- Advanced Malware Detection Techniques
- Carbon and Quantum Dots Applications
- Network Security and Intrusion Detection
- Software System Performance and Reliability
- Advanced Nanomaterials in Catalysis
- Security and Verification in Computing
- Graphene and Nanomaterials Applications
- Energy Efficient Wireless Sensor Networks
- COVID-19 Clinical Research Studies
- Thyroid Cancer Diagnosis and Treatment
- Information and Cyber Security
- Security in Wireless Sensor Networks
- Smart Cities and Technologies
- Nanocluster Synthesis and Applications
- Congenital gastrointestinal and neural anomalies
- Advancements in Photolithography Techniques
- Adipokines, Inflammation, and Metabolic Diseases
- Sirtuins and Resveratrol in Medicine
- Water Quality Monitoring Technologies
- Superconductivity in MgB2 and Alloys
- Cancer Research and Treatments
- Mesenchymal stem cell research
- Web Application Security Vulnerabilities
- Image Enhancement Techniques
- High-Voltage Power Transmission Systems
Huazhong University of Science and Technology
2010-2024
Qingdao Agricultural University
2024
Union Hospital
2010-2020
Weatherford College
2020
Tongji Hospital
2012
Harvard University
2012
Boston Children's Hospital
2012
DDoS attacks are rampant in cloud environments and continually evolve into more sophisticated intelligent modalities, such as low-rate attacks. But meanwhile, the environment is also developing constant. Now container technology microservice architecture widely applied compose container-based environment. Comparing with traditional environments, lightweight virtualization flexible scaling service. Naturally, a question that arises whether these new features of will bring possibilities to...
Due to the lightweight features, combination of container technology and microservice architecture makes container-based cloud environment more efficient agile than VM-based environment. However, it also greatly amplifies dynamism complexity increases uncertainty security issues in system concurrently. In this case, effectiveness defense mechanisms with fixed strategies would fluctuate as updates occur We refer problem drift mechanisms, which is particularly acute proactive such moving...
Abstract Intelligent antibacterial agent with controllable activities adaptive to the wound microenvironment is appealing reduce drug resistance and enhance efficiency. In this study, celery chosen as carbon source construct celery‐based dots (CECDs) double activities, i.e., reactive oxygen species (ROS)‐production ROS‐clearance activities. The ROS‐production capability of CECDs dependent on oxidase (OXD)‐mimicking activity, which only photo‐activated thus artificially controlled by light...
Abstract We present a hybrid Smoothed Particle Magnetohydrodynamics (SPMHD) code integrating smoothed particle hydrodynamics (SPH) and finite element methods (FEM) to simulate coupled fluid-electromagnetic phenomena. The framework employs SPH for fluid dynamics, addressing large deformations, shocks, plasma behavior, while FEM resolves electromagnetic fields via Maxwell's equations magnetic vector electric scalar potentials, ensuring divergence-free conditions global current density...
The application of information and communications technology (ICT) in higher educational institutions has led to the transformation environment from digital smart. assessment smart learning environments will highlight advantages disadvantages its construction results help establish a sustainable space for students' personalized study. However, level effect are difficult judge thoroughly, so comprehensive evaluation method is needed. By rethinking structure (the physical space, resource...
Superconducting fault current limiters (SFCLs) offer a solution to control and suppress levels on utility distribution transmission networks, are believed be one of the most exciting applications superconductors in power systems. Consequently, various types SFCLs have been developed many countries. But, there is very long way for from prototypes or paper concepts practical commercialization because unsolved problems. In this paper, novel flux-coupling type SFCL presented. This composed two...
The recent wave of in-browser cryptojacking has ebbed away, due to the new updates mainstream cryptocurrrencies, which demand level mining resources browsers cannot afford. As replacements, resource-rich, loosely protected free Internet services, such as Continuous Integration (CI) platforms, have become attractive targets. In this paper, we report a systematic study on real-world illicit cryptomining public CI platforms (called Cijacking). Unlike cryptojacking, Cijacks masquerade jobs and...
Software vulnerabilities have posed huge threats to the cyberspace security, and there is an increasing demand for automated vulnerability detection (VD). In recent years, deep learning-based (DL-based) systems been proposed purpose of automatic feature extraction from source code. Although these methods can achieve ideal performance on synthetic datasets, accuracy drops a lot when detecting real-world datasets. Moreover, approaches limit their scopes within single function, being not able...
Elevated serum lactate dehydrogenase (LDH) was commonly reported in COVID-19 patients. However, the relationship between LDH and incidence of severe cases has not been characterized those We retrospectively analyzed characteristics patients from a designated isolation medical center for diagnosed February 6 to March 1. Variables accessed within 48 hours on admission were compared with without disease. Logistic model analyses performed examine prognostic value predicting 52 (28.6%) later...
Irisin is an exercise-induced hormone that regulates lipid metabolism. The present study investigates whether the anti-obesity effect of natural flavonoid pentamethylquercetin (PMQ) related to irisin secretion from skeletal muscle in whole animals and cultured cells. Obese mice induced by monosodium glutamate were administered oral PMQ determine blood level vivo parameters metabolism, mouse C2C12 myoblasts 3T3-L1 preadipocytes employed investigate molecular identities. increased circulating...
Wireless sensor and actor network refers to a group of sensors actors, which gather information in detection area perform appropriate actions upon the event area, respectively. Just as wireless (WSN), one most important objectives designing coordination protocols WSAN is decrease energy consumption prolong lifetime. This paper proposes sensor-actor protocol for based on Voronoi diagram shortest path tree (VDSPT). Network nodes are organized into some clusters weighted that every cluster...
Abstract Dicer, an RNase III endonuclease, is the enzyme which cleaves microRNA (miRNA) and small interfering RNA (siRNA) precursors into 21–25 nucleotide species. This cleavage essential step in biogenesis of these noncoding molecules. In their mature forms, siRNA miRNAs function to regulate gene expression through different mechanisms (Bartel, 2004). To investigate role Dicer microRNAs neuronal polarity development, we used mice domain was conditionally floxed. knockout gene, hippocampal...
Recent publications have found associations between single-nucleotide polymorphisms (SNPs) in 8q24 and the risk of breast cancer (BC) some populations, but conclusions are inconsistent. In order to further investigate association variants this region BC Chinese population, we conducted an independent hospital-based case–control study discern effects these SNPs on risk. We genotyped three (rs13281615, rs6983267, rs9642880) 485 cases 530 cancer-free controls. The results indicated that...
Cloud attack provenance is a well-established industrial practice for assuring transparency and accountability service provider to tenants. However, the multi-tenancy self-service nature coupled with sheer size of cloud implies many unique challenges forensics. Although Virtual Machine Introspection (VMI) powerful tool due privilege isolation, stealthiness state-of-the-art attacks lack precise information make existing solutions difficult fulfill real-time forensics when tracking enormous...
As an emerging technique for confidential computing, trusted execution environment (TEE) receives a lot of attention. To better develop, deploy, and run secure applications on TEE platform such as Intel's SGX, both academic industrial teams have devoted much effort to developing reliable convenient containers. In this paper, we studied the isolation strategies 15 existing containers protect from potentially malicious operating systems (OS) or untrusted applications, using semi-automatic...
In this paper, an efficient mask optimization method for enhanced digital micromirror device lithography quality based on improved particle swarm (PSO) is proposed, which greatly improves the of lithography. First, traditional PSO algorithm by introducing adaptive parameter adjustment to enhance its search ability in complex problems. addition, order avoid premature convergence algorithm, a simulated annealing operation introduced make it accept different solution with certain probability...
Filesystem isolation enforced by today's container technology has been found to be less effective in the presence of host-container interactions increasingly utilized tools. This weakened led a type path misresolution (Pamir) vulnerabilities, which have considered highly risky and continuously reported over years. In this paper, we present first systematic study on Pamir risk existing fixes related vulnerabilities. Our research reveals that spite significant efforts being made patch...
As the complexity and reliability requirements of software projects increase constantly, testing is becoming more prominent important in engineering. Testing management system basis constructing system. It regulates processes, ensures entire process under control. Based on Django framework, this paper design implement a test based B/S architecture. can operate as common platform for management, reduce cost cycle testing, guarantee quality efficiency testing.