immunoglobulin E (IgE) antibodies against harmless foods. This article explains the mechanisms driving IgE‐mediated reactions, highlights the central role of these B cells, and discusses how natural tolerance (NT) and oral immunotherapy (OIT) can reshape allergic immune responses.
Juan‐Felipe López   +2 more
wiley   +1 more source

AMMF: cross-architectures vulnerability detection based on attention mechanism and multi-feature fusion

open access: yesCybersecurity
Binary vulnerability detection plays an important role in the field of program security. In order to deal with large-scale vulnerability detection tasks, more and more neural network technologies are applied to cross-architectures vulnerability detection.
Yingmei Han   +3 more
doaj   +1 more source

Linking neurogenesis, oligodendrogenesis, and myelination defects to neurodevelopmental disruption in primary mitochondrial disorders

open access: yesFEBS Letters, EarlyView.
Mitochondrial remodeling shapes neural and glial lineage progression by matching metabolic supply with demand. Elevated OXPHOS supports differentiation and myelin formation, while myelin compaction lowers mitochondrial dependence, revealing mitochondria as key drivers of developmental energy adaptation.
Sahitya Ranjan Biswas   +3 more
wiley   +1 more source

Automated Software Vulnerability Detection Based on Hybrid Neural Network

open access: yesApplied Sciences, 2021
Vulnerabilities threaten the security of information systems. It is crucial to detect and patch vulnerabilities before attacks happen. However, existing vulnerability detection methods suffer from long-term dependency, out of vocabulary, bias towards ...
Xin Li   +5 more
doaj   +1 more source

The Adversarial Attack and Detection under the Fisher Information Metric

open access: yes, 2019
Many deep learning models are vulnerable to the adversarial attack, i.e., imperceptible but intentionally-designed perturbations to the input can cause incorrect output of the networks.
Fletcher, P. Thomas   +5 more
core   +1 more source

Intracoronary Imaging for Detecting Vulnerable Plaque

open access: yesCirculation Journal, 2013
It is now generally recognized that acute coronary syndromes most commonly result from disruption of thin-cap fibroatheroma (TCFA), which is characterized by a large necrotic core with an overlying thin-fibrous cap measuring
Kenichi, Fujii   +3 more
openaire   +3 more sources

Dual targeting of RET and SRC synergizes in RET fusion‐positive cancer cells

open access: yesMolecular Oncology, EarlyView.
Despite the strong activity of selective RET tyrosine kinase inhibitors (TKIs), resistance of RET fusion‐positive (RET+) lung cancer and thyroid cancer frequently occurs and is mainly driven by RET‐independent bypass mechanisms. Son et al. show that SRC TKIs significantly inhibit PAK and AKT survival signaling and enhance the efficacy of RET TKIs in ...
Juhyeon Son   +13 more
wiley   +1 more source

Home - About - Disclaimer - Privacy