-
2061
Cancelable Biometric Template Generation Using Random Feature Vector Transformations
Published 2024-01-01“…In addition to the performance concerns, most of such schemes are modality-specific and prone to reconstruction attacks as there are chances for unauthorized access to security-critical transformation keys. …”
Get full text
Article -
2062
Hypercapnia as a preventative therapeutic strategy: Unveiling the neuroprotective potential and mechanisms
Published 2025-06-01“…As a result, hypercapnia has been utilized as an intervention in several clinical trials regarding different neurological conditions, most notably Sub-Arachnoid Hemorrhage. …”
Get full text
Article -
2063
Caricature as one of the information mechanisms for constructing the image of Russia's war against Ukraine: according to the materials of "The Times" and "The Sunday Times"
Published 2022-10-01“…Putin, who was attached to a series of different images: "Russian-Soviet leader", "half-naked macho" and "dwarf". …”
Get full text
Article -
2064
An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm
Published 2022-03-01“…Initially, for providing robustness against watermarking attacks, a method for watermarking embedding is designed in the domain of Discrete Cosine Transform. …”
Get full text
Article -
2065
Soft money, hard power: Mapping the material contingencies of change in global health academic structures.
Published 2025-01-01“…Pushing for long term, ethical transfers of wealth and responsibility, ruinous solidarity explicitly reorients the political commitments of those who affiliate with Global Health in imperial cores, and thus offers important considerations in the wake of Trump Administration attacks on the field.…”
Get full text
Article -
2066
Management of gout in advanced renal disease
Published 2025-05-01“…Gout management involves different phases: treatment of acute gout flares, implementing prophylaxis to prevent attacks and urate-lowering therapy (ULT). …”
Get full text
Article -
2067
Evaluation of lipid profiles in patients with chronic spontaneous urticaria: A case-control study
Published 2025-03-01“…Urticaria severity showed no significant difference within each lipid profile parameter. Average values of lipid profiles in patients with chronic urticaria in different age and sex showed that HDL has remarkably higher mean quantitation in women than men (p < 0.002). …”
Get full text
Article -
2068
Oncogenic human papillomaviruses activate the tumor-associated lens epithelial-derived growth factor (LEDGF) gene.
Published 2014-03-01“…The identification of cellular targets attacked by the HPV oncogenes is critical for our understanding of the molecular mechanisms of HPV-associated carcinogenesis and may open novel therapeutic opportunities. …”
Get full text
Article -
2069
Evaluating the Impact of Feature Engineering in Phishing URL Detection: A Comparative Study of URL, HTML, and Derived Features
Published 2025-01-01“…Phishing attacks have evolved into sophisticated threats, making effective cybersecurity detection strategies essential. …”
Get full text
Article -
2070
Photoperiod effects on the growth stages of fall armyworm Spodoptera frugiperda (Lepidoptera: Noctuidae) under laboratory conditions
Published 2024-12-01“… Spodoptera frugiperda, commonly known as the fall armyworm, is a pest that attacks maize plants in Indonesia. Light is one of the crucial factors in the development of S. frugiperda. …”
Get full text
Article -
2071
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the &quot;cloud-edge-end&quot; three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
2072
Personal Data Recognition Using a Deep Learning Model
Published 2024-03-01“…Protecting personal identifiable information is a crucial issue today due to individuals leaving traces of their activities on social media and various digital platforms, which can be exploited by attackers for identity theft and fraud. Consequently, there is a need to develop effective methods for personal data protection. …”
Get full text
Article -
2073
A Security and Privacy-Preserving Consortium Blockchain-Based Accessing Control in Mobile Crowdsensing
Published 2025-01-01“…They can achieve this by launching attacks, such as creating counterfeit applications as a trusted MCS applications and then posing as legitimate stakeholders to request access to the targeted devices. …”
Get full text
Article -
2074
Vestibular Syncope and Acute Peripheral Vestibular Deficit: A Case Report
Published 2024-12-01“…ABSTRACT Vestibular syncope is a rare condition in which vertigo may cause syncopal attacks; however, the term has been associated with confusion because it has been ascribed to completely different vestibular and neurological conditions, from dizziness to Menière disease (MD), to the neurovegetative symptoms in benign paroxysmal positional vertigo (BPPV) and central vertebrobasilar hyperfusion. …”
Get full text
Article -
2075
A Simple and Robust Gray Image Encryption Scheme Using Chaotic Logistic Map and Artificial Neural Network
Published 2014-01-01“…The subimages obtained previously are divided into the square subimage blocks. In the next stage, different initial conditions are employed to generate a key stream which will be used for permutation and diffusion of the subimage blocks. …”
Get full text
Article -
2076
Transformers: A Security Perspective
Published 2024-01-01“…The survey categorizes different attacks and defenses related to Transformers, helping researchers identify gaps and opportunities in this area. …”
Get full text
Article -
2077
Combined and General Methodologies of Key Space Partition for the Cryptanalysis of Block Ciphers
Published 2024-10-01“…Furthermore, a method of attacking block ciphers is presented for the case where some key bits are known; the basic idea is to deduce some of the remaining bits of the block. …”
Get full text
Article -
2078
FPGA implementation of a chaos-based image encryption algorithm
Published 2022-11-01“…The results of the various tests prove that the proposed algorithm guarantees high resistance to statistical and differential attacks and can therefore be used safely in image encryption. …”
Get full text
Article -
2079
Ecological network construction and community resilience analysis of nocturnal birds: a case study of Hangzhou City, Zhejiang Province, China
Published 2025-06-01“…Using community detection methods to analyze the differences in attributes, habitats, and topological structures between network communities. …”
Get full text
Article -
2080
A Real-Time Video Watermarking Algorithm for Authentication of Small-Business Wireless Surveillance Networks
Published 2015-09-01“…Experiment results show little loss of video quality and also exhibit excellent robustness against many attacks. As watermark is directly detected in bitstreams domain, real-time detection becomes a reality. …”
Get full text
Article