- Advanced Mathematical Modeling in Engineering
- Stochastic processes and financial applications
- Advanced Thermodynamics and Statistical Mechanics
- Network Security and Intrusion Detection
- Privacy-Preserving Technologies in Data
- Cerebrovascular and Carotid Artery Diseases
- Advanced Malware Detection Techniques
- Intracranial Aneurysms: Treatment and Complications
- Catalytic Processes in Materials Science
- Information and Cyber Security
- Luminescence Properties of Advanced Materials
- User Authentication and Security Systems
- Groundwater flow and contamination studies
- Smart Grid Security and Resilience
- Acute Ischemic Stroke Management
- Biometric Identification and Security
- Electrocatalysts for Energy Conversion
- Cancer-related molecular mechanisms research
- Quantum Information and Cryptography
- Reservoir Engineering and Simulation Methods
- Geophysical Methods and Applications
- Data Mining Algorithms and Applications
- Land Use and Ecosystem Services
- Impact of Light on Environment and Health
- Statistical Mechanics and Entropy
Jilin University
2021-2025
Jilin Province Science and Technology Department
2021-2025
Huaibei Normal University
2024
Shanghai Jiao Tong University
2021-2024
Chinese Academy of Sciences
2020-2024
Jiangnan University
2023-2024
Institute of Process Engineering
2023-2024
Huazhong University of Science and Technology
2021-2024
Beijing Jiaotong University
2024
University of Massachusetts Lowell
2019-2024
Despite the tremendous need for evaluation of touch-based authentication as an extra security layer mobile devices, huge disparity in experimental methodology used by different researchers makes it hard to determine how much research this area has progressed. Critical variables such types features and they are pre-processed, training testing performance metrics, mention but a few, vary from one study next. Additionally, most datasets these evaluations not openly accessible, making impossible...
Expression levels of many human genes are under the genetic control expression quantitative trait loci (eQTLs). Despite technological advances, precise molecular mechanisms underlying most eQTLs remain elusive. Here, we use deep mRNA sequencing two CEU individuals to investigate those mechanisms, with particular focus on role splicing (sQTLs). We identify a large number that differentially spliced between samples and associate differences nearby single nucleotide polymorphisms (SNPs)....
Programmable Logic Controllers (PLCs), as specialized task-oriented embedded field devices, play a vital role in current industrial control systems (ICSs), which are composed of critical infrastructure. In order to meet increasing demands on cost-effectiveness while improving production efficiency, commercial-off-the-shelf software and hardware, external networks such the Internet, integrated into PLC-based systems. However, it also provides opportunities for adversaries launch malicious,...
Corneal alkali burns can lead to ulceration, perforation, and even corneal blindness due epithelial defects extensive cell necrosis, resulting in poor healing outcomes. Previous studies have found that chitosan-based situ hydrogel loaded with limbal epithelium stem cells (LESCs) has a certain reparative effect on burns. However, the inconsistent pore sizes of carriers low loading rates resulted suboptimal repair In this study, 4D bioprinting technology was used prepare thermosensitive gel...
The suitability evaluation of agricultural land at the regional scale is great significance for protecting and water resources building sustainable systems. Based on climate, soil, topographical, surface resources, index (LSI) data maize, rice, soybeans are established using an analytical hierarchy process matter element analysis (AHP–MEA) model in Jilin Province, China. results show that there a significant positive linear correlation between LSI measured yield, which indicates has ideal...
Rolling bearing fault diagnosis plays a crucial role in ensuring the safety and reliability of rotary machine, some methods that employ deep-learning technology are grounded on assumption there large-scale failure data. In reality, it is difficult to acquire more rolling data under different rates. this article, novel condition multidomain generative adversarial network (CMDGAN) introduced for imbalanced sample diagnosis. This framework effectively captures distribution information by fusion...
Determining the peak flowering dates of winter rapeseed is crucial for both increasing yields and developing tourism resources. Currently, Normalized Difference Yellow Index (NDYI), widely used monitoring these dates, faces stability accuracy issues due to atmospheric interference limited optical data during period. This research examines changes in remote-sensing parameters caused by canopy variations rapeseed’s period from crop morphological characteristics properties. By integrating...
Communication intensive applications in hosts with multi-core CPU and high speed networking hardware often put considerable stress on the native socket system an OS. Existing replacements leave significant performance table, as well have limitations compatibility isolation.
Despite the tremendous amount of research fronting use touch gestures as a mechanism continuous authentication on smart phones, very little has been conducted to evaluate how these systems could behave if attacked by sophisticated adversaries. In this article, we present two Lego-driven robotic attacks touch-based authentication: population statistics--driven attack and user-tailored attack. The is based patterns gleaned from large users, whereas launched samples stolen victim. Both are Lego...
Frequent pattern mining is an important class of knowledge discovery problems. It aims at finding out high-frequency items or structures (e.g., itemset, sequence) in a database, and plays essential role deriving other interesting patterns, like association rules. The traditional approach gathering data to central server analyze no longer viable due the increasing awareness user privacy newly established laws on protection. Previous privacy-preserving frequent approaches only target...