- Formal Methods in Verification
- Biometric Identification and Security
- Logic, programming, and type systems
- Petri Nets in System Modeling
- User Authentication and Security Systems
- Real-Time Systems Scheduling
- Topic Modeling
- Cloud Computing and Resource Management
- Software Testing and Debugging Techniques
- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Anomaly Detection Techniques and Applications
- Advanced Authentication Protocols Security
- Advanced Steganography and Watermarking Techniques
- Video Surveillance and Tracking Methods
- Software Reliability and Analysis Research
- Face recognition and analysis
- semigroups and automata theory
- Scientific Computing and Data Management
- Numerical Methods and Algorithms
- Machine Learning and Algorithms
- Advanced Graph Neural Networks
- Embedded Systems Design Techniques
- Software Engineering Research
- Network Security and Intrusion Detection
Shanghai Jiao Tong University
2016-2025
Second Affiliated Hospital of Zhejiang University
2025
PLA Information Engineering University
2024
Jiangxi University of Finance and Economics
2023-2024
Soochow University
2023-2024
Shanghai Children's Medical Center
2017-2023
National Institute for Radiological Protection
2017-2023
Yanshan University
2013-2023
Chinese Academy of Sciences
2012-2023
International Peace Maternity & Child Health Hospital
2023
•Epithelial subtype 1, 2 and 3 were mainly found in the adenocarcinoma 4 was present adenosquamous carcinoma.•Tumors with ErbB pathway mutations harbored a larger population of 1 epithelial cells, Tregs, M2 macrophages.•Increased MDK these tumors interacted its receptor LRP1 to promote immunosuppressive macrophage differentiation.•Crosstalk between macrophage-secreted CXCL10 CXCR3 on Tregs induced GBC mutations. Background & AimsOur previous genomic whole-exome sequencing (WES) data...
Recently, the global outbreak of a blackmail virus WannaCry, makes blockchain hot topic. The security is always focus people's attention, and it also main reason why has not been widely used all over world. Many researches use mathematical derivation method to analyse 51%- Attacks influence blockchain, which very stiff difficult understand. In this paper, we propose simulate blockchain's process discover rule between attacking method, power blockchain. We take 51%-Attacks as an example Java...
According to the World Health Organization(WHO), it is estimated that approximately 1.3 billion people live with some forms of vision impairment globally, whom 36 million are blind. Due their disability, engaging these minority into society a challenging problem. The recent rise smart mobile phones provides new solution by enabling blind users' convenient access information and service for understanding world. Users can adopt screen reader embedded in operating systems read content each...
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of advancements reported in recent works, we note serious open issues such as independent benchmarking, generalizability challenges and considerations age, gender, ethnicity that are inadequately addressed. Attack Detection (MAD) algorithms often prone generalization they database dependent. The existing databases, mostly semi-public nature, lack diversity terms ethnicity, various morphing...
GUI animations, such as card movement, menu slide in/out, snackbar display, provide appealing user experience and enhance the usability of mobile applications. These animations should not violate platform's UI design guidelines (referred to design-don't guideline in this work) regarding component motion interaction, content appearing disappearing, elevation shadow changes. However, none existing static code analysis, functional testing image comparison techniques can "see" on scree, thus...
Sharded blockchain offers scalability, decentralization, immutability, and linear improvement, making it a promising solution for addressing the trust problem in large-scale collaborative IoT. However, high proportion of cross-shard transactions can severely limit performance decentralized blockchain. Furthermore, dynamic assemblage characteristic sensing sharded is often ignored. To overcome these limitations, we propose HMMDShard, sharding scheme based on Hidden Markov Model. HMMDShard...
Abstract Background: Gallbladder cancer (GBC) is the most common malignant tumor of biliary tract. Isoliquiritigenin (ISL) a natural compound with chalcone structure extracted from roots licorice and other plants. Relevant studies have shown that ISL has strong anti-tumor ability in various types tumors. However, research against GBC not been reported, which needs to be further investigated. Methods: The effects cells vitro vivo were characterized by cytotoxicity test, RNA-sequencing,...
Programming screencasts have two important applications in software engineering context: study developer behaviors, information needs and disseminate knowledge. Although programming are easy to produce, they not analyze or index due the image nature of data. Existing techniques extract only content from screencasts, but ignore workflow actions by which developers accomplish tasks. This significantly limits effective use downstream applications. In this paper, we first present a novel...
Aberrant expression of lysyl oxidase-like 1 (LOXL1) reportedly leads to fibrous diseases. Recent studies have revealed its role in cancers. In this study, we observed an elevated level LOXL1 the tissues and sera patients with intrahepatic cholangiocarcinoma (ICC) compared levels nontumor unaffected individuals. Overexpression RBE 9810 cell lines promoted proliferation, colony formation, metastasis vivo vitro induced angiogenesis. contrast, depletion showed opposite effects. We further that...
Soy isoflavones are natural tyrosine kinase inhibitors closely associated with decreased morbidity and mortality of various tumors. The activation kinases such as ERBB2 is the mechanism by which cholecystitis transforms into gallbladder cancer (GBC), therefore, it important to investigate relationship between long-term exposure soy occurrence progression GBC. This case-control study (n = 85 pairs) found that high level plasma isoflavone-genistein (GEN) was a lower risk (≥326.00 ng/mL...
Abstract Background While imbalances in trace elements are recognized for causing dysfunction adipose tissue and disease onset progression of CD, the relationship between initial status risk VAT accumulation patients with CD remains uncertain. This study aims to investigate prevalence element deficiencies among newly diagnosed patients, explore how these relate accumulation, examine their implications progression. In particular, we focus on magnesium due its potential therapeutic effects,...
Application Programming Interfaces (APIs) have been widely discussed on social-technical platforms (e.g., Stack Overflow). Extracting API mentions from such informal software texts is the prerequisite for API-centric search and summarization of programming knowledge. Machine learning based extraction has demonstrated superior performance than rule-based methods in that lack consistent writing forms annotations. However, machine a significant overhead preparing training data effective...
With the wide spreading of mobile and Internet Things (IoT) devices, music cognition as a meaningful task for promotion has attracted lot attention around world. How to automatically generate score is an important part in cognition, which acts carrier so disposing huge quantity data IoT networks or Internet. For reason that computers lack domain knowledge cognitive ability, it hard recognize melody write while listening music. Therefore, system introduced cognate based on machine learning...
In the COVID-19 outbreak year 2020, a consensus was reached on fact that SARS-CoV-2 spreads through aerosols. However, finding an efficient method to detect viruses in aerosols monitor risk of similar infections and enact effective control remains great challenge. Our study aimed build swirling aerosol collection (SAC) device collect viral particles exhaled breath subsequently using reverse transcription polymerase chain reaction (RT-PCR). Laboratory tests SAC aerosolized pseudovirus...
Abstract Background Dental age (DA) estimation using two convolutional neural networks (CNNs), VGG16 and ResNet101, remains unexplored. In this study, we aimed to investigate the possibility of artificial intelligence-based methods in an eastern Chinese population. Methods A total 9586 orthopantomograms (OPGs) (4054 boys 5532 girls) Han population aged from 6 20 years were collected. DAs automatically calculated CNN model strategies. Accuracy, recall, precision, F1 score models used evaluate...