Hong Lei

ORCID: 0000-0002-6564-1568
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Cryptography and Data Security
  • Cloud Data Security Solutions
  • Security and Verification in Computing
  • FOXO transcription factor regulation
  • MicroRNA in disease regulation
  • Privacy-Preserving Technologies in Data
  • Regional Economic and Spatial Analysis
  • Cancer Cells and Metastasis
  • Cancer-related molecular mechanisms research
  • Underwater Vehicles and Communication Systems
  • CRISPR and Genetic Engineering
  • Educational Technology and Assessment
  • FinTech, Crowdfunding, Digital Finance
  • Network Security and Intrusion Detection
  • Genomics, phytochemicals, and oxidative stress
  • Spam and Phishing Detection
  • Business Process Modeling and Analysis
  • Crime, Illicit Activities, and Governance
  • Service-Oriented Architecture and Web Services
  • Circular RNAs in diseases
  • RFID technology advancements
  • Advanced Authentication Protocols Security
  • Higher Education and Teaching Methods
  • Cybercrime and Law Enforcement Studies

Hainan University
2021-2025

National Institutes of Health Clinical Center
2020-2025

Shanghai Chengtou (China)
2022-2024

Shanghai Children's Hospital
2024

Shanghai Jiao Tong University
2024

Nanjing Medical University
2021-2023

Xi’an Children’s Hospital
2023

Xi'an Jiaotong University
2006-2023

Ministry of Ecology and Environment
2023

Nanjing Institute of Environmental Sciences
2023

Underwater sensor networks (UWSNs) play a vital role in marine exploration and environmental monitoring. However, due to the characteristics of underwater acoustic channels such as high delay, low bandwidth, energy limitation, design an media access control (MAC) protocol has brought great challenges, existing MAC designs rarely consider influence channel interference factors networking. Therefore, this paper proposes collision avoidance for clustering networks. The first classifies users by...

10.3390/jmse13010076 article EN cc-by Journal of Marine Science and Engineering 2025-01-04

The ultralightweight RFID protocols only involve simple bit-wise operations (like XOR, AND, OR, etc.) on tags. In this paper, we show that the strong authentication and integrity (SASI) protocol has two security vulnerabilities, namely denial-of-service (DoS) anonymity tracing based a compromised tag. former permanently disables capability of tag by destroying synchronization between reader. latter links with past actions performed

10.1109/tdsc.2008.32 article EN IEEE Transactions on Dependable and Secure Computing 2008-11-12

As a decentralized, public, and digital ledger technology in Peer-to-Peer network, blockchain has received much attention from various fields, including finance, healthcare, supply chain, etc. However, some challenges (e.g., scalability, privacy, security issues) severely affects the wide adoption of technology. Recently, Intel software guard extensions (SGX), as new trusted computing technologies, have provided solution to above area. Although many studies focused on using SGX enhance their...

10.1109/access.2020.3024254 article EN cc-by IEEE Access 2020-01-01

Decentralized finance, i.e., DeFi, has become the most popular type of application on many public blockchains (e.g., Ethereum) in recent years. Compared to traditional DeFi allows customers flexibly participate diverse blockchain financial services lending, borrowing, collateralizing, exchanging etc.) via smart contracts at a relatively low cost trust. However, open nature inevitably introduces large attack surface, which is severe threat security participantsfunds. In this paper, we...

10.1109/icse-companion52605.2021.00025 article EN 2021-05-01

With the emergence of concepts such as Metaverse and Web 3.0, digital identity plays a very important role one its infrastructures. The traditional model is no longer suitable for requirements economy to some extent at this stage. centralized management system has many drawbacks. For example, owner does not actually control his own identity, there risk easy disclosure theft information. Blockchain technology characteristics decentralization, tamper-proof, traceability, etc., which can...

10.1109/blockchain55522.2022.00077 article EN 2022-08-01

Blockchain's technological characteristics, such as decentralization, robustness, and anti-modification, represent a significant challenge to the regulation of existing networks data security. Effective blockchain applications is one keys maintain healthy sustainable development ecology. We analyze merits demerits technologies in research directions tracking visualization nodes, consortium penetration technology, public chain active discovery exploration disposition techniques, governance....

10.1109/blockchain55522.2022.00076 article EN 2022-08-01

The rapid growth of electronic health (eHealth) systems has led to serious security and privacy challenges, highlighting the critical importance protecting sensitive healthcare data. Although researchers have employed blockchain tackle data management sharing within eHealth systems, substantial concerns persist as a primary challenge. In this paper, we introduce TrustHealth, secure system that leverages trusted execution environment (TEE) technology. TrustHealth design smart contracts offer...

10.3390/electronics13122425 article EN Electronics 2024-06-20

Drug counterfeiting and trafficking are common all over the world. The main reason for this is that traditional drug supply chain model opaque, database controlled by direct interest person, so there a chance actual controller tampers with or falsifies data personal gain. blockchain, as distributed ledger, can achieve process transparency, sharing, autonomous management in pharmaceutical through its unique cryptographic algorithms, smart contracts, consensus mechanisms. However, it...

10.1109/icbda57405.2023.10104779 article EN 2023-03-03

Abstract An enterprise resource planning (ERP) is an enterprise‐wide application software package that integrates all necessary business functions into a single system with common database. Its implementation complex process in terms of technology preparation and organizational change management. Although the importance knowledge management (KM) ERP has been recognized, how to conduct not received deserved attention till now. The main objective this paper develop KM manage process. To...

10.1002/sres.751 article EN Systems Research and Behavioral Science 2006-03-01

Background Acute respiratory distress syndrome (ARDS) is a serious lung ailment marked by significant inflammation and damage in the alveoli capillaries of lungs. Recent research suggests strong correlation between onset advancement ARDS an imbalance gut microbiota (GM). Methods In this investigation, Mendelian randomization (MR) analysis was utilized, drawing on data from publicly accessible genome-wide association studies. The primary focus examining interplay GM, inflammatory factors...

10.3389/fmicb.2023.1294692 article EN cc-by Frontiers in Microbiology 2023-12-20

The crucial blockchain privacy and scalability demand has boosted off-chain contract execution frameworks for years. Some have recently extended their capabilities to transition states by multi-party computation while ensuring public verifiability. This new capability is defined as acrfull mpt. However, existing MPT solutions lack at least one of the following properties crucially valued communities: data availability, financial fairness, delivery atomicity. paper proposes a novel...

10.1109/tifs.2023.3318935 article EN IEEE Transactions on Information Forensics and Security 2023-09-25

In this paper, we point out weaknesses of Kyosuke Osada et al's protocol. We find that their scheme cannot resist DoS attack and traceability, does not provide forward security. And then propose our Our protocol involves minimal interaction between a tag reader places low computational burden on the tag. The could attack, traceability

10.1109/isdpe.2007.29 article EN 2007-11-01

Despite the existence of data privacy regulations, such as general protection regulation (GDPR), leaks in Internet Things (IoT) still occur and cause significant harm due to noncompliance users. To address this issue, a notable solution involves recording process an open, immutable blockchain utilizing trusted execution environment (TEE) for reliable compliance verification. Although substantial progress has been made designing schemes recent years, current approaches suffer from various...

10.1109/jiot.2023.3321308 article EN IEEE Internet of Things Journal 2023-10-02

G-protein-coupled receptors (GPCRs) are the largest family of transmembrane and regulate various physiological pathological processes. Despite extensive studies, roles GPCRs in mouse embryonic stem cells (mESCs) remain poorly understood. Here, we show that GPR160, a class A member GPCRs, is dramatically downregulated concurrent with mESC differentiation into embryoid bodies vitro. Knockdown Gpr160 leads to downregulation expression pluripotency-associated transcription factors upregulation...

10.1016/j.jgg.2024.05.003 article EN cc-by-nc-nd Journal of genetics and genomics/Journal of Genetics and Genomics 2024-05-14

Payment channel networks (PCNs) are emerged as the most widely deployed solution to mitigate scalability problem of permissionless cryptocurrencies, allowing vast payments be carried out off-chain. Routing, which finds feasible paths between senders and receivers, is critical for PCNs. However, existing solutions either fail achieve high that can maintain low storage/computation/network communication overhead, or they susceptible privacy disclosure. In this paper, we propose SorTEE, a...

10.1109/tnsm.2022.3213559 article EN IEEE Transactions on Network and Service Management 2022-10-11

In recent years, as blockchain adoption has been expanding across a wide range of domains, e.g., digital asset, supply chain finance, etc., the confidentiality smart contracts is now fundamental demand for practical applications. However, while new privacy protection techniques keep coming out, how existing ones can best fit development settings little studied. Suffering from limited architectural support in terms programming interfaces, state-of-the-art solutions hardly reach general...

10.1109/icdcs51616.2021.00111 article EN 2021-07-01

Sepsis-induced acute respiratory distress syndrome (ARDS) remains a major threat to human health without effective therapeutic drugs. Previous studies demonstrated the power of gene expression profiling reveal pathological changes associated with sepsis-induced ARDS. However, there is still lack systematic data mining framework for identifying potential targets treatment. In this study, we feasibility druggable prediction based on data. Through functional enrichment analysis microarray-based...

10.1080/21655979.2021.1917981 article EN Bioengineered 2021-01-01

Although botnet had been at the top of list main threats to cyber world for an extended period time, its harmfulness has constrained nowadays due development kaleidoscopic network security enforcing tools and people's increasing awareness. And underlying technology stagnant ascribing many drawbacks such as inadequate protection identity Botmaster weak resilience botnet's infrastructure. In this article, we first introduce a new classification based on botnets' network, then briefly analyze...

10.1109/jiot.2023.3322716 article EN IEEE Internet of Things Journal 2023-10-09

In recent years, the confidentiality of smart contracts has become a fundamental requirement for practical applications. While many efforts have been made to develop architectural capabilities enforcing confidential contracts, few works arise extend Multi-Party Computation (MPC), i.e., multiple parties jointly evaluate transaction off-chain and commit outputs on-chain without revealing their secret inputs/outputs each other. However, existing solutions lack public verifiability require O(n)...

10.1145/3564625.3567995 article EN 2022-12-03
Coming Soon ...