Search alternatives:
"selection attacks" » "detection attacks" (Expand Search)
Showing 1 - 9 results of 9 for search '"selection attacks"', query time: 0.06s Refine Results
  1. 1

    Hawthorn Lace Bug, Corythucha cydoniae (Fitch) (Insecta: Hemiptera: Tingidae) by Frank W. Mead

    Published 2002-08-01
    “… The hawthorn lace bug, Corythucha cydoniae (Fitch), selectively attacks a variety of woody, rosaceous plants and can cause severe leaf damage. …”
    Get full text
    Article
  2. 2

    Hawthorn Lace Bug, Corythucha cydoniae (Fitch) (Insecta: Hemiptera: Tingidae) by Frank W. Mead

    Published 2002-08-01
    “… The hawthorn lace bug, Corythucha cydoniae (Fitch), selectively attacks a variety of woody, rosaceous plants and can cause severe leaf damage. …”
    Get full text
    Article
  3. 3

    Homomorphic signature schemes for single-source and multi-source network coding by Huifang YU, Wen LI

    Published 2019-11-01
    “…To solve the problems of pollution attacks of single-source and multi-source network coding,two homomorphic signature schemes for network coding were proposed.In homomorphic signature for single-source network,the message hash value was signed on the elliptic curve,then the message,hash value and the signature of hash value were output,and the receiving node could verify the signature,the elliptic curve signature based on homomorphism could resist intra/inter-generation pollution attacks.Homomorphic signature from pairings for multi-source network coding could resist pollution attacks,and the introduction of timestamp made it be capable to resist replay attacks.In the random oracle model,it proves that two schemes are all secure under the selective attacks.Analysis shows that two schemes can effectively improve the verification efficiency.…”
    Get full text
    Article
  4. 4

    Optimized Video Watermarking With Entropy-Aware Block Selection and Modified Hénon-Map Encryption by Ranjan K. Senapati, Birendra Biswal, Sandeep Kautish, Gandharba Swain, Ayman Altameem, Abdulaziz S. Almazyad, Ali Wagdy Mohamed

    Published 2024-01-01
    “…The watermark is adaptively embedded based on the video’s transform type, sub-band selection, attack types, and keyframes. Block selection within sub-bands is guided by entropy, edge entropy, and contrast. …”
    Get full text
    Article
  5. 5

    Harnessing immunotherapy: cancer vaccines as novel therapeutic strategies for brain tumor by Klaudia Kiel, Raziye Piranlioglu, Jakub Godlewski, Agnieszka Bronisz

    Published 2025-07-01
    “…The unique mechanisms defining cancer vaccines, such as their ability to activate dendritic cells and T cells, underscore their precision in selectively attacking cancer cells while sparing healthy tissue. …”
    Get full text
    Article
  6. 6

    SecFedDNN: A Secure Federated Deep Learning Framework for Edge–Cloud Environments by Roba H. Alamir, Ayman Noor, Hanan Almukhalfi, Reham Almukhlifi, Talal H. Noor

    Published 2025-06-01
    “…We utilized Google Cloud Platform (GCP) along with Google Colaboratory (Colab) to create five federated clients for simulating attacks on the TON_IoT dataset, which we balanced across selected attack types. Initial tests showed DNN outperformed Long Short-Term Memory (LSTM) and SimpleNN in centralized environments by providing higher accuracy at lower computational costs. …”
    Get full text
    Article
  7. 7

    Nek2A prevents centrosome clustering and induces cell death in cancer cells via KIF2C interaction by Batuhan Mert Kalkan, Selahattin Can Ozcan, Enes Cicek, Mehmet Gonen, Ceyda Acilan

    Published 2024-03-01
    “…This unique trait of cancer cells presents a promising target for cancer therapy, focusing on selectively attacking cells with supernumerary centrosomes. …”
    Get full text
    Article
  8. 8

    Evaluation of L-Methioninase as a Targeted Anticancer Agent in Colorectal Cancer and Renal Cell Carcinoma by Abbas Abed Noor Al-Owaidi, Mohammed Abdullah Jebor

    Published 2025-07-01
    “…Therefore, they could be selectively attacked by methioninase-based treatment. The present study was carried out to investigate the effect of L-Met on cancer cells, especially colorectal cancer (HCT-116) and renal cell carcinoma (A498), and its potential as a therapeutic agent. …”
    Get full text
    Article
  9. 9

    A big data analysis algorithm for massive sensor medical images by Sarah A. Alzakari, Nuha Alruwais, Shaymaa Sorour, Shouki A. Ebad, Asma Abbas Hassan Elnour, Ahmed Sayed

    Published 2024-11-01
    “…We infer the extraction, feature selection, attack detection, and data collection and processing procedures to anticipate anomaly inpatient data. …”
    Get full text
    Article