搜索结果: 1-15 共查到“知识库 signal”相关记录410条 . 查询时间(0.109 秒)
Two environmental signal-driven RNA metabolic processes: alternative splicing and translation
alternative splicing environmental signal receptor kinase RNA metabolism
2023/11/16
Plants live in fixed locations and have evolved adaptation mechanisms that integrate multiple responses to various environmental signals. Among the different components of these response pathways, rec...
Signal Transduction and Targeted Therapy丨柳素玲团队等发现趋化因子CCL20通过重塑肿瘤免疫微环境促进乳腺癌进展的新机制(图)
乳腺癌 肿瘤干细胞 肿瘤恶性 生物医学研究院
2023/4/13
肿瘤微环境(tumor microenvironment,TME)在肿瘤恶性和治疗抵抗中发挥着重要作用。近年来,根据TME特点挖掘潜在靶点并开发安全有效的免疫疗法逐渐成为乳腺癌治疗的研究热点。2018年7月27日,复旦大学生物医学研究院/附属肿瘤医院柳素玲团队在PLOS Biology杂志在线发表了题为CCL20 triggered by chemotherapy hinders the ther...
周玉峰团队在《Signal Transduction and Targeted Therapy》上发表Covid-19感染的细胞因子风暴信号通路和治疗的长篇综述(图)
COVID-19 周玉峰团队 细胞因子 免疫球蛋白 糖皮质激素
2023/4/17
2021年7月7日,复旦大学生物医学研究院/附属儿科医院周玉峰研究员与英国格拉斯哥大学/深圳大学医学院徐大模教授合作在Signal Transduction and Targeted Therapy杂志上发表了一篇题为The signal pathways and treatment of cytokine storm in COVID-19 的长篇综述。
Structural Aspects of Plant Hormone Signal Perception and Regulation by Ubiquitin Ligases
phytohormone signaling Ubiquitin Ligases Structural Aspects
2024/2/4
Hormonal cues regulate many aspects of plant growth and development, facilitating the plant's ability to systemically respond to environmental changes. Elucidating the molecular mechanisms governing t...
In 2017, a practical attack, referred to as the signal leakage attack, against reconciliation-based RLWE key exchange protocols was proposed. In particular, this attack can recover a long-term private...
Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction
AMS security logic locking process variations
2018/11/12
Similar to digital circuits, analog and mixed-signal (AMS) circuits are also susceptible to supply-chain attacks such as piracy, overproduction, and Trojan insertion. However, unlike digital circuits,...
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol
Signal protocol double ratcheting secure messaging
2018/11/2
Signal is a famous secure messaging protocol used by billions of people, by virtue of many secure text messaging applications including Signal itself, WhatsApp, Facebook Messenger, Skype, and Google A...
PERFORMANCE ANALYSIS OF SISPELSAT MSK-DGNSS RADIO SIGNAL IN PENINSULAR MALAYSIA
Radio Beacon MSK SISPELSAT DGPS GPS GNSS
2018/11/8
The use of Global Navigation Satellite System (GNSS) has become essential in providing location based information and navigation. Due to low accuracy of navigation solution, differential technique suc...
Complete Attack on RLWE Key Exchange with reused keys, without Signal Leakage
RLWE key exchange post quantum
2017/12/13
Key Exchange (KE) from RLWE (Ring-Learning with Errors) is a potential alternative to Diffie-Hellman (DH) in a post quantum setting. Key leakage with RLWE key exchange protocols in the context of key ...
Signal dimensionality and the emergence of combinatorial structure
Signal spaces Artificial language experiments Linguistic modalities
2017/8/31
In language, a small number of meaningless building blocks can be combined into an unlimited set of meaningful utterances. This is known as combinatorial structure. One hypothesis for the initial emer...
Many natural auditory signals, including music and language, change periodically. The effect of such auditory rhythms on the brain is unclear however. One widely held view, dynamic attending theory, p...
More is Less: How Group Chats Weaken the Security of Instant Messengers Signal, WhatsApp, and Threema
End-to-End Encryption Group Communication Broadcast
2017/7/28
Secure Instant Messaging (SIM) is utilized in two variants: one-to-one communication and group communication. While the first variant has received much attention lately (Frosch et al., EuroS&P16; Cohn...
Leakage of Signal function with reused keys in RLWE key exchange
RLWE key exchange post quantum
2017/1/3
In this paper, we show that the signal function used in RLWE key exchange could leak information to find the secret ss of a reused public key p=as+2ep=as+2e. This work is motivated by an attack propos...
Implantable Medical Devices (IMDs) are used to monitor and control patients with chronic diseases. A growing number of IMDs are equipped with a wireless interface that allows non-invasive monitoring a...
A Formal Security Analysis of the Signal Messaging Protocol
protocols messaging post-compromise security
2016/12/8
Signal is a new security protocol and accompanying app that provides end-to-end encryption for
instant messaging. The core protocol has recently been adopted by WhatsApp, Facebook Messenger, and
Goo...