- Blockchain Technology Applications and Security
- Cryptography and Data Security
- Cloud Data Security Solutions
- Scheduling and Optimization Algorithms
- Privacy-Preserving Technologies in Data
- Nanoparticle-Based Drug Delivery
- Spam and Phishing Detection
- Smart Grid Security and Resilience
- Immunotherapy and Immune Responses
- Network Time Synchronization Technologies
- Nanoplatforms for cancer theranostics
- Supramolecular Self-Assembly in Materials
- Phagocytosis and Immune Regulation
- Digital Transformation in Industry
- IoT and Edge/Fog Computing
- Collaboration in agile enterprises
- Immune cells in cancer
Xi'an Shiyou University
2024
Shanghai Jiao Tong University
2023
Xidian University
2020-2022
Cloud storage system provides data owners with remote service, which allows them to outsource without local burden. Nevertheless, the cloud service is not fully trustworthy since it may be honest and would corrupted. One way ensure preservation of auditing method, through can check reliability on demand avoid potential corruption in time. However, private methods fail promise mutual trust results. Thus, public are introduced, traditionally a third party auditor delegated interact providers...
Osteosarcoma is an aggressive malignant tumor that primarily develops in children and adolescents. The conventional treatments for osteosarcoma often exert negative effects on normal cells, chemotherapeutic drugs, such as platinum, can lead to multidrug resistance cells. Herein, this work reports a new bioinspired tumor-targeting enzyme-activatable cell-material interface system based DDDEEK-pY-phenylboronic acid (SAP-pY-PBA) conjugates. Using tandem-activation system, selectively regulates...
Effective repolarization of macrophages has emerged as a promising approach for anticancer therapy. However, there are very few studies on the effect reprogramming from M2 phenotype to M1 without reconversion while maintaining an activated phenotype. Moreover, these immunomodulatory methods have serious drawbacks due activation normal monocytic cells. Therefore, it remains challenge selectively reprogram tumor-associated (TAMs) systemic toxicities. Here, X-ray-guided and triggered remote...
With the rapid growth of data, limited by storage capacity, more and IoT applications choose to outsource data Cloud Service Providers (CSPs). But, in such scenarios, outsourced cloud can be easily corrupted difficult found time, which brings about potential security issues. Thus, Provable Data Possession (PDP) protocol has been extensively researched due its capability supporting efficient audit for cloud. However, most PDP schemes require Third-Party Auditor (TPA) Owners (DOs), requires...