Jinxue Zhang

ORCID: 0000-0002-7483-1275
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Immune Cell Function and Interaction
  • Privacy, Security, and Data Protection
  • Advanced Malware Detection Techniques
  • Privacy-Preserving Technologies in Data
  • Internet Traffic Analysis and Secure E-voting
  • Cancer-related molecular mechanisms research
  • Network Security and Intrusion Detection
  • Spam and Phishing Detection
  • User Authentication and Security Systems
  • Sarcoma Diagnosis and Treatment
  • Human Mobility and Location-Based Analysis
  • Security in Wireless Sensor Networks
  • Mobile Crowdsensing and Crowdsourcing
  • Platelet Disorders and Treatments
  • RNA modifications and cancer
  • Osteoarthritis Treatment and Mechanisms
  • Perovskite Materials and Applications
  • Cancer, Hypoxia, and Metabolism
  • Adipokines, Inflammation, and Metabolic Diseases
  • Conducting polymers and applications
  • Immune cells in cancer
  • Robotics and Sensor-Based Localization
  • Biometric Identification and Security
  • RNA Research and Splicing
  • Augmented Reality Applications

Air Force Medical University
2015-2024

Geospatial Research (United Kingdom)
2023

Animal Science Research Institute
2023

University of Science and Technology of China
2022

Hefei Institutes of Physical Science
2022

Institute of Solid State Physics
2022

Chinese Academy of Sciences
2022

Arizona State University
2013-2021

Anhui Normal University
2020

Wenzhou Medical University
2019

Proximity-based mobile social networking (PMSN) refers to the interaction among physically proximate users. The first step toward effective PMSN is for users choose whom interact with. Profile matching two comparing their personal profiles and promising user selection in PMSN. It, however, conflicts with users' growing privacy concerns about disclosing complete strangers. This paper tackles this open challenge by designing novel fine-grained private protocols. Our protocols enable perform...

10.1109/jsac.2013.sup.0513057 article EN IEEE Journal on Selected Areas in Communications 2013-06-20

Online social networks (OSNs) are increasingly threatened by bots which software-controlled OSN accounts that mimic human users with malicious intentions. A botnet refers to a group of under the control single botmaster, collaborate conduct behavior while mimicking interactions among normal reduce their individual risk being detected. We demonstrate effectiveness and advantages exploiting for spam distribution digital-influence manipulation through real experiments on Twitter also...

10.1109/tdsc.2016.2641441 article EN publisher-specific-oa IEEE Transactions on Dependable and Secure Computing 2016-12-19

Mobile authentication is indispensable for preventing unauthorized access to multi-touch mobile devices. Existing techniques are often cumbersome use and also vulnerable shoulder-surfing smudge attacks. This paper focuses on designing, implementing, evaluating TouchIn, a two-factor system TouchIn works by letting user draw the touchscreen with one or multiple fingers unlock his device, authenticated based geometric properties of drawn curves as well behavioral physiological characteristics....

10.1109/cns.2014.6997513 article EN IEEE Conference on Communications and Network Security 2014-10-01

The deep penetration of tablets in daily life has made them attractive targets for keystroke inference attacks that aim to infer a tablet user's typed inputs.This paper presents VISIBLE, novel video-assisted framework inputs from surreptitious video recordings backside motion.VISIBLE is built upon the observation keystrokes on different positions tablet's soft keyboard cause its exhibit motion patterns.VISIBLE uses complex steerable pyramid decomposition detect and quantify subtle patterns...

10.14722/ndss.2016.23060 article EN 2016-01-01

User-generated social media data are exploding and of high demand in public private sectors. The disclosure intact exacerbates the threats to user privacy. In this paper, we first identify a text-based user-linkage attack on current outsourcing practices, which real users an anonymized dataset can be pinpointed based users' unprotected text data. Then propose framework for differentially privacy-preserving time literature. Within our framework, service providers outsource perturbed datasets...

10.1109/infocom.2018.8486242 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2018-04-01

Microblogging systems such as Twitter have seen explosive use in public and private sectors. The age information of microbloggers can be very useful for many applications viral marketing social studies/surveys. Current microblogging systems, however, sparse information. In this paper, we present MAIF, a novel framework that explores content interaction to explore the hidden ages microbloggers. We thoroughly evaluate accuracy MAIF with real-world dataset 54,879 users. Our results show achieve...

10.1609/icwsm.v10i1.14731 article EN Proceedings of the International AAAI Conference on Web and Social Media 2021-08-04

Cooperative (spectrum) sensing is a key function for dynamic spectrum access and essential avoiding interference with licensed primary users identifying holes. A promising approach effective cooperative over large geographic region to rely on special spectrum-sensing providers (SSPs), which outsource tasks distributed mobile users. Its feasibility deeply rooted in the ubiquitous penetration of devices into everyday life. Crowdsourcing-based is, however, vulnerable malicious data injection...

10.1109/infcom.2013.6567059 article EN 2013-04-01

Influential users have great potential for accelerating information dissemination and acquisition on Twitter. How to measure the influence of Twitter has attracted significant academic industrial attention. Existing influential measurement techniques, however, are vulnerable sybil that thriving Although defenses online social networks been extensively investigated, they commonly assume unique mappings from human-established trust relationships associations thus do not apply where can freely...

10.1109/tnet.2015.2494059 article EN IEEE/ACM Transactions on Networking 2015-11-06

Online social networks (OSNs) are increasingly threatened by bots which software-controlled OSN accounts that mimic human users with malicious intentions. A botnet refers to a group of under the control single botmaster, collaborate conduct behavior, while at same time mimicking interactions among normal reduce their individual risk being detected. We demonstrate effectiveness and advantages exploiting for spam distribution digital-influence manipulation through real experiments on Twitter...

10.1109/cns.2013.6682691 article EN 2013-10-01

This paper studies secret key establishment between two adjacent mobile nodes, which is crucial for securing emerging device-to-device (D2D) communication. As a promising method, cooperative generation allows nodes to select some common neighbors as relays and directly extract from the wireless channels among them. A challenging issue that has been overlooked are often self-interested reluctant act without adequate reward in return. We propose SYNERGY, game-theoretical approach stimulating...

10.1109/infocom.2014.6848029 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

Abstract In this study, we observed that deletion of CD226 on regulatory T cells (Tregs) precedes renal fibrosis in a mouse unilateral ureteral obstruction (UUO) model. First, generated Treg-specific gene knockout mice (CD226fl/fl Foxp3YFP-Cre). Next, CD226fl/fl Foxp3YFP-Cre and control were subjected to UUO surgery. Pathologic analysis Sirius red Masson's trichrome staining showed the kidneys following much more severe interstitial than at days 10 20. Additionally, increased fibronectin...

10.1002/jlb.2ma1119-174rr article EN Journal of Leukocyte Biology 2019-12-04

Distributed stream monitoring has numerous potential applications in future smart cities. Communication efficiency, and data privacy are two main challenges for distributed services. In this paper, we propose PriStream, the first communication-efficient privacy-preserving system thresholded PERCENTILE aggregates. PriStream allows service provider to evaluate an arbitrary function over a desired percentile of reports monitor when output exceeds predetermined threshold. Detailed theoretical...

10.1109/infocom.2016.7524461 article EN 2016-04-01

Osteosarcoma (OS) is a highly malignant and aggressive bone tumor. This study was performed to explore the mechanisms of HuR (human antigen R) in progression OS.HuR expression levels OS tissues cells were detected by immunohistochemistry western blotting. siRNA transfected into SJSA-1 downregulate expression, then cell proliferation, migration, epithelial-mesenchymal transition (EMT) evaluated. RNA immunoprecipitation determine association long non-coding (lncRNA) XIST argonaute RISC...

10.3389/fonc.2021.601982 article EN cc-by Frontiers in Oncology 2021-03-19

Abstract Background Leukocyte-associated immunoglobulin-like receptor-1 (LAIR-1) is a collagen receptor belonging to the immunoglobulin superfamily. Although previous studies have evaluated biological role of LAIR in solid tumors, precise mechanisms underlying functions LAIR-1 as regulator tumor remain unclear. Methods expression was by immunohistochemical analysis using an osteosarcoma (OS) tissue microarray. Wound healing and transwell migration assays were performed evaluate cell...

10.1186/s12957-020-01896-7 article EN cc-by World Journal of Surgical Oncology 2020-06-20

CD226 is a co-stimulatory adhesion molecule found on immune and endothelial cells. Here, we evaluated possible role for in inhibiting glucose uptake isolated human umbilical vein cells (HUVECs) wild-type (WT) knockout (KO) mice with high-fat diet (HFD)-induced type 2 diabetes (T2DM). expression increased under hyperglycemic conditions the presence of TNF-α. Furthermore, knockdown improved cells, KO exhibited tolerance. Levels soluble plasma were higher T2DM patients following an oral...

10.18632/oncotarget.7505 article EN Oncotarget 2016-02-19

Twitter is an extremely popular social networking platform. Most users do not disclose their locations due to privacy concerns. Although inferring the location of individual user has been extensively studied, it still missing effectively find majority in a specific geographical area without scanning whole Twittersphere, and obtaining these will result both positive negative significance. In this paper, we propose LocInfer, novel lightweight system tackle problem. LocInfer explores fact that...

10.1109/cns.2015.7346854 preprint EN 2015-09-01

In this paper, we propose a context-aware system framework characteristic of two novel features. First, is capable modeling highly complex usage scenarios as finite state machine while having transitions controlled by context information. And, designed with Augmented Reality capability an integral component in its overall architecture to enable augmented interaction applications. We believe can be used ubiquitously Context Aware Computing (CAC). As example, prototype has been developed for...

10.1109/icpca.2010.5704077 article EN 2010-12-01

Mobile authentication is indispensable for preventing unauthorized access to multi-touch mobile devices. Existing techniques are often cumbersome use and also vulnerable shoulder-surfing smudge attacks. This paper focuses on designing, implementing, evaluating TouchIn, a two-factor system TouchIn works by letting user draw the touchscreen with one or multiple fingers unlock his device, authenticated based geometric properties of drawn curves as well behavioral physiological characteristics....

10.48550/arxiv.1402.1216 preprint EN other-oa arXiv (Cornell University) 2014-01-01

This study used constitutive CD226 gene knockout (KO) mice as a model to investigate the functions and mechanisms of in megakaryocyte (MK) maturation platelet activation. Although deficiency did not cause MK polyploidization or granule abnormalities, increased counts were detected femora bone marrow (BM) spleen KO mice. Particularly, have more extensive membrane system MKs platelets than wild-type (WT) We also demonstrated that displayed counts, shortened bleeding time, enhanced aggregation....

10.1096/fj.201902142r article EN The FASEB Journal 2020-04-05

Platelet-rich plasma (PRP) is a platelet-based application used to treat osteoarthritis (OA) clinically. The co-stimulatory molecule CD226 expressed in T cells, NK and also platelets. However, exact effects of on platelets whether its expression level influences PRP efficacy are largely unknown. Here, fl/fl PF4-Cre mice were obtained from mating with mice. Blood samples washed collected the eyeballs undergo routine blood tests transmission electron microscopy. Differentially proteins...

10.3389/fphar.2021.732453 article EN cc-by Frontiers in Pharmacology 2021-08-30
Coming Soon ...