A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications
Fog/edge computing has been proposed to be integrated with Internet of Things (IoT) to
enable computing services devices deployed at network edge, aiming to improve the user's …
enable computing services devices deployed at network edge, aiming to improve the user's …
Autophagy is a critical regulator of memory CD8+ T cell formation
DJ Puleston, H Zhang, TJ Powell, E Lipina, S Sims… - Elife, 2014 - elifesciences.org
10.7554/eLife.03706.001 During infection, CD8 + T cells initially expand then contract,
leaving a small memory pool providing long lasting immunity. While it has been described that …
leaving a small memory pool providing long lasting immunity. While it has been described that …
Novel secure outsourcing of modular inversion for arbitrary and variable modulus
In cryptography and algorithmic number theory, modular inversion is viewed as one of the
most common and time-consuming operations. It is hard to be directly accomplished on …
most common and time-consuming operations. It is hard to be directly accomplished on …
Autophagy and immune senescence
With extension of the average lifespan, aging has become a heavy burden in society.
Immune senescence is a key risk factor for many age-related diseases such as cancer and …
Immune senescence is a key risk factor for many age-related diseases such as cancer and …
Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification
Verifiable Searchable Symmetric Encryption, as an important cloud security technique, allows
users to retrieve the encrypted data from the cloud through keywords and verify the validity …
users to retrieve the encrypted data from the cloud through keywords and verify the validity …
Do the rewards justify the means? measuring trade-offs between rewards and ethical behavior in the machiavelli benchmark
Artificial agents have traditionally been trained to maximize reward, which may incentivize
power-seeking and deception, analogous to how next-token prediction in language models (…
power-seeking and deception, analogous to how next-token prediction in language models (…
How to securely outsource finding the min-cut of undirected edge-weighted graphs
Finding min-cut is a fundamental operation in graph theory. It has been widely used in many
applications such as image segmentation and network partition. However, solving the min-…
applications such as image segmentation and network partition. However, solving the min-…
Mitochondria as cellular and organismal signaling hubs
Mitochondria are traditionally known as the powerhouse of the cell, but their functions extend
far beyond energy production. They are vital in cellular and organismal pathways that …
far beyond energy production. They are vital in cellular and organismal pathways that …
Towards principled disentanglement for domain generalization
A fundamental challenge for machine learning models is generalizing to out-of-distribution (OOD)
data, in part due to spurious correlations. To tackle this challenge, we first formalize …
data, in part due to spurious correlations. To tackle this challenge, we first formalize …
[PDF][PDF] Polyamines control eIF5A hypusination, TFEB translation, and autophagy to reverse B cell senescence
H Zhang, G Alsaleh, J Feltham, Y Sun, G Napolitano… - Molecular cell, 2019 - cell.com
Failure to make adaptive immune responses is a hallmark of aging. Reduced B cell function
leads to poor vaccination efficacy and a high prevalence of infections in the elderly. Here we …
leads to poor vaccination efficacy and a high prevalence of infections in the elderly. Here we …