Zhi Li

ORCID: 0000-0002-9510-1888
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Carbon and Quantum Dots Applications
  • Network Security and Intrusion Detection
  • Software System Performance and Reliability
  • Advanced Nanomaterials in Catalysis
  • Security and Verification in Computing
  • Graphene and Nanomaterials Applications
  • Energy Efficient Wireless Sensor Networks
  • COVID-19 Clinical Research Studies
  • Thyroid Cancer Diagnosis and Treatment
  • Information and Cyber Security
  • Security in Wireless Sensor Networks
  • Smart Cities and Technologies
  • Nanocluster Synthesis and Applications
  • Congenital gastrointestinal and neural anomalies
  • Advancements in Photolithography Techniques
  • Adipokines, Inflammation, and Metabolic Diseases
  • Sirtuins and Resveratrol in Medicine
  • Water Quality Monitoring Technologies
  • Superconductivity in MgB2 and Alloys
  • Cancer Research and Treatments
  • Mesenchymal stem cell research
  • Web Application Security Vulnerabilities
  • Image Enhancement Techniques
  • High-Voltage Power Transmission Systems

Huazhong University of Science and Technology
2010-2024

Qingdao Agricultural University
2024

Union Hospital
2010-2020

Weatherford College
2020

Tongji Hospital
2012

Harvard University
2012

Boston Children's Hospital
2012

DDoS attacks are rampant in cloud environments and continually evolve into more sophisticated intelligent modalities, such as low-rate attacks. But meanwhile, the environment is also developing constant. Now container technology microservice architecture widely applied compose container-based environment. Comparing with traditional environments, lightweight virtualization flexible scaling service. Naturally, a question that arises whether these new features of will bring possibilities to...

10.1109/tpds.2019.2942591 article EN cc-by IEEE Transactions on Parallel and Distributed Systems 2019-09-20

Due to the lightweight features, combination of container technology and microservice architecture makes container-based cloud environment more efficient agile than VM-based environment. However, it also greatly amplifies dynamism complexity increases uncertainty security issues in system concurrently. In this case, effectiveness defense mechanisms with fixed strategies would fluctuate as updates occur We refer problem drift mechanisms, which is particularly acute proactive such moving...

10.1109/tdsc.2019.2916666 article EN IEEE Transactions on Dependable and Secure Computing 2019-01-01

Abstract Intelligent antibacterial agent with controllable activities adaptive to the wound microenvironment is appealing reduce drug resistance and enhance efficiency. In this study, celery chosen as carbon source construct celery‐based dots (CECDs) double activities, i.e., reactive oxygen species (ROS)‐production ROS‐clearance activities. The ROS‐production capability of CECDs dependent on oxidase (OXD)‐mimicking activity, which only photo‐activated thus artificially controlled by light...

10.1002/advs.202406681 article EN cc-by Advanced Science 2024-09-03

Abstract We present a hybrid Smoothed Particle Magnetohydrodynamics (SPMHD) code integrating smoothed particle hydrodynamics (SPH) and finite element methods (FEM) to simulate coupled fluid-electromagnetic phenomena. The framework employs SPH for fluid dynamics, addressing large deformations, shocks, plasma behavior, while FEM resolves electromagnetic fields via Maxwell's equations magnetic vector electric scalar potentials, ensuring divergence-free conditions global current density...

10.1088/2058-6272/adc7d9 article EN Plasma Science and Technology 2025-04-01

The application of information and communications technology (ICT) in higher educational institutions has led to the transformation environment from digital smart. assessment smart learning environments will highlight advantages disadvantages its construction results help establish a sustainable space for students' personalized study. However, level effect are difficult judge thoroughly, so comprehensive evaluation method is needed. By rethinking structure (the physical space, resource...

10.1109/access.2021.3062680 article EN cc-by IEEE Access 2021-01-01

Superconducting fault current limiters (SFCLs) offer a solution to control and suppress levels on utility distribution transmission networks, are believed be one of the most exciting applications superconductors in power systems. Consequently, various types SFCLs have been developed many countries. But, there is very long way for from prototypes or paper concepts practical commercialization because unsolved problems. In this paper, novel flux-coupling type SFCL presented. This composed two...

10.1109/tasc.2009.2039784 article EN IEEE Transactions on Applied Superconductivity 2010-03-02

The recent wave of in-browser cryptojacking has ebbed away, due to the new updates mainstream cryptocurrrencies, which demand level mining resources browsers cannot afford. As replacements, resource-rich, loosely protected free Internet services, such as Continuous Integration (CI) platforms, have become attractive targets. In this paper, we report a systematic study on real-world illicit cryptomining public CI platforms (called Cijacking). Unlike cryptojacking, Cijacks masquerade jobs and...

10.1109/sp46214.2022.9833803 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2022-05-01

Software vulnerabilities have posed huge threats to the cyberspace security, and there is an increasing demand for automated vulnerability detection (VD). In recent years, deep learning-based (DL-based) systems been proposed purpose of automatic feature extraction from source code. Although these methods can achieve ideal performance on synthetic datasets, accuracy drops a lot when detecting real-world datasets. Moreover, approaches limit their scopes within single function, being not able...

10.1109/icse48619.2023.00190 article EN 2023-05-01

Elevated serum lactate dehydrogenase (LDH) was commonly reported in COVID-19 patients. However, the relationship between LDH and incidence of severe cases has not been characterized those We retrospectively analyzed characteristics patients from a designated isolation medical center for diagnosed February 6 to March 1. Variables accessed within 48 hours on admission were compared with without disease. Logistic model analyses performed examine prognostic value predicting 52 (28.6%) later...

10.1097/md.0000000000022774 article EN cc-by-nc Medicine 2020-10-14

Irisin is an exercise-induced hormone that regulates lipid metabolism. The present study investigates whether the anti-obesity effect of natural flavonoid pentamethylquercetin (PMQ) related to irisin secretion from skeletal muscle in whole animals and cultured cells. Obese mice induced by monosodium glutamate were administered oral PMQ determine blood level vivo parameters metabolism, mouse C2C12 myoblasts 3T3-L1 preadipocytes employed investigate molecular identities. increased circulating...

10.3390/pharmaceutics14061159 article EN cc-by Pharmaceutics 2022-05-29

Wireless sensor and actor network refers to a group of sensors actors, which gather information in detection area perform appropriate actions upon the event area, respectively. Just as wireless (WSN), one most important objectives designing coordination protocols WSAN is decrease energy consumption prolong lifetime. This paper proposes sensor-actor protocol for based on Voronoi diagram shortest path tree (VDSPT). Network nodes are organized into some clusters weighted that every cluster...

10.1109/cnmt.2009.5374795 article EN International Symposium on Computer Network and Multimedia Technology 2009-12-01

Abstract Dicer, an RNase III endonuclease, is the enzyme which cleaves microRNA (miRNA) and small interfering RNA (siRNA) precursors into 21–25 nucleotide species. This cleavage essential step in biogenesis of these noncoding molecules. In their mature forms, siRNA miRNAs function to regulate gene expression through different mechanisms (Bartel, 2004). To investigate role Dicer microRNAs neuronal polarity development, we used mice domain was conditionally floxed. knockout gene, hippocampal...

10.1016/j.ijdevneu.2012.08.002 article EN International Journal of Developmental Neuroscience 2012-08-14

Recent publications have found associations between single-nucleotide polymorphisms (SNPs) in 8q24 and the risk of breast cancer (BC) some populations, but conclusions are inconsistent. In order to further investigate association variants this region BC Chinese population, we conducted an independent hospital-based case–control study discern effects these SNPs on risk. We genotyped three (rs13281615, rs6983267, rs9642880) 485 cases 530 cancer-free controls. The results indicated that...

10.1007/s13277-013-1348-0 article EN Tumor Biology 2014-01-10

Cloud attack provenance is a well-established industrial practice for assuring transparency and accountability service provider to tenants. However, the multi-tenancy self-service nature coupled with sheer size of cloud implies many unique challenges forensics. Although Virtual Machine Introspection (VMI) powerful tool due privilege isolation, stealthiness state-of-the-art attacks lack precise information make existing solutions difficult fulfill real-time forensics when tracking enormous...

10.1109/tifs.2022.3183409 article EN IEEE Transactions on Information Forensics and Security 2022-01-01

As an emerging technique for confidential computing, trusted execution environment (TEE) receives a lot of attention. To better develop, deploy, and run secure applications on TEE platform such as Intel's SGX, both academic industrial teams have devoted much effort to developing reliable convenient containers. In this paper, we studied the isolation strategies 15 existing containers protect from potentially malicious operating systems (OS) or untrusted applications, using semi-automatic...

10.48550/arxiv.2109.01923 preprint EN cc-by-nc-nd arXiv (Cornell University) 2021-01-01

In this paper, an efficient mask optimization method for enhanced digital micromirror device lithography quality based on improved particle swarm (PSO) is proposed, which greatly improves the of lithography. First, traditional PSO algorithm by introducing adaptive parameter adjustment to enhance its search ability in complex problems. addition, order avoid premature convergence algorithm, a simulated annealing operation introduced make it accept different solution with certain probability...

10.1116/6.0003919 article EN Journal of Vacuum Science & Technology B Nanotechnology and Microelectronics Materials Processing Measurement and Phenomena 2024-09-01

Filesystem isolation enforced by today's container technology has been found to be less effective in the presence of host-container interactions increasingly utilized tools. This weakened led a type path misresolution (Pamir) vulnerabilities, which have considered highly risky and continuously reported over years. In this paper, we present first systematic study on Pamir risk existing fixes related vulnerabilities. Our research reveals that spite significant efforts being made patch...

10.1145/3576915.3623154 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2023-11-15

As the complexity and reliability requirements of software projects increase constantly, testing is becoming more prominent important in engineering. Testing management system basis constructing system. It regulates processes, ensures entire process under control. Based on Django framework, this paper design implement a test based B/S architecture. can operate as common platform for management, reduce cost cycle testing, guarantee quality efficiency testing.

10.4028/www.scientific.net/amm.525.707 article EN Applied Mechanics and Materials 2014-02-01
Coming Soon ...