Chunxiao Ye

ORCID: 0000-0002-6736-1025
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Access Control and Trust
  • Network Security and Intrusion Detection
  • Cryptography and Data Security
  • Service-Oriented Architecture and Web Services
  • Mobile Agent-Based Network Management
  • Multi-Agent Systems and Negotiation
  • Artificial Immune Systems Applications
  • Anomaly Detection Techniques and Applications
  • Gut microbiota and health
  • Distributed and Parallel Computing Systems
  • Advanced Sensor and Control Systems
  • Business Process Modeling and Analysis
  • Cloud Data Security Solutions
  • Advanced Algorithms and Applications
  • Security and Verification in Computing
  • Privacy-Preserving Technologies in Data
  • Shoulder and Clavicle Injuries
  • Smart Grid Security and Resilience
  • Gastrointestinal Bleeding Diagnosis and Treatment
  • Photochromic and Fluorescence Chemistry
  • Shoulder Injury and Treatment
  • Distributed systems and fault tolerance
  • Blockchain Technology Applications and Security
  • Antifungal resistance and susceptibility
  • Advanced Steganography and Watermarking Techniques

Guangzhou Medical University
2024-2025

Second Affiliated Hospital of Guangzhou Medical University
2024-2025

Chongqing University
2007-2024

Southern Medical University Shenzhen Hospital
2021-2024

The 180th Hospital of PLA
2020-2024

Hunan Institute of Engineering
2021-2023

City University of Hong Kong
2022

Southern Medical University
2021

University of Science and Technology Beijing
2018-2019

Ministry of Education of the People's Republic of China
2016

The purpose of this study was to investigate the effect intestinal dysbiosis on bioavailability voriconazole and explore any underlying mechanisms. Sprague-Dawley rats were randomly divided into two groups: a normal control group ceftriaxone-associated dysbiotic group. composition flora examined using 16S rRNA sequencing analysis. Voriconazole concentrations determined by high-performance liquid chromatography-tandem mass spectrometry. Outer membrane vesicles (OMVs) microbes from different...

10.3389/fphar.2024.1522271 article EN cc-by Frontiers in Pharmacology 2025-01-03

Voriconazole (VRC), a widely used antifungal drug, often causes hepatotoxicity, which presents significant clinical challenge. Previous studies demonstrated that

10.14218/jcth.2024.00024 article EN Journal of Clinical and Translational Hepatology 2024-04-19

Wireless capsule endoscopy (WCE) plays an important role in the diagnosis of gastrointestinal diseases. However, it is very time-consuming and fatiguing for a physician to review large number WCE images. Some methods address this problem have recently been presented. these generally employ classification algorithms discriminate abnormal from normal images, which do not localize, recognize, or detect patterns We sought identify better method pattern detection. In paper, convolutional neural...

10.1109/access.2019.2901568 article EN cc-by-nc-nd IEEE Access 2019-01-01

Here, we report a novel polymeric nanoparticle prepared by the self-assembly of amphiphilic copolymers containing fluorescent naphthalimide (NAPH) and photochromic spiropyran (SP), which possesses reversibly photoswitchable dual-color fluorescence controlled release properties. The were synthesized incorporating NAPH SP into methyl ether poly(ethylene glycol)-poly(β-amino esters) (MPEG-PAE) via quaternization. nanoparticles would change between yellow purple upon UV visible light irradiation...

10.1021/acs.macromol.9b01735 article EN Macromolecules 2019-09-13

An advanced metering infrastructure (AMI) system plays a key role in the smart grid (SG), but it is vulnerable to cyberattacks. Current detection methods for AMI cyberattacks mainly focus on data center or distributed independent node. On one hand, difficult train an excellent intrusion model self-learning other large amounts of are shared over network and uploaded central node training. These processes may compromise privacy, cause communication delay, incur high costs. With these...

10.35833/mpce.2021.000279 article EN Journal of Modern Power Systems and Clean Energy 2023-01-01

Purpose: This study aims to investigate the effects of Huang Gan formula (HGF), a Chinese herbal prescription used for chronic kidney disease (CKD), on regulation gut microbiota and colonic microenvironment CKD. Methods: CKD rats were induced by 150 mg/kg adenine gavage 4 weeks, then orally treated with or without 3.6 g/kg 7.2 HGF 8 weeks. The renal function structure analyzed biochemical detection, hematoxylin eosin, Masson’s trichrome, Sirius red immunochemical staining. Average fecal...

10.2147/dddt.s421446 article EN cc-by-nc Drug Design Development and Therapy 2024-01-01

The antifungal agent voriconazole (VRC) exhibits extreme inter-individual and intra-individual variation in terms of its clinical efficacy toxicity. Inflammation, as reflected by C-reactive protein (CRP) concentrations, significantly affects the metabolic ratio trough concentrations voriconazole. Bacteroides fragilis ( B. ) is an important component human intestinal microbiota. Clinical data have shown that abundance comparatively higher patients not presenting with adverse drug reactions,...

10.3389/fphar.2021.663325 article EN cc-by Frontiers in Pharmacology 2021-04-15

This study explores the potential role of a highly selective caspase-1 inhibitor, VX-765, on extracellular matrix (ECM) accumulation and inflammation in diabetic nephropathy (DN) underlying mechanisms.DN rats, induced via high-fat diet/streptozotocin, were used to assess effects VX-765. Parallel experiments carried out rat mesangial cell line HBZY-1 exposed high glucose (HG) reveal molecular mechanism VX-765 preventing DN. Survival analysis, biochemical parameters renal oxidative stress rats...

10.1093/jpp/rgab112 article EN Journal of Pharmacy and Pharmacology 2021-07-15

In existing delegation models, security entirely depends on delegators and administrators, for constraint in these models is only a prerequisite condition. This paper proposes an Attribute-Based Delegation Model (ABDM) with extended consisting of both attribute expression (DAE) condition (CR). ABDM, delegatee must satisfy (especially DAE) when assigned to role. With constraint, delegator can restrict the candidates more strictly. ABDM relieves administrators management work delegation. not...

10.5220/0002560401460159 article EN cc-by-nc-nd 2005-01-01

Requirements verification for complex software system has become more and important in requirements engineering it is one of the most helpful strategies improving quality system. Related work shows that requirement elicitation analysis can be facilitated by semantic technologies domain ontology. A new methodology verifying with structural formal semantics based on ontology proposed this paper. Requirement specification processed natural language decomposed into a set atomic items which are...

10.1109/iceie.2010.5559882 article EN International Conference on Electronics and Information Engineering 2010-08-01

10.3724/sp.j.1087.2012.03422 article EN Journal of Computer Applications 2013-05-30

Due to the fact that it is more and improbable a system administrator recognize manually intervene stop an attack, there increasing recognition ID systems should have lot earn on following its basic principles behavior of complex natural systems, namely in what refers self-organization, allowing for real distributed collective perception this phenomena. A clustering model based self-organizing ant colony networks (CSOACN) systematically proposed intrusion detection system. Instead using...

10.1109/isda.2006.253761 article EN 2006-10-01

10.5281/zenodo.1057453 article EN cc-by Zenodo (CERN European Organization for Nuclear Research) 2010-12-26

Cloud computing have brought a lot of advantages, such as reducing the hardware cost and providing convenient cloud storage service. More more people choose to put their private data in cloud. To improve security privacy, Wu et al. proposed new extensive access control scheme for multi-authority systems (NEDAC-MACS) on basis Yang In this paper, we propose that can resist collusion server user NEDAC-MACS. The cryptographic analysis show our is still secure random oracle.

10.1109/ispa-bdcloud-sustaincom-socialcom48970.2019.00092 article EN 2019-12-01

Aiming at the cyber security problem of advanced metering infrastructure(AMI), an anomaly detection method based on edge computing framework for AMI is proposed. Due to characteristics node data concentrator, concentrator has capability a large amount data. In this paper, distributing intrusion model instead center, meanwhile, two-way communication distributed local parameters replaces transmission. The proposed avoids risk privacy leakage during in AMI, and it greatly reduces delay...

10.1109/iceemt52412.2021.9601888 article EN 2021-07-02

Delegation constraint of current delegation models is mostly prerequisite conditions. In these models, security fully depends on delegator and administrator. many cases, we need a more secured with strict constraint. This paper proposes an Attribute-Based-Delegation-Model (ABDM) extended The in ABDM includes attribute expression (DAE) ABDM, delegatee must satisfy (especially DAE) when assigned to role. With this constraint, can restrict the candidate strictly. relieves management effort...

10.1145/1046290.1046338 article EN 2004-11-14

In mobile IPv6, the location of a node (MN) is obtained by implementing binding update (BU) process. During process, unauthenticated BU message may give rise to many security risks, such as denial-of-service (DoS) attack. Thus, authentication most important for IPv6. The purpose cryptographically generated addresses (CGA) prevent stealing and spoofing existent IP addresses. this paper, novel mechanism based on CGA proposed in With implementation mechanism, care-of address MN will be...

10.1109/nas.2008.8 article EN 2008-06-01
Coming Soon ...