Xu An Wang

ORCID: 0000-0003-2070-4913
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Cloud Data Security Solutions
  • Privacy-Preserving Technologies in Data
  • Complexity and Algorithms in Graphs
  • Blockchain Technology Applications and Security
  • Coding theory and cryptography
  • Chaos-based Image/Signal Encryption
  • Cryptography and Residue Arithmetic
  • Cryptographic Implementations and Security
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Advanced Steganography and Watermarking Techniques
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • Advanced Authentication Protocols Security
  • Security in Wireless Sensor Networks
  • Digital Media Forensic Detection
  • Advanced Data Storage Technologies
  • Cloud Computing and Resource Management
  • Energy Efficient Wireless Sensor Networks
  • Distributed and Parallel Computing Systems
  • graph theory and CDMA systems
  • Cholangiocarcinoma and Gallbladder Cancer Studies
  • Software-Defined Networks and 5G
  • Spam and Phishing Detection

Shanghai Power Equipment Research Institute
2025

Sun Yat-sen University
2024-2025

Fudan University
2024-2025

Xuzhou Medical College
2025

Zhongshan Hospital
2025

The First Affiliated Hospital, Sun Yat-sen University
2025

Southeast University
2023-2024

Chinese People's Armed Police Force Engineering University
2015-2024

Huashan Hospital
2024

Chinese People's Liberation Army
2024

Gallbladder cancer (GBC) is a leading cause of cancer-related death worldwide, and its prognosis remains poor, with 5-year survival approximately 5%. In this study, we analyzed the involvement novel proteoglycan, Sparc/osteonectin, cwcv, kazal-like domains proteoglycan 1 (SPOCK1), in tumor progression human GBC.SPOCK1 expression levels were measured fresh samples stored specimens GBC adjacent nontumor tissues. The effect SPOCK1 on cell growth, DNA replication, migration invasion explored by...

10.1186/s12943-014-0276-y article EN cc-by Molecular Cancer 2015-01-26

In this paper, to study rumor spreading, we propose a novel susceptible-infected-removed (SIR) model by introducing the trust mechanism. We derive mean-field equations that describe dynamics of SIR on homogeneous networks and inhomogeneous networks. Then steady-state analysis is conducted investigate critical threshold final size spreading. show introduction mechanism reduces velocity but increases thresholds both Moreover, not only greatly maximum influence, also postpones terminal time,...

10.1088/0253-6102/59/4/21 article EN Communications in Theoretical Physics 2013-04-01

Video meeting platforms display conversations linearly through transcripts or summaries. However, ideas during a do not emerge linearly. We leverage LLMs to create dialogue maps in real time help people visually structure and connect ideas. Balancing the need reduce cognitive load on users conversation while giving them sufficient control when using AI, we explore two system variants that encompass different levels of AI assistance. In Human-Map, generates summaries as nodes, with nodes....

10.1145/3711030 preprint EN arXiv (Cornell University) 2025-02-03

10.1007/s10957-018-1439-6 article EN Journal of Optimization Theory and Applications 2018-11-19

As a commonly used indoor internet-of-things (IoT) positioning method, fingerprinting is frequently carried out through the fusion of inertial and WiFi or magnetic data. Nevertheless, signals like intensity received signal strength tend to fluctuate cannot always provide high accuracy. Thus, other available data can be introduced maintain continuity reliability. Among sources, 3D point clouds high-accuracy geospatial information. However, applying it directly in leads considerable memory,...

10.1016/j.jag.2024.103783 article EN cc-by-nc-nd International Journal of Applied Earth Observation and Geoinformation 2024-04-09

Low-precision training is considered an effective strategy for reducing both and downstream inference costs. Previous scaling laws precision mainly focus on integer quantization, which pay less attention to the constituents in floating-point quantization thus cannot well fit LLM losses this scenario. In contrast, while more commonly implemented production, research it has been relatively superficial. paper, we thoroughly explore effects of targets, exponent bits, mantissa calculation...

10.48550/arxiv.2501.02423 preprint EN arXiv (Cornell University) 2025-01-04

In order to meet the application requirements of reliable remote information interaction between acquisition equipment and ground control console, a transmission protocol with cyclic redundancy check feedback retransmission functions is proposed on FPGA platform. process testing, due metastable phenomenon across clock domain, flag bit instruction not received correctly, resulting in incorrect data. The further optimized, embedded software module receiver transmitter, data aligned using...

10.1117/12.3052197 article EN 2025-01-16

Objective: Since the lifting of COVID-19 restrictions in China November 2022, there has been a notable surge infection rate. Little is known about prevalence long COVID among general adult population and its impact on COVID-19-related worries behaviors after policy change. Methods: This cross-sectional study recruited 1530 adults with prior Guangzhou from February to March 2023. Logistic regression analyses trend were performed investigate associations between COVID- preventive behaviors....

10.3390/healthcare13030262 article EN Healthcare 2025-01-29

The related information on smuggling crimes exists extensively in various media, with multiple data sources. Anti-smuggling intelligence faces the contradiction between explosive growth of size and high-efficiency judgment. Considering current characteristics activities, it is urgent to obtain knowledge from multi-source case data. Aiming explore a acquisition algorithm based deep learning, this study proposed an anti-smuggling representation model both temporal spatial knowledge-driven...

10.4018/ijdwm.364846 article EN International Journal of Data Warehousing and Mining 2025-02-05

Federated Distillation (FD) has emerged as a popular federated training framework, enabling clients to collaboratively train models without sharing private data. Public Dataset-Assisted (PDA-FD), which leverages public datasets for knowledge sharing, become widely adopted. Although PDA-FD enhances privacy compared traditional Learning, we demonstrate that the use of still poses significant risks clients' This paper presents first comprehensive analysis in presence an honest-but-curious...

10.48550/arxiv.2502.08001 preprint EN arXiv (Cornell University) 2025-02-11

<sec> <title>BACKGROUND</title> Acute stress disorder (ASD) among people ever infected with COVID-19 (PEIC) is prevalent and may lead to post-trauma disorder. Soon after China relaxed her control measures in November/December 2022, the infection rate surged rapidly, creating huge uncertainty stressful situations. </sec> <title>OBJECTIVE</title> Little known about situations regarding ASD at ending phase of pandemic. Potential personal cognitive/emotional factors environmental were...

10.2196/preprints.73002 preprint EN 2025-02-23
Coming Soon ...