Pei Huang

ORCID: 0000-0002-0303-034X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Cryptography and Data Security
  • Cloud Data Security Solutions
  • Scheduling and Optimization Algorithms
  • Privacy-Preserving Technologies in Data
  • Nanoparticle-Based Drug Delivery
  • Spam and Phishing Detection
  • Smart Grid Security and Resilience
  • Immunotherapy and Immune Responses
  • Network Time Synchronization Technologies
  • Nanoplatforms for cancer theranostics
  • Supramolecular Self-Assembly in Materials
  • Phagocytosis and Immune Regulation
  • Digital Transformation in Industry
  • IoT and Edge/Fog Computing
  • Collaboration in agile enterprises
  • Immune cells in cancer

Xi'an Shiyou University
2024

Shanghai Jiao Tong University
2023

Xidian University
2020-2022

Cloud storage system provides data owners with remote service, which allows them to outsource without local burden. Nevertheless, the cloud service is not fully trustworthy since it may be honest and would corrupted. One way ensure preservation of auditing method, through can check reliability on demand avoid potential corruption in time. However, private methods fail promise mutual trust results. Thus, public are introduced, traditionally a third party auditor delegated interact providers...

10.1109/access.2020.2993606 article EN cc-by IEEE Access 2020-01-01

Osteosarcoma is an aggressive malignant tumor that primarily develops in children and adolescents. The conventional treatments for osteosarcoma often exert negative effects on normal cells, chemotherapeutic drugs, such as platinum, can lead to multidrug resistance cells. Herein, this work reports a new bioinspired tumor-targeting enzyme-activatable cell-material interface system based DDDEEK-pY-phenylboronic acid (SAP-pY-PBA) conjugates. Using tandem-activation system, selectively regulates...

10.1002/advs.202302272 article EN cc-by Advanced Science 2023-05-21

Effective repolarization of macrophages has emerged as a promising approach for anticancer therapy. However, there are very few studies on the effect reprogramming from M2 phenotype to M1 without reconversion while maintaining an activated phenotype. Moreover, these immunomodulatory methods have serious drawbacks due activation normal monocytic cells. Therefore, it remains challenge selectively reprogram tumor-associated (TAMs) systemic toxicities. Here, X-ray-guided and triggered remote...

10.1002/adma.202208059 article EN Advanced Materials 2022-12-17

With the rapid growth of data, limited by storage capacity, more and IoT applications choose to outsource data Cloud Service Providers (CSPs). But, in such scenarios, outsourced cloud can be easily corrupted difficult found time, which brings about potential security issues. Thus, Provable Data Possession (PDP) protocol has been extensively researched due its capability supporting efficient audit for cloud. However, most PDP schemes require Third-Party Auditor (TPA) Owners (DOs), requires...

10.1155/2021/9993855 article EN cc-by Security and Communication Networks 2021-06-01
Coming Soon ...