- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Structural Integrity and Reliability Analysis
- Adversarial Robustness in Machine Learning
- Security and Verification in Computing
- Electrostatic Discharge in Electronics
- Physical Unclonable Functions (PUFs) and Hardware Security
- Cancer-related molecular mechanisms research
- Analog and Mixed-Signal Circuit Design
- Power System Optimization and Stability
- Advancements in Semiconductor Devices and Circuit Design
- Cancer Immunotherapy and Biomarkers
- Geotechnical Engineering and Underground Structures
- Breast Cancer Treatment Studies
- Engineering Structural Analysis Methods
- Advanced Malware Detection Techniques
- Cryptography and Data Security
- Advanced Breast Cancer Therapies
- MicroRNA in disease regulation
- Non-Destructive Testing Techniques
- Energy Load and Power Forecasting
- Privacy-Preserving Technologies in Data
- Autophagy in Disease and Therapy
- Material Properties and Failure Mechanisms
- Circular RNAs in diseases
Guizhou University
2021-2025
China Medical University
2016-2025
State Key Laboratory of Industrial Control Technology
2019-2024
Zhejiang University
2018-2024
Shandong University of Traditional Chinese Medicine
2023-2024
First People's Hospital of Yunnan Province
2015-2024
Kunming University of Science and Technology
2015-2024
Qilu University of Technology
2024
Shandong Academy of Sciences
2024
Technology and Engineering Center for Space Utilization
2023
Metaverse is a vast virtual environment parallel to the physical world in which users enjoy variety of services acting as an avatar. To build secure living habitat, it's vital ensure virtual-physical traceability that tracking malicious player via his avatars space. In this paper, we propose two-factor authentication framework based on biometric-based and chameleon signature. First, aiming at disguise space, design avatar's identity model verifiability identity. Second, facing efficiency...
The rapid development of information and communications technology has enabled the use digital-controlled software-driven distributed energy resources (DERs) to improve flexibility efficiency power supply, support grid operations. However, this evolution also exposes geographically-dispersed DERs cyber threats, including hardware software vulnerabilities, communication issues, personnel errors, etc. Therefore, enhancing cyber-resiliency DER-based smart -the ability survive successful...
Recent studies have considered thwarting false data injection (FDI) attacks against state estimation in power grids by proactively perturbing branch susceptances. This approach is known as moving target defense (MTD). However, despite of the deployment MTD, it still possible for attacker to launch stealthy FDI generated with former In this paper, we prove that, an MTD has capability thwart all constructed susceptances only if (i) number branches l system not less than twice that states n...
With the rapid development of information and communications technology in DC microgrids (DCmGs), deception attacks, which typically include false data injection replay have been widely recognized as a significant threat. However, existing literature ignores possibility intelligent attacker, who could launch attacks once obtaining necessary by exploiting zero-day vulnerabilities or bribing insiders, to affect system an unforeseeable manner. In this paper, based on observation that primary...
PurposeTo compare posterior corneal elevation (PCE) changes and biomechanical post fematosecond laser-assisted laser in situ keratomileusis (FS-LASIK) small incision lenticule extraction (SMILE) procedures using the Pentacam system Ocular Response Analyzer (ORA).DesignRetrospective observational case series study.Method106 patients with bilateral myopia who underwent either FS-LASIK (56 patients) or SMILE (50 were reviewed, only right eye was used analysis. Inclusion criteria include a...
In the present study, we examined mechanisms of oxaliplatin-induced drug resistance in human colorectal cancer cell lines HT29 and HCT116. Our results demonstrate a significant autophagy expression CRC cells after an oxaliplatin treatment. Administration to significantly enhanced HMGB1, which regulated response negatively regulate apoptosis. Moreover, decreased -induced increased apoptosis level were detected stable harboring HMGB1 shRNA. Then noted that induced extracellular...
Data integrity attack (DIA) is one class of threatening cyber attacks against the Internet-of-Things (IoT)-based smart grid. With assumption that attacker capable obtaining complete or incomplete information system topology and branch parameters, it has been widely recognized highly synthesized DIA can evade being detected undermine grid state estimation. However, parameters cannot be easily obtained inferred by in practice. They changed disturbed with time. In this article, we designing...
Smart grid is confronted with cyberattacks due to the increasing dependence on cyberspace. False data injection attacks (FDIAs) represent a major type of that cannot be detected by traditional bad detection (BDD). The majority existing researches focus how detect FDIAs, while little attention has been paid obtaining exact attack locations, which are crucial for deploying countermeasures in time. In this paper, we propose neural network-based approach online localizing FDIAs AC power systems....
Immunotherapy has emerged as a promising cancer treatment option in recent years. In immune “hot” tumors, characterized by abundant cell infiltration, immunotherapy can improve patients’ prognosis activating the function of cells. By contrast, “cold” tumors are often less sensitive to owing low immunogenicity tumor cells, an inhibitory microenvironment, and series immune-escape mechanisms. Immunogenic death (ICD) is cellular process facilitate transformation eliciting innate adaptive...
Moving target defense (MTD) is becoming promising in thwarting the false data injection attacks (FDIAs) on power system state estimation (SE). However, due to nonlinear dynamics of AC systems, investigation general evaluation metrics MTD, namely effectiveness terms attack detection and hiddenness, still challenging. To this end, paper, we attempt conduct an explicit analysis MTD performance systems. First, derive approximations measurement residuals quantify two metrics. Then, based...
The decarbonization of energy systems has posed unprecedented challenges in system complexity and operational uncertainty that render it imperative to exploit cutting-edge artificial intelligence (AI) technologies realize real-time, autonomous power operation control. In particular, deep reinforcement learning (DRL)-based approaches are extensively studied implemented several trials worldwide. Nevertheless, the vulnerability DRL brings new security threats have not been well identified...
Influenza A viruses pose a significant threat globally each year, underscoring the need for vaccine- or antiviral-based broad-protection strategy. Here, we describe chimeric monoclonal antibody, C12H5, that offers neutralization against seasonal and pandemic H1N1 viruses, cross-protection some H5N1 viruses. Notably, C12H5 mAb broad neutralizing activity by controlling virus entry egress, protection viral challenge in vivo. Through structural analyses, show engages hemagglutinin (HA), major...
Purpose The purpose of this paper is to explore the longitudinal influence gender, age, education level, organizational tenure and emotional intelligence on three dimensions knowledge hiding over time. Design/methodology/approach A study using two-wave data sets 390 employees in Chinese enterprises was conducted build fixed, continuous interacting models for investigating effects individual differences processes Findings This research uncovered changing relationships knowledge-hiding...
Machine learning-based intelligent systems enhanced with Internet of Things (IoT) technologies have been widely developed and exploited to enable the real-time stability assessment a large-scale electricity grid. However, it has extensively recognized that IoT-enabled communication network power is vulnerable cyberattacks. In particular, system operating states, critical attributes act as input data-driven assessment, can be manipulated by malicious actors mislead operator into making...
Both neoadjuvant chemotherapy and endocrine therapy only result in trivial pathological complete response rates moderate objective (ORR) hormone receptor (HR)-positive, human epidermal growth factor receptor-2 (HER2)-negative breast cancer, more promising alternatives are urgently needed. With proven synergistic effect of cyclin dependent kinase 4/6 (CDK4/6) inhibitor radiotherapy preclinical studies, this pilot study aimed to explore the efficacy safety stereotactic body radiation (SBRT)...
Both neoadjuvant chemotherapy and endocrine therapy only result in trivial pathological complete response rates moderate objective (ORR) hormone receptor (HR)-positive, human epidermal growth factor receptor-2 (HER2)-negative breast cancer, more promising alternatives are urgently needed. With proven synergistic effect of cyclin dependent kinase 4/6 (CDK4/6) inhibitor radiotherapy preclinical studies, this pilot study aimed to explore the efficacy safety stereotactic body radiation (SBRT)...