EXPLOIT

作品数:94被引量:57H指数:4
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:于磊龚晓锐刘宝旭李晓棣贾云飞更多>>
相关机构:江苏大学煤炭工业节能技术服务中心煤炭科学研究总院东南大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金泰国研究基金中国博士后科学基金北京市重点实验室更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Macrophages exploit the mannose receptor and JAK-STAT1- MHC-Ⅱ pathway to drive antigen presentation and the antimycobacterial immune response after BCG vaccination被引量:1
《Acta Biochimica et Biophysica Sinica》2024年第8期1130-1144,共15页Ying Zhang Dandan Xu Qi Nie Jing Wang Dan Fang Yan Xie Huang Xiong Qin Pan Xiao-Lian Zhang 
supported by the grants from the National Key R&D Program of China(Nos.2022YFA1303500 and 2018YFA0507603);the National Natural Science Foundation of China(Nos.82230078,22077097,91740120,21721005,82272978 and 21572173);the Fundamental Research Funds for the Central Universities.
Tuberculosis(TB),caused by Mycobacterium tuberculosis(M.tb),remains one of the leading causes of fatal infectious diseases worldwide.The only licensed vaccine,Mycobacterium bovis Bacillus Calmette-Guérin(BCG),has var...
关键词:BCG vaccine mannose receptor MACROPHAGE antigen presentation 
AppChainer:investigating the chainability among payloads in android applications
《Cybersecurity》2023年第4期182-200,共19页Xiaobo Xiang Yue Jiang Qingli Guo Xiu Zhang Xiaorui Gong Baoxu Liu 
This work was supported by the Strategic Priority Research Program of Chinese Academy of Sciences(No.XDC02040100).
Statistics show that more than 80 applications are installed on each android smartphone.Vulnerability research on Android applications is of critical importance.Recently,academic researchers mainly focus on single bug...
关键词:Android security Vulnerability exploit Payload chain 
Shaping free-electron radiation via van der Waals heterostructures
《Light(Science & Applications)》2023年第8期1457-1458,共2页Xiao Lin Hongsheng Chen 
The van der Waals heterostructures with aperiodic stackings have been exploited to shape the spatiotemporal wavefront of free-electron X-ray radiation.
关键词:free STACKING EXPLOIT 
Al-powered drone-based automated inspection of FAST
《Light(Science & Applications)》2023年第3期327-328,共2页Lijun Wang 
Automated optical inspection of FAST is realized by exploiting advances in drone technology and deep-learning techniques.The Al-powered drone-based automated inspection is time-efficient and reliable,which guarantees ...
关键词:AUTOMATED FAST EXPLOIT 
Investigation of Android Malware with Machine Learning Classifiers using Enhanced PCA Algorithm被引量:1
《Computer Systems Science & Engineering》2023年第3期2147-2163,共17页V.Joseph Raymond R.Jeberson Retna Raj 
Android devices are popularly available in the commercial market at different price levels for various levels of customers.The Android stack is more vulnerable compared to other platforms because of its open-source na...
关键词:Zero-day exploit hybrid analysis principal component analysis supervised learning smart cities 
Dawn of a New Era for Membrane Protein Design
《BioDesign Research》2022年第1期337-353,共17页Shahin Sowlati-Hashjin Aanshi Gandhi Michael Garton 
The authors wish to acknowledge the Canadian Institute for Health Research(CIHR)funding that supported this work.
A major advancement has recently occurred in the ability to predict protein secondary structure from sequence using artificialneural networks. This new accessibility to high-quality predicted structures provides a big...
关键词:artificial NEURAL EXPLOIT 
Rapid species identification of pathogenic bacteria from a minute quantity exploiting three-dimensional quantitative phase imaging and artificial neural network被引量:3
《Light(Science & Applications)》2022年第7期1595-1606,共12页Geon Kim Daewoong Ahn Minhee Kang Jinho Park DongHun Ryu YoungJu Jo Jinyeop Song Jea Sung Ryu Gunho Choi Hyun Jung Chung Kyuseok Kim Doo Ryeon Chung In Young Yoo Hee Jae Huh Hyun-seok Min Nam Yong Lee YongKeun Park 
supported by KAIST Up Program,BK21+program,Tomocube,National Research Foundation of Korea(2015R1A3A2066550);KAIST Institute of Technology Value Creation,Industry Liaison Center(G-COFE Project)grant funded by the Ministry of Science and ICT(N11210014.N11220131);Institute of Information&communicarions Technology Planning&Evaluation(ITP:2021-0-00745)grant funded by the Korea government(MSIT);the Commercialzation Promotion Agency for P&D Outcomes(COMPA:055586)funded by the Korea government.
The healthcare industry is in dire need of rapid microbial identification techniques for treating microbial infections.Microbial infections are a major healthcare issue worldwide,as these widespread diseases often dev...
关键词:artificial NEURAL EXPLOIT 
基于深度图卷积神经网络的Exploit Kit攻击活动检测方法被引量:2
《信息安全研究》2022年第7期685-693,共9页刘小乐 方勇 黄诚 许益家 
国家自然科学基金项目(U20B2045)。
攻击者使用漏洞利用工具包(exploit kit, EK)对软件系统、浏览器及其插件中存在的漏洞进行利用,达到隐蔽传播恶意负载的意图.传统EK攻击活动检测方法通过提取网络流量中的url进行静态分析,忽略了EK攻击活动产生的网络流量数据包之间的...
关键词:漏洞利用工具包 HTTP请求响应对 重定向图 深度图卷积神经网络 深度学习 图分类 
New antivirals exploit viral feedback tricks for a cure without resistance
《四川生理科学杂志》2022年第6期1098-1098,共1页Gabor Balazsi 
Many approved drugs,including antivirals,are small-molecule inhibitors of disease-causing proteins.Such inhibitors often elicit resistance during treatment.Chaturvedi et al.propose new,feedback-disruptor(FD)antivirals...
关键词:al. DRUGS RESISTANCE 
A simple denoising approach to exploit multi-fidelity data for machine learning materials properties被引量:1
《npj Computational Materials》2022年第1期2226-2238,共13页Xiaotong Liu Pierre-Paul De Breuck Linghui Wang Gian-Marco Rignanese 
X.T.L.is grateful for the funding support from National Natural Science Foundation of China(No.22002008,22203008);P.-P.D.B.and G.-M.R.are grateful to the F.R.S.-FNRS for financial support.
Machine-learning models have recently encountered enormous success for predicting the properties of materials.These are often trained based on data that present various levels of accuracy,with typically much less high...
关键词:APPROACH learning EXPLOIT 
检索报告 对象比较 聚类工具 使用帮助 返回顶部