Shaowei Wang

ORCID: 0000-0001-5595-5099
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Graph theory and applications
  • VLSI and Analog Circuit Testing
  • Viral-associated cancers and disorders
  • Cytomegalovirus and herpesvirus research
  • Software Engineering Research
  • Internet Traffic Analysis and Secure E-voting
  • Stochastic Gradient Optimization Techniques
  • Advanced Steganography and Watermarking Techniques
  • Computational Drug Discovery Methods
  • Digital and Cyber Forensics
  • Biometric Identification and Security
  • Physical Activity and Education Research
  • HIV Research and Treatment
  • Machine Learning and ELM
  • Soil Moisture and Remote Sensing
  • Advanced Technologies in Various Fields
  • Software Reliability and Analysis Research
  • Digital Media Forensic Detection
  • Manufacturing Process and Optimization
  • Access Control and Trust
  • History and advancements in chemistry
  • Generative Adversarial Networks and Image Synthesis
  • Advanced Sensor and Control Systems

Guangzhou University
2021-2025

Wuhan University
2024-2025

Zhongnan Hospital of Wuhan University
2024-2025

Anhui University
2025

State Key Laboratory of Virology
2024

Chang'an University
2024

Institute of Art
2021

Henan University of Science and Technology
2021

Nuclear and Radiation Safety Center
2020

Savannah State University
2018-2019

Deubiquitinases (DUBs) remove ubiquitin from substrates and play crucial roles in diverse biological processes. However, our understanding of deubiquitination viral replication remains limited. Employing an oncogenic human herpesvirus Kaposi’s sarcoma-associated (KSHV) to probe the role protein deubiquitination, we found that Ovarian tumor family deubiquitinase 4 (OTUD4) promotes KSHV reactivation. OTUD4 interacts with transcription activator (K-RTA), a key factor controls reactivation,...

10.1371/journal.ppat.1011943 article EN cc-by PLoS Pathogens 2024-01-12

How to achieve distributed differential privacy (DP) without a trusted central party is of great interest in both theory and practice. Recently, the shuffle model has attracted much attention. Unlike local DP which users send randomized data directly collector/analyzer, an intermediate untrusted shuffler introduced randomly permute data, have already been by users, before they reach analyzer. The most appealing aspect that while shuffling does not explicitly add more noise it can make...

10.1109/tifs.2024.3351474 article EN IEEE Transactions on Information Forensics and Security 2024-01-01

10.1109/tcad.2025.3541010 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025-01-01

The development of effective and broad-spectrum antiviral therapies remains an unmet need. Current virus-targeted strategies are often limited by narrow spectrum activity the rapid emergence resistance. As a result, there is increasing interest in alternative approaches that target host cell factors critical for viral replication. One promising strategy targeting deubiquitinases (DUBs), enzymes regulate key proteins involved reactivation In this study, we explore potential DUB complex...

10.1371/journal.ppat.1013052 article EN cc-by PLoS Pathogens 2025-04-10

The shuffle model of differential privacy provides promising privacy-utility balances in decentralized, privacy-preserving data analysis. However, the current analyses amplification via shuffling lack both tightness and generality. To address this issue, we propose variation-ratio reduction as a comprehensive framework for single-message multi-message protocols. It leverages two new parameterizations: total variation bounds local messages probability ratio blanket messages, to determine...

10.14778/3659437.3659444 article EN Proceedings of the VLDB Endowment 2024-04-01

Taking the steganalytic discriminators as adversaries, existing Generative Adversarial Networks (GAN)-based steganographic approaches learn implicit cost functions to measure embedding distortion for steganography. However, in these are trained by stego-samples with insufficient diversity, and their network structures offer very limited representational capacity. As a result, will not exhibit robustness various patterns, which causes learning suboptimal functions, thus compromising...

10.1109/tmm.2024.3353543 article EN IEEE Transactions on Multimedia 2024-01-01

In many mobile applications, user-generated data are presented as set-valued data. To tackle potential privacy threats in analyzing these valuable data, local differential has been attracting substantial attention. However, existing approaches only provide sub-optimal utility and expensive computation communication for distribution estimation heavy-hitter identification. this paper, we propose a utility-optimal efficient publication method (i.e., <italic...

10.1109/tmc.2023.3342056 article EN IEEE Transactions on Mobile Computing 2023-12-12

Numerical vector aggregation has numerous applications in privacy-sensitive scenarios, such as distributed gradient estimation federated learning, and statistical analysis on key-value data. Within the framework of local differential privacy, this work gives tight minimax error bounds O(d s/(n epsilon^2)), where d is dimension numerical s number non-zero entries. An attainable mechanism then designed to improve from existing approaches suffering rate O(d^2/(n epsilon^2)) or s^2/(n...

10.24963/ijcai.2021/510 article EN 2021-08-01

A numeric number which represents a complete shape of the chemical graph is said to be topological index. In this paper, we study 2D-lattice three-layered single- walled Titania nanotubes (SWTNT) and investigate their M-polynomial. Mainly, compute certain indices (TI’s) relates degree-based by help addition, give first as well second Zagreb polynomials aforesaid nanotubes. At end, draw comparison for better understanding computed results.

10.1080/02522667.2019.1565446 article EN Journal of Information and Optimization Sciences 2019-10-31

10.1109/tdsc.2024.3429203 article EN IEEE Transactions on Dependable and Secure Computing 2024-01-01

Locating and fixing software faults is a time-consuming resource-intensive task in development. Traditional fault localization methods, such as Spectrum-Based Fault Localization (SBFL), rely on statistical analysis of test coverage data but often suffer from lower accuracy. Learning-based techniques, while more effective, require extensive training can be computationally expensive. Recent advancements Large Language Models (LLMs) offer promising improvements by enhancing code comprehension...

10.48550/arxiv.2409.13642 preprint EN arXiv (Cornell University) 2024-09-20

Large Language Models (LLMs) show great promise in software engineering tasks like Fault Localization (FL) and Automatic Program Repair (APR). This study examines how input order context size affect LLM performance FL, a key step for many downstream tasks. We test different orders methods using Kendall Tau distances, including "perfect" (where ground truths come first) "worst" last). Our results strong bias order, with Top-1 accuracy falling from 57\% to 20\% when we reverse the code order....

10.48550/arxiv.2412.18750 preprint EN arXiv (Cornell University) 2024-12-24

Wang, X.; Wei, G.; S.; Yang, Y.; Du, F., and B., 2020. Impact of large cooling tower on atmospheric dispersion effluent from coastal nuclear power plant. In: Mi, C.; Zhao, L., Lam, S. (eds.), Global Topics New Trends in Coastal Research: Port, Ocean Engineering. Journal Research, Special Issue No. 103, pp. 474–478. Coconut Creek (Florida), ISSN 0749-0208.In order to improve the simulation quality plant, computational fluid dynamics (CFD) method was used simulate impact diffusion gaseous The...

10.2112/si103-096.1 article EN Journal of Coastal Research 2020-06-23

With the rapid development of science and technology, more advanced technology can be applied in power plant, include centralized control system.The automation level plant continuously improved by application operation which played a very important role saving resources decreasing energy consumption.However, as operation, some problems were also increasingly appeared, order to ensure safe scientific measures need formulated.

10.2991/icamcs-16.2016.128 article EN cc-by-nc 2016-01-01

Numerical vector aggregation plays a crucial role in privacy-sensitive applications, such as distributed gradient estimation federated learning and statistical analysis of key-value data. In the context local differential privacy, this study provides tight minimax error bound <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex-math notation="LaTeX">$O(\frac{ds}{n\epsilon ^{2}})$</tex-math></inline-formula> , where...

10.1109/tdsc.2023.3340178 article EN IEEE Transactions on Dependable and Secure Computing 2023-12-07

The reduced reciprocal Randic (RRR) index is a molecular structure descriptor (or more precisely, topological index), which useful for predicting the standard enthalpy of formation and normal boiling point isomeric octanes. In this paper, mathematical aspect RRR explored, or specifically, graph(s) having minimum is/are identified from collection all n–vertex connected bicyclic graphs n≥5. As consequence, best possible lower bound on index, obtained when

10.22052/ijmc.2018.141455.1378 article EN Iranian journal of mathemathical chemistry./Iranian journal of mathemathical chemistry 2018-09-01
Coming Soon ...