Mingyue Li

ORCID: 0000-0001-5408-0569
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • Chaos-based Image/Signal Encryption
  • Privacy-Preserving Technologies in Data
  • Image Retrieval and Classification Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Image and Video Retrieval Techniques
  • Cryptographic Implementations and Security
  • User Authentication and Security Systems
  • IoT and Edge/Fog Computing
  • Complexity and Algorithms in Graphs
  • Immune cells in cancer
  • Food composition and properties
  • Network Security and Intrusion Detection
  • Data Management and Algorithms
  • Brain Tumor Detection and Classification
  • Phosphorus and nutrient management
  • Soil Carbon and Nitrogen Dynamics
  • Adversarial Robustness in Machine Learning
  • Advanced Steganography and Watermarking Techniques
  • Pharmacological Effects of Natural Compounds
  • Caching and Content Delivery
  • Data Mining Algorithms and Applications
  • Microbial Metabolites in Food Biotechnology

Hebei University
2022-2025

Tianjin University of Science and Technology
2024

Hubei University of Medicine
2024

Nankai University
2020-2024

Soochow University
2024

Second Affiliated Hospital of Soochow University
2024

Shanghai Ninth People's Hospital
2024

Shanghai Jiao Tong University
2024

State Key Laboratory of Oncogene and Related Genes
2024

Shandong Normal University
2023

Aberrant changes in the gut microbiota are implicated many diseases, including inflammatory bowel disease (IBD). Gut microbes produce diverse metabolites that can shape immune system and impact intestinal barrier integrity, indicating microbe-mediated modulation may be a promising strategy for preventing treating IBD. Although fecal transplantation probiotic supplementation well-established IBD therapies, novel chemical agents safe exert strong effects on urgently needed. Herein, we report...

10.1016/j.apsb.2024.02.020 article EN cc-by-nc-nd Acta Pharmaceutica Sinica B 2024-02-29

As a pivotal link between visual and linguistic relationships, image-text cross-modal retrieval has received widespread attention. However, existing studies primarily focus on intricate machine learning models to enhance accuracy overlook the critical aspect of privacy preservation for images texts, rendering them unsuitable lightweight IoT environments. To tackle these challenges, we propose LPCR-IoT, privacy-preserving scheme tailored LPCR-IoT employs knowledge distillation train student...

10.1109/jiot.2025.3526939 article EN IEEE Internet of Things Journal 2025-01-01

Acute lung injury (ALI) is a respiratory failure disease associated with high mortality rates in patients. The primary pathological damage attributed to the excessive release of pro-inflammatory mediators pulmonary tissue. However, specific therapy for ALI has not been developed. In this study, series novel ferulic acid-parthenolide (FA-PTL) and acid-micheliolide (FA-MCL) hybrid derivatives were designed, synthesized, evaluated their anti-inflammatory activities vitro. Compounds 2, 4, 6...

10.3390/molecules29050936 article EN cc-by Molecules 2024-02-21

The Internet of Things makes it possible to exchange information between people, things and things, people security more important. However, there are few standards in the field Things. Therefore, based on characteristics application requirements environment, this paper optimizes Advanced Encryption Standard (AES) builds data encryption standard DESI(Data IoT) environment.. analysis shows that DESI has better is therefore suitable for encrypting IoT environment. Keywords: Things, standard,...

10.1109/itnec.2019.8729488 article EN 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2019-03-01

While users enjoy the convenience of data outsourcing in cloud, they also face risks modification and private information leakage. Searchable encryption technology can perform keyword searches over encrypted while protecting their privacy guaranteeing integrity by verifying search results. However, some associated problems are still encountered, such as low efficiency verification uncontrollable query Accordingly, this paper proposes a Privacy-Preserving Encryption (PPSE) scheme based on...

10.26599/tst.2021.9010070 article EN Tsinghua Science & Technology 2022-07-21

Cross-domain authentication requires that there is no trust gap between different domains can cause cross-domain devices to exceed the security control scope of original domain and further expose systems threats. In addition, as relying on traditional means built by centralized institutions cannot meet data needs in a big environment. Therefore, it necessary design secure dynamic scheme. this paper, we propose scheme (DCAGS-IoT) Internet Things environment using group signature technology...

10.3390/app13105847 article EN cc-by Applied Sciences 2023-05-09

Traditionally fermented yak yogurt as a Tibetan dairy product is high not only in nutrients but also probiotics. A probiotic strain with potential lipid reducing effect was isolated from yogurt. An animal model for hyperlipidemia evaluated using the blood index and expression levels of metabolism-related proteins mice to determine Lactobacillus casei YBJ02 (LC-YBJ02) on metabolism hyperlipidemic underlying mechanism. LC-YBJ02 at different concentrations exhibited certain inhibitory effects...

10.1111/1750-3841.14787 article EN Journal of Food Science 2019-11-24

To explore the impacts of cordycepin and underlying mechanism on sepsis.The sepsis mice model was built treated with different concentrations cordycepin. Then liver lung injury caused by cecal ligation puncture (CLP) assessed using H&E staining TUNEL assay. The expression relevant genes detected qRT-PCR analysis ELISA assays. Besides, macrophage polarization checked flow cytometry.Cordycepin could significantly improve injury. Moreover, increased distribution F4/80+ CD206+ M2-like...

10.1093/jpp/rgab162 article EN Journal of Pharmacy and Pharmacology 2021-10-29

Lymph nodes are important peripheral immune organs in which numerous responses occur. During the process of lymphatic metastasis, lymph also sites through tumor cells must pass. Therefore, it is essential to develop a drug delivery system that can specifically transfer immunostimulatory medicine into block metastasis. Here, we developed nucleic acid containing cationic agarose (C-agarose) and CpG oligodeoxynucleotides. C-agarose has high affinity for Siglec-1 on surface node sinus...

10.1016/j.omtn.2019.04.016 article EN cc-by-nc-nd Molecular Therapy — Nucleic Acids 2019-04-23

Abstract The present study aimed to the preparation and quality evaluation of potato steamed bread by using flour, wheat gluten at presence yeast inorganic additives. As rheological properties potato–wheat formulated flour negatively related with 35% was set as basic (100%). effects on dough were also evaluated, addition amount 6.5%. yeast, sodium bicarbonate, citric acid, monocalcium phosphate have been studied optimized orthogonal test. obtained formula 100% (potato/wheat mass ratio...

10.1002/fsn3.1600 article EN cc-by Food Science & Nutrition 2020-06-23

With the development of various applications blockchain, blockchain-assisted searchable encryption technology has received wide attention as it can eliminate misbehaviours malicious servers through verification and incentive mechanism blockchain. However, most existing solutions update encrypted data by means appending new transactions, which does not scale wastes resources. In this paper, we explore potential redactable blockchain propose a privacy-preserving dynamic framework (DSE-RB), is...

10.1109/tcc.2022.3228867 article EN IEEE Transactions on Cloud Computing 2022-12-15

The server-aided encryption is widely used in encrypted deduplication systems to protect against brute-force attacks. However, it non-trivial update the master key managed by server existing schemes. Once leaked, all user data are vulnerable offline In this article, we extend with updatable (UE) and a dynamic proof of ownership (PoW) protocol make support efficient updates can be client-side deduplication. Specifically, design an scheme based on UE, which achieves user-transparent for...

10.1109/tcc.2023.3311760 article EN IEEE Transactions on Cloud Computing 2023-09-05

The two-factor authentication scheme combined password with smart card is one of the most widely used methods. This paper analyzes security performance a latest proposed remote user and simulates attacks it suffers: it's vulnerability to guessing attack, server masquerade attack lacks backward security. Based on detailed analysis, this would propose some useful suggestions for designing secure scheme.

10.1109/cecnet.2011.5768515 article EN 2011-04-01

Aldose reductase 2 (ALR2), an activated enzyme in the polyol pathway by hyperglycemia, has long been recognized as one of most promising targets for complications diabetes, especially diabetic peripheral neuropathy (DPN). However, many ALR2 inhibitors have shown serious side effects due to poor selectivity over aldehyde (ALR1). Herein, we describe discovery a series benzothiadiazine acetic acid derivatives potent and selective against evaluation their anti-DPN activities vivo. Compound 15c,...

10.2337/db23-0006 article EN Diabetes 2023-12-21
Coming Soon ...