Zibo Wang

ORCID: 0000-0001-5213-7867
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Mathematical Modeling in Engineering
  • Stochastic processes and financial applications
  • Advanced Thermodynamics and Statistical Mechanics
  • Network Security and Intrusion Detection
  • Privacy-Preserving Technologies in Data
  • Cerebrovascular and Carotid Artery Diseases
  • Advanced Malware Detection Techniques
  • Intracranial Aneurysms: Treatment and Complications
  • Catalytic Processes in Materials Science
  • Information and Cyber Security
  • Luminescence Properties of Advanced Materials
  • User Authentication and Security Systems
  • Groundwater flow and contamination studies
  • Smart Grid Security and Resilience
  • Acute Ischemic Stroke Management
  • Biometric Identification and Security
  • Electrocatalysts for Energy Conversion
  • Cancer-related molecular mechanisms research
  • Quantum Information and Cryptography
  • Reservoir Engineering and Simulation Methods
  • Geophysical Methods and Applications
  • Data Mining Algorithms and Applications
  • Land Use and Ecosystem Services
  • Impact of Light on Environment and Health
  • Statistical Mechanics and Entropy

Jilin University
2021-2025

Jilin Province Science and Technology Department
2021-2025

Huaibei Normal University
2024

Shanghai Jiao Tong University
2021-2024

Chinese Academy of Sciences
2020-2024

Jiangnan University
2023-2024

Institute of Process Engineering
2023-2024

Huazhong University of Science and Technology
2021-2024

Beijing Jiaotong University
2024

University of Massachusetts Lowell
2019-2024

Despite the tremendous need for evaluation of touch-based authentication as an extra security layer mobile devices, huge disparity in experimental methodology used by different researchers makes it hard to determine how much research this area has progressed. Critical variables such types features and they are pre-processed, training testing performance metrics, mention but a few, vary from one study next. Additionally, most datasets these evaluations not openly accessible, making impossible...

10.1109/btas.2013.6712758 article EN 2013-09-01

Expression levels of many human genes are under the genetic control expression quantitative trait loci (eQTLs). Despite technological advances, precise molecular mechanisms underlying most eQTLs remain elusive. Here, we use deep mRNA sequencing two CEU individuals to investigate those mechanisms, with particular focus on role splicing (sQTLs). We identify a large number that differentially spliced between samples and associate differences nearby single nucleotide polymorphisms (SNPs)....

10.1101/gr.111211.110 article EN cc-by-nc Genome Research 2010-12-20

Programmable Logic Controllers (PLCs), as specialized task-oriented embedded field devices, play a vital role in current industrial control systems (ICSs), which are composed of critical infrastructure. In order to meet increasing demands on cost-effectiveness while improving production efficiency, commercial-off-the-shelf software and hardware, external networks such the Internet, integrated into PLC-based systems. However, it also provides opportunities for adversaries launch malicious,...

10.3390/pr11030918 article EN Processes 2023-03-17

Corneal alkali burns can lead to ulceration, perforation, and even corneal blindness due epithelial defects extensive cell necrosis, resulting in poor healing outcomes. Previous studies have found that chitosan-based situ hydrogel loaded with limbal epithelium stem cells (LESCs) has a certain reparative effect on burns. However, the inconsistent pore sizes of carriers low loading rates resulted suboptimal repair In this study, 4D bioprinting technology was used prepare thermosensitive gel...

10.1186/s13287-024-03653-z article EN cc-by Stem Cell Research & Therapy 2024-02-14

The suitability evaluation of agricultural land at the regional scale is great significance for protecting and water resources building sustainable systems. Based on climate, soil, topographical, surface resources, index (LSI) data maize, rice, soybeans are established using an analytical hierarchy process matter element analysis (AHP–MEA) model in Jilin Province, China. results show that there a significant positive linear correlation between LSI measured yield, which indicates has ideal...

10.3390/agriculture11040370 article EN cc-by Agriculture 2021-04-19

Rolling bearing fault diagnosis plays a crucial role in ensuring the safety and reliability of rotary machine, some methods that employ deep-learning technology are grounded on assumption there large-scale failure data. In reality, it is difficult to acquire more rolling data under different rates. this article, novel condition multidomain generative adversarial network (CMDGAN) introduced for imbalanced sample diagnosis. This framework effectively captures distribution information by fusion...

10.1109/jsen.2022.3222535 article EN IEEE Sensors Journal 2022-11-21

Determining the peak flowering dates of winter rapeseed is crucial for both increasing yields and developing tourism resources. Currently, Normalized Difference Yellow Index (NDYI), widely used monitoring these dates, faces stability accuracy issues due to atmospheric interference limited optical data during period. This research examines changes in remote-sensing parameters caused by canopy variations rapeseed’s period from crop morphological characteristics properties. By integrating...

10.3390/rs17061051 article EN cc-by Remote Sensing 2025-03-17

Communication intensive applications in hosts with multi-core CPU and high speed networking hardware often put considerable stress on the native socket system an OS. Existing replacements leave significant performance table, as well have limitations compatibility isolation.

10.1145/3341302.3342071 article EN 2019-08-14

Despite the tremendous amount of research fronting use touch gestures as a mechanism continuous authentication on smart phones, very little has been conducted to evaluate how these systems could behave if attacked by sophisticated adversaries. In this article, we present two Lego-driven robotic attacks touch-based authentication: population statistics--driven attack and user-tailored attack. The is based patterns gleaned from large users, whereas launched samples stolen victim. Both are Lego...

10.1145/2898353 article EN ACM Transactions on Information and System Security 2016-05-06

Frequent pattern mining is an important class of knowledge discovery problems. It aims at finding out high-frequency items or structures (e.g., itemset, sequence) in a database, and plays essential role deriving other interesting patterns, like association rules. The traditional approach gathering data to central server analyze no longer viable due the increasing awareness user privacy newly established laws on protection. Previous privacy-preserving frequent approaches only target...

10.1109/infocom48880.2022.9796719 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2022-05-02
Coming Soon ...