Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
                                            Some full text articles may not yet be available without a charge during the embargo (administrative interval).
                                        
                                        
                                        
                                            
                                                
                                             What is a DOI Number?
                                        
                                    
                                
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
- 
            Free, publicly-accessible full text available July 1, 2026
- 
            Quantum-based Machine Learning (QML) combines quantum computing (QC) with machine learning (ML), which can be applied in various sectors, and there is a high demand for QML professionals. However, QML is not yet in many schools’ curricula. We design labware for the basic concepts of QC, ML, and QML and their applications in science and engineering fields in Google Colab, applying a three-stage learning strategy for efficient and effective student learning.more » « lessFree, publicly-accessible full text available February 18, 2026
- 
            Attackers are increasingly using model inversion attacks, in which the outputs of the model can be used to reconstruct confidential or private information to target machine learning models, especially those that handle sensitive financial data. We propose an attack model that exploits the output of classification models to infer details about the training data. We implement our experiments on the HPCC Systems platform. HPCC Systems is known for its robust data processing capabilities. Our approach systematically exploits the output of financial data-based classification models to reconstruct sensitive attributes, thereby demonstrating the potential risks and vulnerabilities resulting from an attack. In our research, we also have tested some defensive strategies to secure the model against inversion attack.more » « lessFree, publicly-accessible full text available February 5, 2026
- 
            Traditional Knowledge Graphs (KGs), such as Neo4j, face challenges in managing high-dimensional relationships and capturing semantic nuances due to their deterministic nature. Quantum Natural Language Processing (QNLP) introduces probabilistic reasoning into the KG context. This integration leverages quantum principles, such as superposition, which allows relationships to exist in multiple states simultaneously, and entanglement, where the state of one entity dynamically influences the state of another. This quantum-based probabilistic reasoning provides a richer, more flexible representation of connections, moving beyond binary relationships to model the nuances and variability of real-world interactions. Our research demonstrates that QNLP enhances Neo4j’s ability to analyze context-rich data, improving tasks like entity extraction nd knowledge inference. By modeling relationship states probabilistically, QNLP addresses limitations in traditional methods, providing nuanced insights and enabling more advanced, contextaware NLP applications.more » « lessFree, publicly-accessible full text available December 15, 2025
- 
            In today’s rapidly evolving technology era, cybersecurity threats have become sophisticated, challenging conventional detection and defense. Classical machine learning aids early threat detection but lacks real-time data processing and adaptive threat detection due to the reliance on large, clean datasets. New attack techniques emerge daily, and data scale and complexity limit classical computing. Quantum-based machine learning (QML) using quantum computing (QC) offers solutions. QML combines QC and machine learning to analyze big data effectively. This paper investigates multiple QML algorithms and compares their performance with their classical counterparts.more » « lessFree, publicly-accessible full text available December 10, 2025
- 
            Machine learning has been successfully applied to big data analytics across various disciplines. However, as data is collected from diverse sectors, much of it is private and confidential. At the same time, one of the major challenges in machine learning is the slow training speed of large models, which often requires high-performance servers or cloud services. To protect data privacy while still allowing model training on such servers, privacy-preserving machine learning using Fully Homomorphic Encryption (FHE) has gained significant attention. However, its widespread adoption is hindered by performance degradation. This paper presents our experiments on training models over encrypted data using FHE. The results show that while FHE ensures privacy, it can significantly degrade performance, requiring complex tuning to optimize.more » « lessFree, publicly-accessible full text available December 15, 2025
- 
            Protein–protein interactions (PPIs) regulate signalling pathways and cell phenotypes, and the visualization of spatially resolved dynamics of PPIs would thus shed light on the activation and crosstalk of signalling networks. Here we report a method that leverages a sequential proximity ligation assay for the multiplexed profiling of PPIs with up to 47 proteins involved in multisignalling crosstalk pathways. We applied the method, followed by conventional immunofluorescence, to cell cultures and tissues of non-small-cell lung cancers with a mutated epidermal growth-factor receptor to determine the co-localization of PPIs in subcellular volumes and to reconstruct changes in the subcellular distributions of PPIs in response to perturbations by the tyrosine kinase inhibitor osimertinib. We also show that a graph convolutional network encoding spatially resolved PPIs can accurately predict the cell-treatment status of single cells. Multiplexed proximity ligation assays aided by graph-based deep learning can provide insights into the subcellular organization of PPIs towards the design of drugs for targeting the protein interactome.more » « less
- 
            In recent years, electric vehicles (EVs) have emerged as a sustainable alternative to conventional automobiles. Distinguished by their environmental friendliness, superior performance, reduced noise, and low maintenance requirements, EVs offer numerous advantages over traditional vehicles. The integration of electric vehicles with cloud computing has heralded a transformative shift in the automotive industry. However, as EVs become increasingly interconnected with the internet, various devices, and infrastructure, they become susceptible to cyberattacks. These attacks pose a significant risk to the safety, privacy, and functionality of both the vehicles and the broader transportation infrastructure. In this paper, we delve into the topic of electric vehicles and their connectivity to the cloud. We scrutinize the potential attack vectors that EVs are vulnerable to and the consequential impact on vehicle operations. Moreover, we outline both general and specific strategies aimed at thwarting these cyberattacks. Additionally, we anticipate future developments aimed at enhancing EV performance and reducing security risks.more » « less
 An official website of the United States government
An official website of the United States government 
				
			 
					 
					
