Found: 43
Select item for more details and to access through your institution.
Lactate modulates zygotic genome activation through H3K18 lactylation rather than H3K27 acetylation.
- Published in:
- Cellular & Molecular Life Sciences, 2024, v. 81, n. 1, p. 1, doi. 10.1007/s00018-024-05349-2
- By:
- Publication type:
- Article
SEC: A core hub during cell fate alteration.
- Published in:
- FASEB Journal, 2024, v. 38, n. 10, p. 1, doi. 10.1096/fj.202400514R
- By:
- Publication type:
- Article
Automated Identification of Sensitive Financial Data Based on the Topic Analysis.
- Published in:
- Future Internet, 2024, v. 16, n. 2, p. 55, doi. 10.3390/fi16020055
- By:
- Publication type:
- Article
Camouflage Backdoor Attack against Pedestrian Detection.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 23, p. 12752, doi. 10.3390/app132312752
- By:
- Publication type:
- Article
Financial Data Quality Evaluation Method Based on Multiple Linear Regression.
- Published in:
- Future Internet, 2023, v. 15, n. 10, p. 338, doi. 10.3390/fi15100338
- By:
- Publication type:
- Article
Neural networks based on attention architecture are robust to data missingness for early predicting hospital mortality in intensive care unit patients.
- Published in:
- Digital Health, 2023, p. 1, doi. 10.1177/20552076231171482
- By:
- Publication type:
- Article
Correlation of abnormal brain changes with perinatal factors in very preterm infants based on diffusion tensor imaging.
- Published in:
- Frontiers in Neuroscience, 2023, v. 17, p. 1, doi. 10.3389/fnins.2023.1137559
- By:
- Publication type:
- Article
Neural networks based on attention architecture are robust to data missingness for early predicting hospital mortality in intensive care unit patients.
- Published in:
- Digital Health, 2023, v. 9, p. 1, doi. 10.1177/20552076231171482
- By:
- Publication type:
- Article
Camera-based PHM method in rotating machinery equipment micro-action scenarios.
- Published in:
- Maintenance & Reliability / Eksploatacja i Niezawodność, 2023, v. 25, n. 1, p. 95, doi. 10.17531/ein.2023.1.10
- By:
- Publication type:
- Article
Fluid Inclusion Studies of Ore and Gangue Minerals from the Piaotang Tungsten Deposit, Southern Jiangxi Province, China.
- Published in:
- Acta Geologica Sinica (English Edition), 2022, v. 96, n. 5, p. 1647, doi. 10.1111/1755-6724.14900
- By:
- Publication type:
- Article
IWA: Integrated gradient‐based white‐box attacks for fooling deep neural networks.
- Published in:
- International Journal of Intelligent Systems, 2022, v. 37, n. 7, p. 4253, doi. 10.1002/int.22720
- By:
- Publication type:
- Article
A high-speed railway network dataset from train operation records and weather data.
- Published in:
- Scientific Data, 2022, v. 9, n. 1, p. 1, doi. 10.1038/s41597-022-01349-8
- By:
- Publication type:
- Article
Random Forest Algorithm Based on Linear Privacy Budget Allocation.
- Published in:
- Journal of Database Management, 2022, v. 33, n. 2, p. 1, doi. 10.4018/JDM.309413
- By:
- Publication type:
- Article
MobiScan: An enhanced invisible screen‐camera communication system for IoT applications.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2022, v. 33, n. 4, p. 1, doi. 10.1002/ett.4151
- By:
- Publication type:
- Article
Loss of MBD2 ameliorates LPS‐induced alveolar epithelial cell apoptosis and ALI in mice via modulating intracellular zinc homeostasis.
- Published in:
- FASEB Journal, 2022, v. 36, n. 2, p. 1, doi. 10.1096/fj.202100924RR
- By:
- Publication type:
- Article
Reasoning Method Based on Intervals with Symmetric Truncated Normal Density.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 1, p. 25, doi. 10.3390/sym14010025
- By:
- Publication type:
- Article
Survey on Astroturfing Detection and Analysis from an Information Technology Perspective.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/3294610
- By:
- Publication type:
- Article
Congestion Attack Detection in Intelligent Traffic Signal System: Combining Empirical and Analytical Methods.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/1632825
- By:
- Publication type:
- Article
Smart Grid Nontechnical Loss Detection Based on Power Gateway Consortium Blockchain.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/9501572
- By:
- Publication type:
- Article
A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning.
- Published in:
- Journal of Circuits, Systems & Computers, 2021, v. 30, n. 13, p. 1, doi. 10.1142/S0218126621502297
- By:
- Publication type:
- Article
Adversarial retraining attack of asynchronous advantage actor‐critic based pathfinding.
- Published in:
- International Journal of Intelligent Systems, 2021, v. 36, n. 5, p. 2323, doi. 10.1002/int.22380
- By:
- Publication type:
- Article
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6631247
- By:
- Publication type:
- Article
Interval Number-Based Safety Reasoning Method for Verification of Decentralized Power Systems in High-Speed Trains.
- Published in:
- Mathematical Problems in Engineering, 2021, p. 1, doi. 10.1155/2021/6624528
- By:
- Publication type:
- Article
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence.
- Published in:
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/8889122
- By:
- Publication type:
- Article
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method.
- Published in:
- Wireless Communications & Mobile Computing, 2020, p. 1, doi. 10.1155/2020/8823300
- By:
- Publication type:
- Article
On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-020-00063-5
- By:
- Publication type:
- Article
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method.
- Published in:
- Wireless Communications & Mobile Computing, 2020, p. 1, doi. 10.1155/2020/8823300
- By:
- Publication type:
- Article
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence.
- Published in:
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/8889122
- By:
- Publication type:
- Article
Novel efficient lattice-based IBE schemes with CPK for fog computing.
- Published in:
- Mathematical Biosciences & Engineering, 2020, v. 17, n. 6, p. 8105, doi. 10.3934/mbe.2020411
- By:
- Publication type:
- Article
Private rank aggregation under local differential privacy.
- Published in:
- International Journal of Intelligent Systems, 2020, v. 35, n. 10, p. 1492, doi. 10.1002/int.22261
- By:
- Publication type:
- Article
Improved Interface Circuit for Enhancing the Power Output of a Vibration-Threshold-Triggered Piezoelectric Energy Harvester.
- Published in:
- Energies (19961073), 2020, v. 13, n. 15, p. 3830, doi. 10.3390/en13153830
- By:
- Publication type:
- Article
Distribution Patterns of Ag in Hydrothermal Precipitates from the Okinawa Trough.
- Published in:
- Acta Geologica Sinica (English Edition), 2020, v. 94, n. 1, p. 126, doi. 10.1111/1755-6724.14331
- By:
- Publication type:
- Article
Locally private Jaccard similarity estimation.
- Published in:
- Concurrency & Computation: Practice & Experience, 2019, v. 31, n. 24, p. N.PAG, doi. 10.1002/cpe.4889
- By:
- Publication type:
- Article
Adversarial attack and defense in reinforcement learning-from AI security view.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0027-x
- By:
- Publication type:
- Article
New advances in securing cyberspace and curbing crowdturfing.
- Published in:
- 2017
- By:
- Publication type:
- Editorial
An ID-based node key management scheme based on PTPM in MANETs.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 15, p. 2816, doi. 10.1002/sec.1206
- By:
- Publication type:
- Article
A universally composable secure grouping-proof protocol for RFID tags.
- Published in:
- Concurrency & Computation: Practice & Experience, 2016, v. 28, n. 6, p. 1872, doi. 10.1002/cpe.3548
- By:
- Publication type:
- Article
Genome-wide association study identifies multiple susceptibility loci for craniofacial microsomia.
- Published in:
- Nature Communications, 2016, v. 7, n. 2, p. 10605, doi. 10.1038/ncomms10605
- By:
- Publication type:
- Article
Constructing important features from massive network traffic for lightweight intrusion detection.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 374, doi. 10.1049/iet-ifs.2014.0353
- By:
- Publication type:
- Article
Synthesis and optical properties of a D-A-D cationic cyclopentadienyl iron complex containing double arylazo chromophores.
- Published in:
- Research on Chemical Intermediates, 2015, v. 41, n. 11, p. 8245, doi. 10.1007/s11164-014-1888-y
- By:
- Publication type:
- Article
Synthesis and optical properties of two cationic cyclopentadienyliron complexes of arene containing the triphenylbutene structure.
- Published in:
- Research on Chemical Intermediates, 2015, v. 41, n. 8, p. 5095, doi. 10.1007/s11164-014-1591-z
- By:
- Publication type:
- Article
OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines.
- Published in:
- Concurrency & Computation: Practice & Experience, 2015, v. 27, n. 5, p. 1092, doi. 10.1002/cpe.3273
- By:
- Publication type:
- Article
Attribute-Based Proxy Re-Encryption with Keyword Search.
- Published in:
- PLoS ONE, 2014, v. 9, n. 12, p. 1, doi. 10.1371/journal.pone.0116325
- By:
- Publication type:
- Article