期刊文献+
共找到596篇文章
< 1 2 30 >
每页显示 20 50 100
Plant Chemical Defenses against Insect Herbivores—Using theWild Tobacco as a Model
1
作者 Guangwei Sun Xuanhao Zhang +4 位作者 Yi Liu Liguang Chai Daisong Liu Zhenguo Chen Shiyou Lü 《Phyton-International Journal of Experimental Botany》 SCIE 2024年第4期641-659,共19页
The Nicotiana genus, commonly known as tobacco, holds significant importance as a crucial economic crop. Confrontedwith an abundance of herbivorous insects that pose a substantial threat to yield, tobacco has develope... The Nicotiana genus, commonly known as tobacco, holds significant importance as a crucial economic crop. Confrontedwith an abundance of herbivorous insects that pose a substantial threat to yield, tobacco has developed adiverse and sophisticated array of mechanisms, establishing itself as a model of plant ecological defense. Thisreview provides a concise overview of the current understanding of tobacco’s defense strategies against herbivores.Direct defenses, exemplified by its well-known tactic of secreting the alkaloid nicotine, serve as a potent toxinagainst a broad spectrum of herbivorous pests. Moreover, in response to herbivore attacks, tobacco enhancesthe discharge of volatile compounds, harnessing an indirect strategy that attracts the predators of the herbivores.The delicate balance between defense and growth leads to the initiation of most defense strategies only after aherbivore attack. Among plant hormones, notably jasmonic acid (JA), play central roles in coordinating thesedefense processes. JA signaling interacts with other plant hormone signaling pathways to facilitate the extensivetranscriptional and metabolic adjustments in plants following herbivore assault. By shedding light on these ecologicaldefense strategies, this review emphasizes not only tobacco’s remarkable adaptability in its natural habitatbut also offers insights beneficial for enhancing the resilience of current crops. 展开更多
关键词 TOBACCO HERBIVORE chemical defense jasmonic acid REGULATION
下载PDF
An Overview of Adversarial Attacks and Defenses
2
作者 Kai Chen Jinwei Wang Jiawei Zhang 《Journal of Information Hiding and Privacy Protection》 2022年第1期15-24,共10页
In recent years,machine learning has become more and more popular,especially the continuous development of deep learning technology,which has brought great revolutions to many fields.In tasks such as image classificat... In recent years,machine learning has become more and more popular,especially the continuous development of deep learning technology,which has brought great revolutions to many fields.In tasks such as image classification,natural language processing,information hiding,multimedia synthesis,and so on,the performance of deep learning has far exceeded the traditional algorithms.However,researchers found that although deep learning can train an accurate model through a large amount of data to complete various tasks,the model is vulnerable to the example which is modified artificially.This technology is called adversarial attacks,while the examples are called adversarial examples.The existence of adversarial attacks poses a great threat to the security of the neural network.Based on the brief introduction of the concept and causes of adversarial example,this paper analyzes the main ideas of adversarial attacks,studies the representative classical adversarial attack methods and the detection and defense methods. 展开更多
关键词 Deep learning adversarial example adversarial attacks adversarial defenses
下载PDF
Biological Defenses against Ultra-Violet, Visible Light, and Near-Infrared Exposure
3
作者 Yohei Tanaka Hideki Motomura Masafumi Jinno 《Optics and Photonics Journal》 2016年第1期8-14,共7页
Objective: Humans are increasingly exposed to artificial light and electromagnetic wave radiation, in addition to solar radiation. Many studies have shown the biological effects of ultra-violet and near-infrared expos... Objective: Humans are increasingly exposed to artificial light and electromagnetic wave radiation, in addition to solar radiation. Many studies have shown the biological effects of ultra-violet and near-infrared exposure, but few have extensively investigated the innate biological defenses within human tissues against visible light and near-infrared exposure. Herein, we investigated spectral properties of endogenous human biological defenses against ultra-violet to near-infrared. Methods: A double-beam spectrophotometer (190 - 2700 nm) was used to measure the transmission spectra of a saline solution used to imitate perspiration, and oil to imitate sebum, as well as human skin, blood, adipose tissue, and muscle. Results: Saline (thickness, 0.5 mm) blocked 27.5% - 98.6% of ultra-violet, 13.2% - 34.3% of visible light, and 10.7% - 99.8% of near-infrared. Oil (thickness, 0.5 mm) blocked 50.5% - 100% of ultra-violet, 28.7% - 54.8% of visible light, and 19.0% - 98.3% of near-infrared. Blood thicknesses of 0.05 and 0.5 mm blocked over 97.8%, 100% of ultra-violet, over 94.6%, 99.7% of visible light, and over 75.8%, 99.4% of near-infrared, respectively. Skin thicknesses of 0.25 and 0.5 mm blocked over 99.4%, 100% of ultra-violet and over 94.3%, 99.7% of visible light, and over 74.7%, 93.5% of near-infrared, respectively. Adipose tissue thickness of 0.25 and0.5 mm blocked over 98.3%, 100% of ultra-violet, over 94.7%, 99.7% of visible light, and over 88.1%, 98.6% of near-infrared, respectively. Muscle thickness of 0.25 and0.5 mm blocked over 95.4%, 99.8% of ultra-violet, over 93.1%, 99.5% of visible light, and over 86.9%, 98.3% of near-infrared, respectively. Conclusions: Humans possess endogenous biological protection against ultra-violet, visible light and near-infrared exposure on multiple levels, including through perspiration, sebum, blood, skin, adipose tissue, and muscle. Since solar and artificial radiation affects human tissues, biological defenses made of biological materials may be induced to protect subcutaneous tissues against these wavelengths. 展开更多
关键词 Biological defenses NEAR-INFRARED Ultra-Violet Visible Light
下载PDF
(E)-Nerolidol is a volatile signal that induces defenses against insects and pathogens in tea plants 被引量:15
4
作者 Shenglong Chen Liping Zhang +6 位作者 Xiaoming Cai Xin Li Lei Bian Zongxiu Luo Zhaoqun Li Zongmao Chen Zhaojun Xin 《Horticulture Research》 SCIE 2020年第1期2152-2166,共15页
Plants release large amounts of volatile organic compounds(VOCs)in response to attackers.Several VOCs can serve as volatile signals to elicit defense responses in undamaged tissues and neighboring plants,but many ques... Plants release large amounts of volatile organic compounds(VOCs)in response to attackers.Several VOCs can serve as volatile signals to elicit defense responses in undamaged tissues and neighboring plants,but many questions about the ecological functions of VOCs remain unanswered.Tea plants are impacted by two harmful invaders,the piercing herbivore Empoasca(Matsumurasca)onukii Matsuda and the pathogen Colletotrichum fructicola.To determine the VOC signals in tea,we confirmed CsOPR3 as a marker gene and set up a rapid screening method based on a 1.51 kb CsOPR3 promoter fused with aβ-glucuronidase(GUS)reporter construct(OPR3p::GUS)in Arabidopsis.Using this screening system,a terpenoid volatile(E)-nerolidol was identified as a potent signal that elicits plant defenses.The early responses triggered by(E)-nerolidol included the activation of a mitogen-activated protein kinase and WRKY,an H2O2 burst,and the induction of jasmonic acid and abscisic acid signaling.The induced plants accumulated high levels of defenserelated chemicals,which possessed broad-spectrum anti-herbivore or anti-pathogen properties,and ultimately triggered resistance against Empoasca onukii and Colletotrichum fructicola in tea.We propose that these findings can supply an environmentally friendly management strategy for controlling an insect pest and a disease of tea plants. 展开更多
关键词 VOLATILE DEFENSE neighboring
下载PDF
Adversarial Attacks and Defenses in Deep Learning 被引量:12
5
作者 Kui Ren Tianhang Zheng +1 位作者 Zhan Qin Xue Liu 《Engineering》 SCIE EI 2020年第3期346-360,共15页
With the rapid developments of artificial intelligence(AI)and deep learning(DL)techniques,it is critical to ensure the security and robustness of the deployed algorithms.Recently,the security vulnerability of DL algor... With the rapid developments of artificial intelligence(AI)and deep learning(DL)techniques,it is critical to ensure the security and robustness of the deployed algorithms.Recently,the security vulnerability of DL algorithms to adversarial samples has been widely recognized.The fabricated samples can lead to various misbehaviors of the DL models while being perceived as benign by humans.Successful implementations of adversarial attacks in real physical-world scenarios further demonstrate their practicality.Hence,adversarial attack and defense techniques have attracted increasing attention from both machine learning and security communities and have become a hot research topic in recent years.In this paper,we first introduce the theoretical foundations,algorithms,and applications of adversarial attack techniques.We then describe a few research efforts on the defense techniques,which cover the broad frontier in the field.Several open problems and challenges are subsequently discussed,which we hope will provoke further research efforts in this critical area. 展开更多
关键词 Machine learning Deep neural network Adversarial example Adversarial attack Adversarial defense
下载PDF
Silencing JA hydroxylases in Nicotiana attenuata enhances jasmonic acid-isoleucine-mediated defenses against Spodoptera litura 被引量:2
6
作者 Jinxiang Tang Dahai Yang +2 位作者 Jianqiang Wu Suiyun Chen Lei Wang 《Plant Diversity》 SCIE CAS CSCD 2020年第2期111-119,共9页
Jasmonic acid(JA)plays important roles in plant resistance to insect herbivores.One important derivative of JA is 12-OH-JA,which is produced by two independent pathways:direct hydroxylation of JA by jasmonate-induced ... Jasmonic acid(JA)plays important roles in plant resistance to insect herbivores.One important derivative of JA is 12-OH-JA,which is produced by two independent pathways:direct hydroxylation of JA by jasmonate-induced oxygenases(JOXs)or hydrolyzation of 12-OH-JA-Ile.Yet the function of 12-OH-JA in plant-herbivore interactions remains largely unknown.In this study,we silenced four JOX homologs independently in the wild tobacco Nicotiana attenuata by virus-induced gene silencing(VIGS),and found that all four JOX homologs are involved in JA hydroxylation.Simultaneously silencing the four JA hydroxylases in VIGS-NaJOXs plants decreased herbivory-induced 12-OH-JA by 33%,but JA and JA-Ile levels increased by 45%and 30%,respectively,compared to those in control plants.Compared to direct hydroxylation from JA,hydrolyzation from 12-OH-JA-Ile is equally important for herbivory-induced 12-OHJA accumulation:in the 12-OH-JA-Ile deficient irJAR4/6 plants,12-OH-JA decreased 34%.Moreover,VIGSNaJOXs plants exhibited enhanced resistance to the generalist herbivore Spodoptera litura.The poor larval performance was strongly correlated with high levels of several JA-Ile-dependent direct defense metabolites in the VIGS-NaJOXs plants.When we simultaneously silenced all four JA hydroxylases in the JAIle-deficient irJAR4/6 background,the enhanced herbivore resistance diminished,demonstrating that enhanced herbivore resistance resulted from elevated JA-Ile levels.Given that silencing these NaJOX-like genes did not detectably alter plant growth but highly increased plant defense levels,we propose that JOX genes are potential targets for genetic improvement of herbivore-resistant crops. 展开更多
关键词 JA metabolism 12-OH-JA SPODOPTERA litura 2-Oxoglutarate oxygenase HERBIVORE defense Nicotiana attenuata
下载PDF
Immediate–Early(IE) gene regulation of cytomegalovirus:IE1-and pp71-mediated viral strategies against cellular defenses 被引量:2
7
作者 Lilith Torres Qiyi Tang 《Virologica Sinica》 SCIE CAS CSCD 2014年第6期343-352,共10页
Three crucial hurdles hinder studies on human cytomegalovirus(HCMV): strict species specificity, differences between in vivo and in vitro infection, and the complexity of gene regulation. Ever since the sequencing of ... Three crucial hurdles hinder studies on human cytomegalovirus(HCMV): strict species specificity, differences between in vivo and in vitro infection, and the complexity of gene regulation. Ever since the sequencing of the whole genome was first accomplished, functional studies on individual genes have been the mainstream in the CMV field. Gene regulation has therefore been elucidated in a more detailed fashion. However, viral gene regulation is largely controlled by both cellular and viral components. In other words, viral gene expression is determined by the virus–host interaction. Generally, cells respond to viral infection in a defensive pattern; at the same time, viruses try to counteract the cellular defense or else hide in the host(latency). Viruses evolve effective strategies against cellular defense in order to achieve replicative success. Whether or not they are successful, cellular defenses remain in the whole viral replication cycle: entry, immediate–early(IE) gene expression, early gene expression, DNA replication, late gene expression, and viral egress. Many viral strategies against cellular defense, and which occur in the immediate–early time of viral infection, have been documented. In this review, we will summarize the documented biological functions of IE1 and pp71 proteins, especially with regard to how they counteract cellular intrinsic defenses. 展开更多
关键词 cytomegalovirus(CMV) major IMMEDIATE EARLY promoter(MIEP) IE1 pp71 nuclear domain 10(ND10) intrinsic CELLULAR defense enhancer virus-host interaction
下载PDF
Dynamic defenses in cyber security:Techniques,methods and challenges Author links open overlay panel 被引量:1
8
作者 Yu Zheng Zheng Li +1 位作者 Xiaolong Xu Qingzhan Zhao 《Digital Communications and Networks》 SCIE CSCD 2022年第4期422-435,共14页
Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human activities.Howe... Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human activities.However,security problems in cyberspace are becoming serious,and traditional defense measures(e.g.,firewall,intrusion detection systems,and security audits)often fall into a passive situation of being prone to attacks and difficult to take effect when responding to new types of network attacks with a higher and higher degree of coordination and intelligence.By constructing and implementing the diverse strategy of dynamic transformation,the configuration characteristics of systems are constantly changing,and the probability of vulnerability exposure is increasing.Therefore,the difficulty and cost of attack are increasing,which provides new ideas for reversing the asymmetric situation of defense and attack in cyberspace.Nonetheless,few related works systematically introduce dynamic defense mechanisms for cyber security.The related concepts and development strategies of dynamic defense are rarely analyzed and summarized.To bridge this gap,we conduct a comprehensive and concrete survey of recent research efforts on dynamic defense in cyber security.Specifically,we firstly introduce basic concepts and define dynamic defense in cyber security.Next,we review the architectures,enabling techniques and methods for moving target defense and mimic defense.This is followed by taxonomically summarizing the implementation and evaluation of dynamic defense.Finally,we discuss some open challenges and opportunities for dynamic defense in cyber security. 展开更多
关键词 Cyber security Dynamic defense Moving target defense Mimic defense
下载PDF
<i>Rhizobium</i>alters inducible defenses in broad bean, <i>Vicia faba</i>
9
作者 Edward Brian Mondor Misty Cree Summers 《Open Journal of Ecology》 2011年第3期57-62,共6页
Conversion of inorganic nitrogen by mutualistic nitrogen-fixing bacteria is essential for plant growth and reproduction, as well as the development of chemical and mechanical defenses. It is unclear, however, how thes... Conversion of inorganic nitrogen by mutualistic nitrogen-fixing bacteria is essential for plant growth and reproduction, as well as the development of chemical and mechanical defenses. It is unclear, however, how these bacteria alter co-occurring symbioses at higher trophic levels;e.g., extrafloral nectary (EFN) induction, in response to herbivory, to attract defensive mutualists. We hypothesized that plants colonized by nitrogen-fixing bacteria would mount a larger inducible, defensive response than plants lacking symbioses, as defensive traits are costly. We predicted that bean plants, Vicia faba L., harboring Rhizobium leguminosarum bv. viciae Frank would produce more EFNs upon leaf damage, than plants lacking the symbionts, as EFN induction in V. faba is resource-dependent. Here we report that V. faba colonized by R. leguminosarum produced similar numbers of EFNs as did plants without symbionts. Plants with symbionts, however, produced significantly fewer EFNs over 1 week in response to leaf damage, than those without leaf damage. As such, nitrogen-fixing bacteria may not always benefit the host plant, but rather, the utility of these bacteria may be dependent on the prevailing ecological conditions. 展开更多
关键词 Extrafloral NECTARY Inducible Defense MUTUALISM Phenotypic Plasticity RHIZOBIA
下载PDF
Maternal Environment Effects on Phenolic Defenses in <i>Abutilon theophrasti</i>Seeds
10
作者 Brian J. Schutte Sam E. Wortman +1 位作者 John L. Lindquist Adam S. Davis 《American Journal of Plant Sciences》 2013年第5期1127-1133,共7页
A class of phenolic compounds, ortho-dihydroxyphenols (hereafter “o-DHP”), has been implicated with seed survival. Based on expectations of the growth-differentiation balance hypothesis, we predicted that seed o-DHP... A class of phenolic compounds, ortho-dihydroxyphenols (hereafter “o-DHP”), has been implicated with seed survival. Based on expectations of the growth-differentiation balance hypothesis, we predicted that seed o-DHP concentration exhibits a curvilinear response to increasing resource availability in the maternal environment, with maximum o-DHP occurring at moderate resource levels. To test this hypothesis, Abutilon theophrasti seeds were produced under field conditions at two locations. Each location included twelve maternal environments established through factorial combinations of soil compost (+/-), species assemblage (A. theophrasti with and without maize), and soil nitrogen fertilizer (0, 0.5× or 1× local recommendations for maize). Resource availability with respect to A. theophrasti growth was summarized by above-ground biomass at seed harvest (maternal biomass). Results indicated that seed o-DHP concentrations increased then decreased in response to increasing maternal biomass. This relationship was modeled with a unimodal function specific to location (Location 1, y = 1.18 + 0.03xe-0.02x, pseudo-R2 = 0.59, p = 0.003;Location 2, y = 1.40 + 0.006xe-0.005x;pseudo-R2 = 0.34, p = 0.05). Seed protein concentrations remained constant across maternal biomass levels. Because inherent vulnerability to predation and decay is considered a consequence of chemical protection relative to nutritional offering, our results suggest that A. theophrasti seed susceptibility to lethal attack is influenced by resource levels in the maternal environment. More broadly, our results suggest that the growth-differentiation balance hypothesis can be extended to maternal effects on seed phenolics. 展开更多
关键词 Environmental Maternal Effect Growth-Differentiation Balance Hypothesis ortho-Dihydroxyphenols SEED Defense SEED Protein
下载PDF
Spirulina platensis extract improves the production and defenses of the common bean grown in a heavy metals-contaminated saline soil
11
作者 Mostafa M.Rady Ahmed S.Elrys +5 位作者 Eman Selem Ahmed A.A.Mohsen Safaa M.A.I.Arnaout Ahmed H.El-Sappah Khaled A.El-Tarabily El-Sayed M.Desoky 《Journal of Environmental Sciences》 SCIE EI CAS CSCD 2023年第7期240-257,共18页
Plants have to cope with several abiotic stresses,including salinity and heavymetals(HMs).Under these stresses,several extracts have been used as effective natural biostimulants,however,the use of Spirulina platensis(... Plants have to cope with several abiotic stresses,including salinity and heavymetals(HMs).Under these stresses,several extracts have been used as effective natural biostimulants,however,the use of Spirulina platensis(SP)extract(SPE)remains elusive.The effects of SPE were evaluated as soil addition(SA)and/or foliar spraying(FS)on antioxidant defenses and HMs content of common bean grown in saline soil contaminated with HMs.Individual(40 or 80 mg SPE/hill added as SA or 20 or 40 mg SPE/plant added as FS)or integrative(SA+FS)applications of SPE showed significant improvements in the following order:SA-80+FS-40>SA-80+FS-20>SA-40+FS-40>SA-40+FS-20>SA-80>SA-40>FS-40>FS-20>control.Therefore,the integrative SA+FS with 40 mg SP/plant was the most effective treatment in increasing plant growth and production,overcoming stress effects and minimizing contamination of the edible part.It significantly increased plant growth(74%–185%)and yield(107%–227%)by enhancing net photosynthetic rate(78.5%),stomatal conductance(104%),transpiration rate(124%),and contents of carotenoids(60.0%),chlorophylls(49%–51%),and NPK(271%–366%).These results were concurrent with the marked reductions in malondialdehyde(61.6%),hydrogen peroxide(42.2%),nickel(91%–94%),lead(80%–9%),and cadmium(74%–91%)contents due to the improved contents of glutathione(87.1%),ascorbate(37.0%),andα-tocopherol(77.2%),and the activities of catalase(18.1%),ascorbate peroxidase(18.3%),superoxide dismutase(192%),and glutathione reductase(52.2%)as reinforcing mechanisms.Therefore,this most effective treatment is recommended to mitigate the stress effects of salinity and HMs on common bean production while minimizing HMs in the edible part. 展开更多
关键词 Antioxidant defense system Biostimulants Heavy metals Microalgae extracts Saline soil Soil pollution
原文传递
CORMAND2--针对工业机器人的欺骗攻击
12
作者 Hongyi Pu Liang He +2 位作者 Peng Cheng Jiming Chen Youxian Sun 《Engineering》 SCIE EI CAS CSCD 2024年第1期186-201,共16页
Industrial robots are becoming increasingly vulnerable to cyber incidents and attacks,particularly with the dawn of the Industrial Internet-of-Things(lloT).To gain a comprehensive understanding of these cyber risks,vu... Industrial robots are becoming increasingly vulnerable to cyber incidents and attacks,particularly with the dawn of the Industrial Internet-of-Things(lloT).To gain a comprehensive understanding of these cyber risks,vulnerabilities of industrial robots were analyzed empirically,using more than three million communication packets collected with testbeds of two ABB IRB120 robots and five other robots from var-ious original equipment manufacturers(OEMs).This analysis,guided by the confidentiality-integrity-availability(CIA)triad,uncovers robot vulnerabilities in threedimensions:confidentiality,integrity,and availability.These vulnerabilities were used to design Covering Robot Manipulation via Data Deception(CORMAND2),an automated cyber-physical attack against industrial robots.CORMAND2 manipulates robot operation while deceiving the SupervisoryControl and Data Acquisition(SCADA)system that the robot is operating normally by modifying the robot's movement data and data deception.CORMAND2 and its capability of degrading the manufacturing was validated experimentally using the aforementioned seven robots from six different OEMs.CORMAND2 unveils the limitations of existing anomaly detection systems,more specifically the assumption of the authenticity of SCADA-received movement data,to which we propose mitigations for. 展开更多
关键词 Industrial robots Vulnerability analysis Deception attacks defenses
下载PDF
Adversarial Attacks and Defenses in Images, Graphs and Text: A Review 被引量:16
13
作者 Han Xu Yao Ma +4 位作者 Hao-Chen Liu Debayan Deb Hui Liu Ji-Liang Tang Anil K.Jain 《International Journal of Automation and computing》 EI CSCD 2020年第2期151-178,共28页
Deep neural networks(DNN)have achieved unprecedented success in numerous machine learning tasks in various domains.However,the existence of adversarial examples raises our concerns in adopting deep learning to safety-... Deep neural networks(DNN)have achieved unprecedented success in numerous machine learning tasks in various domains.However,the existence of adversarial examples raises our concerns in adopting deep learning to safety-critical applications.As a result,we have witnessed increasing interests in studying attack and defense mechanisms for DNN models on different data types,such as images,graphs and text.Thus,it is necessary to provide a systematic and comprehensive overview of the main threats of attacks and the success of corresponding countermeasures.In this survey,we review the state of the art algorithms for generating adversarial examples and the countermeasures against adversarial examples,for three most popular data types,including images,graphs and text. 展开更多
关键词 Adversarial EXAMPLE model safety ROBUSTNESS defenses deep learning
原文传递
Global Change Effects on Plant Chemical Defenses against Insect Herbivores 被引量:13
14
作者 M.Gabriela Bidart-Bouzat Adebobola Imeh-Nathaniel 《Journal of Integrative Plant Biology》 SCIE CAS CSCD 2008年第11期1339-1354,共16页
This review focuses on individual effects of major global change factors, such as elevated CO2, O3, UV light and temperature, on plant secondary chemistry. These secondary metabolites are well-known for their role in ... This review focuses on individual effects of major global change factors, such as elevated CO2, O3, UV light and temperature, on plant secondary chemistry. These secondary metabolites are well-known for their role in plant defense against insect herbivory. Global change effects on secondary chemicals appear to be plant species-specifc and dependent on the chemical type. Even though plant chemical responses induced by these factors are highly variable, there seems to be some specificity in the response to different environmental stressors. For example, even though the production of phenolic compounds is enhanced by both elevated CO2 and UV light levels, the latter appears to primarily increase the concentrations of flavonoids. Likewise, specific phenolic metabolites seem to be induced by O3 but not by other factors, and an increase in volatile organic compounds has been particularly detected under elevated temperature. More information is needed regarding how global change factors influence inducibility of plant chemical defenses as well as how their indirect and direct effects impact insect performance and behavior, herbivory rates and pathogen attack. This knowledge is crucial to better understand how plants and their associated natural enemies will be affected in future changing environments. 展开更多
关键词 elevated CO2 global climate change insect herbivory OZONE plant chemical defenses plant-insect interactions plant secondary metabolites TEMPERATURE tri-trophic interactions UV light.
原文传递
The βC1 Protein of Gem,n,v,rus--Betasatellite Complexes:A Target and Repressor of Host Defenses 被引量:6
15
作者 Fangfang Li Xiuling Yang +1 位作者 David M.Bisaro Xueping Zhou 《Molecular Plant》 SCIE CAS CSCD 2018年第12期1424-1426,共3页
Geminiviruses are a family of plant viruses that cause devastating diseases in many economically important crops worldwide. These pathogens encapsidate circular,single-stranded DNAs (ssDNAs)of 2.5-3.0 kb that replicat... Geminiviruses are a family of plant viruses that cause devastating diseases in many economically important crops worldwide. These pathogens encapsidate circular,single-stranded DNAs (ssDNAs)of 2.5-3.0 kb that replicate through double-stranded DNA (dsDNA)intermediates.Members of the genus Begomovirus,which comprises by far the largest number of species in the family,are transmitted by whiteflies and have genomes consisting of one or two DNAs. 展开更多
关键词 βC1 PROTEIN Host defenses
原文传递
Threats,attacks and defenses to federated learning:issues,taxonomy and perspectives 被引量:3
16
作者 Pengrui Liu Xiangrui Xu Wei Wang 《Cybersecurity》 EI CSCD 2022年第2期56-74,共19页
Empirical attacks on Federated Learning(FL)systems indicate that FL is fraught with numerous attack surfaces throughout the FL execution.These attacks can not only cause models to fail in specific tasks,but also infer... Empirical attacks on Federated Learning(FL)systems indicate that FL is fraught with numerous attack surfaces throughout the FL execution.These attacks can not only cause models to fail in specific tasks,but also infer private information.While previous surveys have identified the risks,listed the attack methods available in the literature or provided a basic taxonomy to classify them,they mainly focused on the risks in the training phase of FL.In this work,we survey the threats,attacks and defenses to FL throughout the whole process of FL in three phases,including Data and Behavior Auditing Phase,Training Phase and Predicting Phase.We further provide a comprehensive analysis of these threats,attacks and defenses,and summarize their issues and taxonomy.Our work considers security and privacy of FL based on the viewpoint of the execution process of FL.We highlight that establishing a trusted FL requires adequate measures to mitigate security and privacy threats at each phase.Finally,we discuss the limitations of current attacks and defense approaches and provide an outlook on promising future research directions in FL. 展开更多
关键词 Federated learning Security and privacy threats Multi-phases Inference attacks Poisoning attacks Evasion attacks defenses TRUSTED
原文传递
A shield of defense:Developing ballistic composite panels with effective electromagnetic interference shielding absorption
17
作者 Nisrin Rizek Abdelal 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第5期123-136,共14页
The primary goal of this study is to develop cost-effective shield materials that offer effective protection against high-velocity ballistic impact and electromagnetic interference(EMI)shielding capabilities through a... The primary goal of this study is to develop cost-effective shield materials that offer effective protection against high-velocity ballistic impact and electromagnetic interference(EMI)shielding capabilities through absorption.Six fiber-reinforced epoxy composite panels,each with a different fabric material and stacking sequence,have been fabricated using a hand-layup vacuum bagging process.Two panels made of Kevlar and glass fibers,referred to as(K-NIJ)and(G-NIJ),have been tested according to the National Institute of Justice ballistic resistance protective materials test NIJ 0108.01 Standard-Level IIIA(9 mm×19 mm FMJ 124 g)test.Three panels,namely,a hybrid of Kevlar and glass(H-S),glass with ceramic particles(C-S),and glass with recycled rubber(R-S)have been impacted by the bullet at the center,while the fourth panel made of glass fiber(G-S)has been impacted at the side.EMI shielding properties have been measured in the X-band frequency range via the reflection-transmission method.Results indicate that four panels(K-NIJ,G-NIJ,H-S,and G-S)are capable of withstanding high-velocity impact by stopping the bullet from penetrating through the panels while maintaining their structural integrity.However,under such conditions,these panels may experience localized delamination with variable severity.The EMI measurements reveal that the highest absorptivity observed is 88% for the KNIJ panel at 10.8 GHz,while all panels maintain an average absorptivity above 65%.All panels act as a lossy medium with a peak absorptivity at different frequencies,with K-NIJ and H-S panels demonstrating the highest absorptivity.In summary,the study results in the development of a novel,costeffective,multifunctional glass fiber epoxy composite that combines ballistic and electromagnetic interference shielding properties.The material has been developed using a simple manufacturing method and exhibits remarkable ballistic protection that outperforms Kevlar in terms of shielding efficiency;no bullet penetration or back face signature is observed,and it also demonstrates high EMI shielding absorption.Overall,the materials developed show great promise for various applications,including the military and defense. 展开更多
关键词 BALLISTIC FRP composite EMI shielding ABSORPTIVITY CT-SCAN NIJ test BULLET DEFENSE
下载PDF
ATSSC:An Attack Tolerant System in Serverless Computing
18
作者 Zhang Shuai Guo Yunfei +2 位作者 Hu Hongchao Liu Wenyan Wang Yawen 《China Communications》 SCIE CSCD 2024年第6期192-205,共14页
Serverless computing is a promising paradigm in cloud computing that greatly simplifies cloud programming.With serverless computing,developers only provide function code to serverless platform,and these functions are ... Serverless computing is a promising paradigm in cloud computing that greatly simplifies cloud programming.With serverless computing,developers only provide function code to serverless platform,and these functions are invoked by its driven events.Nonetheless,security threats in serverless computing such as vulnerability-based security threats have become the pain point hindering its wide adoption.The ideas in proactive defense such as redundancy,diversity and dynamic provide promising approaches to protect against cyberattacks.However,these security technologies are mostly applied to serverless platform based on“stacked”mode,as they are designed independent with serverless computing.The lack of security consideration in the initial design makes it especially challenging to achieve the all life cycle protection for serverless application with limited cost.In this paper,we present ATSSC,a proactive defense enabled attack tolerant serverless platform.ATSSC integrates the characteristic of redundancy,diversity and dynamic into serverless seamless to achieve high-level security and efficiency.Specifically,ATSSC constructs multiple diverse function replicas to process the driven events and performs cross-validation to verify the results.In order to create diverse function replicas,both software diversity and environment diversity are adopted.Furthermore,a dynamic function refresh strategy is proposed to keep the clean state of serverless functions.We implement ATSSC based on Kubernetes and Knative.Analysis and experimental results demonstrate that ATSSC can effectively protect serverless computing against cyberattacks with acceptable costs. 展开更多
关键词 active defense attack tolerant cloud computing SECURITY serverless computing
下载PDF
A chorismate mutase from Radopholus similis plays an essential role in pathogenicity
19
作者 Sihua Yang Junyi Li +4 位作者 Shuai Yang Shiqiao Tang Huizhong Wang Chunling Xu Hui Xie 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第3期923-937,共15页
In the process of infecting plants, plant parasitic nematodes release a series of proteins that play an essential role in the successful infection and pathogenesis of plant cells and tissues through stylets or body wa... In the process of infecting plants, plant parasitic nematodes release a series of proteins that play an essential role in the successful infection and pathogenesis of plant cells and tissues through stylets or body walls. In this study,based on transcriptome data, a chorismate mutase gene of Radopholus similis(RsCM) was identified and cloned,which is a single copy gene specifically expressed in the oesophageal gland and highly expressed in juveniles and females. Transient expression of RsCM in tobacco leaves showed that it was localised in the cytoplasm and nucleus of tobacco leaf cells, which inhibited the pattern-triggered immunity(PTI) induced by flg22, including callose deposition and defence gene expression, and cell death induced by immune elicitors BAX, but could not inhibit cell death induced by immune elicitors Gpa2/RBP-1. The RNA interference(RNAi) transgenic tomato of RsCM obviously inhibited the infection, pathogenicity, and reproduction of R. similis. However, the resistance of the overexpression transgenic tomato of RsCM to R. similis infection was significantly reduced, and the expression levels of two salicylic acid(SA) pathway genes(PR1 and PR5) in roots infected by the nematode were significantly down-regulated,which indicated that RsCM might be involved in the inhibition of SA pathway. The results of this study demonstrate that RsCM suppresses the host immune system and might be a new target for the control of R. similis, which also provides new data for the function and mechanism of CM genes of migratory parasitic plant nematodes. 展开更多
关键词 Radopholus similis chorismate mutase plant defense transgenic tomato
下载PDF
Seasonal increase in nest defense,but not egg rejection,in a cuckoo host
20
作者 Bo Zhou Wei Liang 《Avian Research》 SCIE CSCD 2024年第1期50-54,共5页
The interactions between avian brood parasites and their hosts provide an informative and easy-to-handle system for studying coevolution.Avian brood parasitism reduces the reproductive success of hosts,and thus,hosts ... The interactions between avian brood parasites and their hosts provide an informative and easy-to-handle system for studying coevolution.Avian brood parasitism reduces the reproductive success of hosts,and thus,hosts have evolved anti-parasitic strategies,such as rejecting parasitic eggs and adopting aggressive nest defense strategies,to avoid the cost brought on by brood parasitism.To test whether host anti-parasitic strategies are adjusted with the risk of being parasitized when the breeding seasons of brood parasites and hosts are not synchronous,we conducted a field experiment assessing nest defense and egg recognition behaviors of the Isabelline Shrike(Lanius isabellinus),a host of the Common Cuckoo(Cuculus canorus).In the local area,the host Isabelline Shrike begins to breed in April,whereas the summer migratory Common Cuckoo migrates to the local area in May and begins to lay parasitic eggs.Results showed that nest defense behaviors of the Isabelline Shrike increases significantly after cuckoo arrival,showing higher aggressiveness to cuckoo dummies,with no significant difference in attack rates among cuckoo,sparrowhawk and dove dummies,but their egg rejection did not change significantly.These results imply that Isabelline Shrikes may adjust their nest defense behavior,but not egg rejection behavior,with seasonality. 展开更多
关键词 AGGRESSION Anti-parasite strategy Egg rejection Mismatch cuckoo parasitism Nest defense
下载PDF
上一页 1 2 30 下一页 到第
使用帮助 返回顶部