- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- AI in cancer detection
- Cancer Immunotherapy and Biomarkers
- HER2/EGFR in Cancer Research
- Software Engineering Research
- Radiomics and Machine Learning in Medical Imaging
- Advanced Database Systems and Queries
- Security in Wireless Sensor Networks
- Security and Verification in Computing
- Software Testing and Debugging Techniques
- Esophageal Cancer Research and Treatment
- Cancer Genomics and Diagnostics
- Data Management and Algorithms
- Web Application Security Vulnerabilities
- Energy Efficient Wireless Sensor Networks
- Inflammatory Biomarkers in Disease Prognosis
- Information and Cyber Security
- Gastric Cancer Management and Outcomes
- Monoclonal and Polyclonal Antibodies Research
- Data Visualization and Analytics
- Lung Cancer Treatments and Mutations
- Cancer Cells and Metastasis
- Prostate Cancer Diagnosis and Treatment
- Computational Drug Discovery Methods
Chongqing University of Posts and Telecommunications
2025
Fourth Hospital of Hebei Medical University
2018-2024
Hebei Medical University
2018-2024
Hangzhou Normal University
2024
Central South University
2023
Ministry of Transport
2023
University of Malaya
2022
Tsinghua University
2018
Harbin Institute of Technology
2017
Shenyang Pharmaceutical University
2017
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during process collection in network. However, because individual readings are lost per-hop process, compromised network may forge false values as results other nodes, tricking base station into accepting spurious results. Here fundamental challenge is: how can obtain good approximation fusion result when fraction compromised.To answer this challenge, we...
Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. Thus, adversary may reprogram them with malicious code launch various insider attacks. Based on verifying genuineness running program, we propose two distributed software-based attestation schemes well tailored for sensor networks. These based a pseudorandom noise generation mechanism and lightweight block-based...
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during process collection in network. However, because individual readings are lost per-hop process, compromised network may forge false values as results other nodes, tricking base station into accepting spurious results. Here fundamental challenge how can obtain good approximation fusion result when fraction compromised? To answer this challenge, we...
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to healthiness industry. Software birthmark, which represents unique characteristics program, can be used for detection. We propose system call dependence graph based birthmark called SCDG and examine how well it reflects behavioral program. To our knowledge, detection on is first one that capable detecting component where only partial code stolen. demonstrate strength against...
Identifying similar or identical code fragments becomes much more challenging in theft cases where plagiarizers can use various automated transformation techniques to hide stolen from being detected. Previous works this field are largely limited that (1) most of them cannot handle advanced obfuscation techniques; (2) the methods based on source analysis less practical since suspicious programs is typically not available until strong evidences collected; and (3) those depending features...
Creating good visualizations for ordinary users is hard, even with the help of state-of-the-art interactive data visualization tools, such as Tableau, Qlik, because they require to understand and very well. DeepEye an innovative system that aims at helping everyone create simply like a Google search. Given dataset keyword query, understands query intent, generates ranks visualizations. The user can pick one she likes do further faceted navigation easily navigate candidate In this...
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to healthiness industry. Software birthmark, which represents unique characteristic program, can be used for detection. We propose two system call based birthmarks: SCSSB (system short sequence birthmark) and IDSCSB (input dependant subsequence birthmark), examine how well they reflect behavioral characteristics program. To our knowledge, detection on is first one that capable...
We propose STILL, a generic defense based on Static Taint and Initialization analyses, to detect exploit code embedded in data streams/requests targeting at various Internet services such as Web services. STILL first blindly disassembles each request, generates (probably partial) control flow graph, then uses novel static taint initialization analysis algorithms determine if strong evidence of self-modifying (including polymorphism) and/or indirect jump obfuscation behavior can be collected....
Abstract Programmed death ligand-1 (PD-L1) expression is a key biomarker to screen patients for PD-1/PD-L1-targeted immunotherapy. However, subjective assessment guide on PD-L1 of tumor-infiltrating immune cells (IC) scoring currently adopted in clinical practice with low concordance. Therefore, repeatable and quantifiable IC method breast cancer desirable. In this study, we propose deep learning-based artificial intelligence-assisted (AI-assisted) model scoring. Three rounds ring studies...
Abstract Objective Given real-world limitations in programmed death-ligand 1 (PD-L1) testing, concordance studies between PD-L1 assays are needed. We undertook comparisons of (DAKO22C3, Ventana SP263, SP142, E1L3N) among observers esophageal squamous cell carcinoma (ESCC) to provide information on the analytical and clinical comparability four IHC assays. Methods Paraffin embedded samples 50 cases were obtained, satined with all was evaluated by 68 pathologists from 19 different hospitals....
Background and aims Evaluation of the programmed cell death ligand‐1 (PD‐L1) combined positive score (CPS) is vital to predict efficacy immunotherapy in triple‐negative breast cancer (TNBC), but pathologists show substantial variability consistency accuracy interpretation. It great importance establish an objective effective method which highly repeatable. Methods We proposed a model deep learning‐based framework, at patch level incorporated analysis tissue region analysis, followed by...
We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet services such as Web service. Motivated by the observation that attacks typically contain executables whereas legitimate client requests never in most services, SigFree blocks detecting presence of code. Unlike previous code detection algorithms, uses a new data-flow analysis technique called abstraction is generic,...
Illegal code reuse has become a serious threat to the software community. Identifying similar or identical fragments becomes much more challenging in theft cases where plagiarizers can use various automated transformation obfuscation techniques hide stolen from being detected. Previous works this field are largely limited that (i) most of them cannot handle advanced techniques, and (ii) methods based on source analysis not practical since suspicious programs typically be obtained until...
Aims The nuclear proliferation biomarker Ki67 plays potential prognostic and predictive roles in breast cancer treatment. However, the lack of interpathologist consistency assessment limits clinical use Ki67. aim this article was to report a solution utilising an artificial intelligence (AI)‐empowered microscope improve scoring concordance. Methods results We developed AI‐empowered which conventional equipped with AI algorithms, were provided pathologists real time through augmented reality....
To explore the correlation between peripheral blood neutrophil-to-lymphocyte ratio (NLR) and tumor infiltrating lymphocyte (TIL) before neoadjuvant therapy (NAT) prognosis of patients with triple negative breast cancer. A total 126 TNBC who received NAT were screened out. TILs, CD8+TIL FOXP3+TIL detected by immunohistochemistry in core needle biopsy specimens treatment, NLR was calculated. Kaplan-Meier analysis used to estimate survival rates. Univariate multivariate analyses performed using...
Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. Thus, adversary may reprogram them with malicious code launch various insider attacks. Based on verifying genuineness running program, we propose two distributed software-based attestation schemes well tailored for sensor networks. These based a pseudorandom noise generation mechanism and lightweight block-based...