Giulia Traverso
YOU?
Author Swipe
View article: Multi-Design Differential Expression Profiling of COVID-19 Lung Autopsy Specimens Reveals Significantly Deregulated Inflammatory Pathways and SFTPC Impaired Transcription
Multi-Design Differential Expression Profiling of COVID-19 Lung Autopsy Specimens Reveals Significantly Deregulated Inflammatory Pathways and SFTPC Impaired Transcription Open
The transcriptomic profiling of lung damage associated with SARS-CoV-2 infection may lead to the development of effective therapies to prevent COVID-19-related deaths. We selected a series of 21 autoptic lung samples, 14 of which had posit…
View article: The Immunopathological and Histological Landscape of COVID-19-Mediated Lung Injury
The Immunopathological and Histological Landscape of COVID-19-Mediated Lung Injury Open
A complete understanding of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) physiopathology and related histopathologic lesions is necessary to improve treatment and outcome of coronavirus disease 2019 (COVID-19) patients. Man…
View article: The Pathologic and Molecular Landscape of Esophageal Squamous Cell Carcinogenesis
The Pathologic and Molecular Landscape of Esophageal Squamous Cell Carcinogenesis Open
Esophageal squamous cell carcinoma represents the most common histotype of epithelial neoplasm occurring within esophageal mucosa worldwide. Despite the comprehensive molecular characterization of this entity, to date no significant target…
View article: Long-Term Confidential Secret Sharing-Based Distributed Storage Systems
Long-Term Confidential Secret Sharing-Based Distributed Storage Systems Open
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality and integrity of stored data. This is achieved by periodically refreshing the stored shares and by checking the validity of the generated …
View article: <i>Sphinx</i>: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection
<i>Sphinx</i>: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection Open
The destructive effects of cyber-attacks demand more proactive security approaches. One such promising approach is the idea of Collaborative Intrusion Detection Systems (CIDSs). These systems combine the knowledge of multiple sensors (e.g.…
View article: Perfectly secure steganography: Hiding information in the quantum noise of a photograph
Perfectly secure steganography: Hiding information in the quantum noise of a photograph Open
We show that the quantum nature of light can be used to hide a secret message within a photograph. Using this physical principle we achieve information-theoretic secure steganography, which had remained elusive until now. The protocol is s…