- Blockchain Technology Applications and Security
- Cryptography and Data Security
- Cloud Data Security Solutions
- Security and Verification in Computing
- FOXO transcription factor regulation
- MicroRNA in disease regulation
- Privacy-Preserving Technologies in Data
- Regional Economic and Spatial Analysis
- Cancer Cells and Metastasis
- Cancer-related molecular mechanisms research
- Underwater Vehicles and Communication Systems
- CRISPR and Genetic Engineering
- Educational Technology and Assessment
- FinTech, Crowdfunding, Digital Finance
- Network Security and Intrusion Detection
- Genomics, phytochemicals, and oxidative stress
- Spam and Phishing Detection
- Business Process Modeling and Analysis
- Crime, Illicit Activities, and Governance
- Service-Oriented Architecture and Web Services
- Circular RNAs in diseases
- RFID technology advancements
- Advanced Authentication Protocols Security
- Higher Education and Teaching Methods
- Cybercrime and Law Enforcement Studies
Hainan University
2021-2025
National Institutes of Health Clinical Center
2020-2025
Shanghai Chengtou (China)
2022-2024
Shanghai Children's Hospital
2024
Shanghai Jiao Tong University
2024
Nanjing Medical University
2021-2023
Xi’an Children’s Hospital
2023
Xi'an Jiaotong University
2006-2023
Ministry of Ecology and Environment
2023
Nanjing Institute of Environmental Sciences
2023
Underwater sensor networks (UWSNs) play a vital role in marine exploration and environmental monitoring. However, due to the characteristics of underwater acoustic channels such as high delay, low bandwidth, energy limitation, design an media access control (MAC) protocol has brought great challenges, existing MAC designs rarely consider influence channel interference factors networking. Therefore, this paper proposes collision avoidance for clustering networks. The first classifies users by...
The ultralightweight RFID protocols only involve simple bit-wise operations (like XOR, AND, OR, etc.) on tags. In this paper, we show that the strong authentication and integrity (SASI) protocol has two security vulnerabilities, namely denial-of-service (DoS) anonymity tracing based a compromised tag. former permanently disables capability of tag by destroying synchronization between reader. latter links with past actions performed
As a decentralized, public, and digital ledger technology in Peer-to-Peer network, blockchain has received much attention from various fields, including finance, healthcare, supply chain, etc. However, some challenges (e.g., scalability, privacy, security issues) severely affects the wide adoption of technology. Recently, Intel software guard extensions (SGX), as new trusted computing technologies, have provided solution to above area. Although many studies focused on using SGX enhance their...
Decentralized finance, i.e., DeFi, has become the most popular type of application on many public blockchains (e.g., Ethereum) in recent years. Compared to traditional DeFi allows customers flexibly participate diverse blockchain financial services lending, borrowing, collateralizing, exchanging etc.) via smart contracts at a relatively low cost trust. However, open nature inevitably introduces large attack surface, which is severe threat security participantsfunds. In this paper, we...
With the emergence of concepts such as Metaverse and Web 3.0, digital identity plays a very important role one its infrastructures. The traditional model is no longer suitable for requirements economy to some extent at this stage. centralized management system has many drawbacks. For example, owner does not actually control his own identity, there risk easy disclosure theft information. Blockchain technology characteristics decentralization, tamper-proof, traceability, etc., which can...
Blockchain's technological characteristics, such as decentralization, robustness, and anti-modification, represent a significant challenge to the regulation of existing networks data security. Effective blockchain applications is one keys maintain healthy sustainable development ecology. We analyze merits demerits technologies in research directions tracking visualization nodes, consortium penetration technology, public chain active discovery exploration disposition techniques, governance....
The rapid growth of electronic health (eHealth) systems has led to serious security and privacy challenges, highlighting the critical importance protecting sensitive healthcare data. Although researchers have employed blockchain tackle data management sharing within eHealth systems, substantial concerns persist as a primary challenge. In this paper, we introduce TrustHealth, secure system that leverages trusted execution environment (TEE) technology. TrustHealth design smart contracts offer...
Drug counterfeiting and trafficking are common all over the world. The main reason for this is that traditional drug supply chain model opaque, database controlled by direct interest person, so there a chance actual controller tampers with or falsifies data personal gain. blockchain, as distributed ledger, can achieve process transparency, sharing, autonomous management in pharmaceutical through its unique cryptographic algorithms, smart contracts, consensus mechanisms. However, it...
Abstract An enterprise resource planning (ERP) is an enterprise‐wide application software package that integrates all necessary business functions into a single system with common database. Its implementation complex process in terms of technology preparation and organizational change management. Although the importance knowledge management (KM) ERP has been recognized, how to conduct not received deserved attention till now. The main objective this paper develop KM manage process. To...
Background Acute respiratory distress syndrome (ARDS) is a serious lung ailment marked by significant inflammation and damage in the alveoli capillaries of lungs. Recent research suggests strong correlation between onset advancement ARDS an imbalance gut microbiota (GM). Methods In this investigation, Mendelian randomization (MR) analysis was utilized, drawing on data from publicly accessible genome-wide association studies. The primary focus examining interplay GM, inflammatory factors...
The crucial blockchain privacy and scalability demand has boosted off-chain contract execution frameworks for years. Some have recently extended their capabilities to transition states by multi-party computation while ensuring public verifiability. This new capability is defined as acrfull mpt. However, existing MPT solutions lack at least one of the following properties crucially valued communities: data availability, financial fairness, delivery atomicity. paper proposes a novel...
In this paper, we point out weaknesses of Kyosuke Osada et al's protocol. We find that their scheme cannot resist DoS attack and traceability, does not provide forward security. And then propose our Our protocol involves minimal interaction between a tag reader places low computational burden on the tag. The could attack, traceability
Despite the existence of data privacy regulations, such as general protection regulation (GDPR), leaks in Internet Things (IoT) still occur and cause significant harm due to noncompliance users. To address this issue, a notable solution involves recording process an open, immutable blockchain utilizing trusted execution environment (TEE) for reliable compliance verification. Although substantial progress has been made designing schemes recent years, current approaches suffer from various...
G-protein-coupled receptors (GPCRs) are the largest family of transmembrane and regulate various physiological pathological processes. Despite extensive studies, roles GPCRs in mouse embryonic stem cells (mESCs) remain poorly understood. Here, we show that GPR160, a class A member GPCRs, is dramatically downregulated concurrent with mESC differentiation into embryoid bodies vitro. Knockdown Gpr160 leads to downregulation expression pluripotency-associated transcription factors upregulation...
Payment channel networks (PCNs) are emerged as the most widely deployed solution to mitigate scalability problem of permissionless cryptocurrencies, allowing vast payments be carried out off-chain. Routing, which finds feasible paths between senders and receivers, is critical for PCNs. However, existing solutions either fail achieve high that can maintain low storage/computation/network communication overhead, or they susceptible privacy disclosure. In this paper, we propose SorTEE, a...
In recent years, as blockchain adoption has been expanding across a wide range of domains, e.g., digital asset, supply chain finance, etc., the confidentiality smart contracts is now fundamental demand for practical applications. However, while new privacy protection techniques keep coming out, how existing ones can best fit development settings little studied. Suffering from limited architectural support in terms programming interfaces, state-of-the-art solutions hardly reach general...
Sepsis-induced acute respiratory distress syndrome (ARDS) remains a major threat to human health without effective therapeutic drugs. Previous studies demonstrated the power of gene expression profiling reveal pathological changes associated with sepsis-induced ARDS. However, there is still lack systematic data mining framework for identifying potential targets treatment. In this study, we feasibility druggable prediction based on data. Through functional enrichment analysis microarray-based...
Although botnet had been at the top of list main threats to cyber world for an extended period time, its harmfulness has constrained nowadays due development kaleidoscopic network security enforcing tools and people's increasing awareness. And underlying technology stagnant ascribing many drawbacks such as inadequate protection identity Botmaster weak resilience botnet's infrastructure. In this article, we first introduce a new classification based on botnets' network, then briefly analyze...
In recent years, the confidentiality of smart contracts has become a fundamental requirement for practical applications. While many efforts have been made to develop architectural capabilities enforcing confidential contracts, few works arise extend Multi-Party Computation (MPC), i.e., multiple parties jointly evaluate transaction off-chain and commit outputs on-chain without revealing their secret inputs/outputs each other. However, existing solutions lack public verifiability require O(n)...