-
1
Hawthorn Lace Bug, Corythucha cydoniae (Fitch) (Insecta: Hemiptera: Tingidae)
Published 2002-08-01“… The hawthorn lace bug, Corythucha cydoniae (Fitch), selectively attacks a variety of woody, rosaceous plants and can cause severe leaf damage. …”
Get full text
Article -
2
Hawthorn Lace Bug, Corythucha cydoniae (Fitch) (Insecta: Hemiptera: Tingidae)
Published 2002-08-01“… The hawthorn lace bug, Corythucha cydoniae (Fitch), selectively attacks a variety of woody, rosaceous plants and can cause severe leaf damage. …”
Get full text
Article -
3
Homomorphic signature schemes for single-source and multi-source network coding
Published 2019-11-01“…To solve the problems of pollution attacks of single-source and multi-source network coding,two homomorphic signature schemes for network coding were proposed.In homomorphic signature for single-source network,the message hash value was signed on the elliptic curve,then the message,hash value and the signature of hash value were output,and the receiving node could verify the signature,the elliptic curve signature based on homomorphism could resist intra/inter-generation pollution attacks.Homomorphic signature from pairings for multi-source network coding could resist pollution attacks,and the introduction of timestamp made it be capable to resist replay attacks.In the random oracle model,it proves that two schemes are all secure under the selective attacks.Analysis shows that two schemes can effectively improve the verification efficiency.…”
Get full text
Article -
4
Optimized Video Watermarking With Entropy-Aware Block Selection and Modified Hénon-Map Encryption
Published 2024-01-01“…The watermark is adaptively embedded based on the video’s transform type, sub-band selection, attack types, and keyframes. Block selection within sub-bands is guided by entropy, edge entropy, and contrast. …”
Get full text
Article -
5
Harnessing immunotherapy: cancer vaccines as novel therapeutic strategies for brain tumor
Published 2025-07-01“…The unique mechanisms defining cancer vaccines, such as their ability to activate dendritic cells and T cells, underscore their precision in selectively attacking cancer cells while sparing healthy tissue. …”
Get full text
Article -
6
SecFedDNN: A Secure Federated Deep Learning Framework for Edge–Cloud Environments
Published 2025-06-01“…We utilized Google Cloud Platform (GCP) along with Google Colaboratory (Colab) to create five federated clients for simulating attacks on the TON_IoT dataset, which we balanced across selected attack types. Initial tests showed DNN outperformed Long Short-Term Memory (LSTM) and SimpleNN in centralized environments by providing higher accuracy at lower computational costs. …”
Get full text
Article -
7
Nek2A prevents centrosome clustering and induces cell death in cancer cells via KIF2C interaction
Published 2024-03-01“…This unique trait of cancer cells presents a promising target for cancer therapy, focusing on selectively attacking cells with supernumerary centrosomes. …”
Get full text
Article -
8
Evaluation of L-Methioninase as a Targeted Anticancer Agent in Colorectal Cancer and Renal Cell Carcinoma
Published 2025-07-01“…Therefore, they could be selectively attacked by methioninase-based treatment. The present study was carried out to investigate the effect of L-Met on cancer cells, especially colorectal cancer (HCT-116) and renal cell carcinoma (A498), and its potential as a therapeutic agent. …”
Get full text
Article -
9
A big data analysis algorithm for massive sensor medical images
Published 2024-11-01“…We infer the extraction, feature selection, attack detection, and data collection and processing procedures to anticipate anomaly inpatient data. …”
Get full text
Article