8 research outputs found
Natural sd-RCCA secure public-key encryptions from hybrid paradigms
The existence of natural public-key encryption (PKE) schemes satisfying secretly detectable replayable CCA (sd-RCCA) security is left as open. By introducing probabilistic message authentication codes (MACs) into popular KEM plus DEM paradigms, several instances of such schemes are presented in this paper. It is known that the encrypt-then-authenticate paradigm gives an RCCA secure DEM when the underlying MAC is regular (but not strong) secure, where forgeries for old messages might be possible. By further requiring that the validity of such forgeries can be verified only secretly, sd-RCCA secure DEMs is obtained. Combining such DEMs with CCA secure KEMs gives sd-RCCA secure hybrid PKEs. We first formalize the related notions and this paradigm, and also other variants of KEM plus DEM hybrid paradigm since MACs are commonly used in them. Then we show natural examples of desired probabilistic MACs under the standard DDH assumption, and find appropriate KEMs to match the message space for those MACs and then obtain natural instances of sd-RCCA secure hybrid PKEs
Lurasidone hydrochloride
In the crystal structure of the title compound, C28H37N4O2S+·Cl− [systematic name: 4-(1,2-benzothiazol-3-yl)-1-({2-[(3,5-dioxo-4-azatricyclo[5.2.1.02,6]decan-4-yl)methyl]cyclohexyl}methyl)piperazin-1-ium chloride], the anions and cations are linked by N—H⋯Cl hydrogen bonds. The crystal structure is further stabilized by C—H⋯π and C—H⋯O interactions
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms
The existence of natural public-key encryption (PKE) schemes satisfying secretly detectable replayable CCA (sd-RCCA) security is left as open. By introducing probabilistic message authentication codes (MACs) into popular KEM plus DEM paradigms, several instances of such schemes are presented in this paper. It is known that the encrypt-then-authenticate paradigm gives an RCCA secure DEM when the underlying MAC is regular (but not strong) secure, where forgeries for old messages might be possible. By further requiring that the validity of such forgeries can be verified only secretly, sd-RCCA secure DEMs is obtained. Combining such DEMs with CCA secure KEMs gives sd-RCCA secure hybrid PKEs. We first formalize the related notions and this paradigm, and also other variants of KEM plus DEM hybrid paradigm since MACs are commonly used in them. Then we show natural examples of desired probabilistic MACs under the standard DDH assumption, and find appropriate KEMs to match the message space for those MACs and then obtain natural instances of sd-RCCA secure hybrid PKEs
Two-Level Model for Detecting Substation Defects from Infrared Images
Training a deep convolutional neural network (DCNN) to detect defects in substation equipment often requires many defect datasets. However, this dataset is not easily acquired, and the complex background of the infrared images makes defect detection even more difficult. To alleviate this issue, this article presents a two-level defect detection model (TDDM). First, to extract the target equipment in the image, an instance segmentation module is constructed by training from the instance segmentation dataset. Then, the target equipment is segmented by the superpixel segmentation algorithm into superpixels according to obtain more details information. Next, a temperature probability density distribution is constructed with the superpixels, and the defect determination strategy is used to recognize the defect. Finally, experiments verify the effectiveness of the TDDM according to the defect detection dataset
Advancements in Activating Transcription Factor 5 Function in Regulating Cell Stress and Survival
Activating transcription factor 5 (ATF5) belongs to the activating transcription factor/cyclic adenosine monophosphate (cAMP) response element-binding protein family of basic region leucine zipper transcription factors. ATF5 plays an important role in cell stress regulation and is involved in cell differentiation and survival, as well as centrosome maintenance and development. Accumulating evidence demonstrates that ATF5 plays an oncogenic role in cancer by regulating gene expressions involved in tumorigenesis and tumor survival. Recent studies have indicated that ATF5 may also modify the gene expressions involved in other diseases. This review explores in detail the regulation of ATF5 expression and signaling pathways and elucidates the role of ATF5 in cancer biology. Furthermore, an overview of putative therapeutic strategies that can be used for restoring aberrant ATF5 activity in different cancer types is provided
DMRNet plus plus : Learning Discriminative Features With Decoupled Networks and Enriched Pairs for One-Step Person Search
10.1109/TPAMI.2022.3221079IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE4567319-733