Yu Chen

ORCID: 0000-0003-2553-1281
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Cryptographic Implementations and Security
  • Complexity and Algorithms in Graphs
  • Chaos-based Image/Signal Encryption
  • Advanced Authentication Protocols Security
  • Coding theory and cryptography
  • Internet Traffic Analysis and Secure E-voting
  • Privacy-Preserving Technologies in Data
  • Cryptography and Residue Arithmetic
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • Security and Verification in Computing
  • Web Data Mining and Analysis
  • Geometric and Algebraic Topology
  • Electron and X-Ray Spectroscopy Techniques
  • Parallel Computing and Optimization Techniques
  • Advanced Computational Techniques and Applications
  • Distributed and Parallel Computing Systems
  • Software Testing and Debugging Techniques
  • Security in Wireless Sensor Networks
  • Advanced Electron Microscopy Techniques and Applications
  • Advanced Neural Network Applications
  • Cloud Data Security Solutions
  • Information Retrieval and Search Behavior
  • Web Application Security Vulnerabilities

Chinese Academy of Sciences
2015-2025

University of Chinese Academy of Sciences
2015-2025

Institute of Zoology
2022-2025

State Key Laboratory of Stem Cell and Reproductive Biology
2025

Shandong University
2003-2024

Shandong University of Science and Technology
2016-2024

Jiangsu University
2024

Institute of Information Engineering
2011-2024

Digital China Health (China)
2024

China Meteorological Administration
2024

Abstract Root development relies on the establishment of meristematic tissues that give rise to distinct cell types differentiate across defined temporal and spatial gradients. Dissection developmental trajectories transcriptional networks underlie them could aid understanding function root apical meristem in both dicots monocots. Here, we present a single-cell RNA (scRNA) sequencing chromatin accessibility survey rice radicles. By profiling individual tip cells reconstruct continuous...

10.1038/s41467-021-22352-4 article EN cc-by Nature Communications 2021-04-06

In this work, polymer networks are prepared by a simple cross-linked reaction of poly(vinyl butyral) (PVB) and hexamethylene diisocyanate. The was evaluated Fourier transition infrared spectroscopy, degree swelling gel content. show high mechanical strength with tensile modulus over 1 GPa 40 MPa, respectively, at rt. With PVB as switching domain, the exhibit excellent thermal- solvent-induced shape memory properties. Also, influence density solvents' properties on recovery speed were...

10.1039/c4ta00856a article EN Journal of Materials Chemistry A 2014-01-01

Cryo-electron microscopy (cryo-EM) has become a widely used tool for determining the structures of proteins and macromolecular complexes. To acquire input single-particle cryo-EM reconstruction, researchers must select hundreds thousands particles from micrographs. As signal-to-noise ratio (SNR) micrographs is extremely low, performance automated particle-selection methods still unable to meet research requirements. free this laborious work large number high-quality particles, we propose an...

10.1186/s12859-019-2614-y article EN cc-by BMC Bioinformatics 2019-01-18

Abstract Human GWAS have shown that obesogenic FTO polymorphisms correlate with lean mass, but the mechanisms remained unclear. It is counterintuitive because mass inversely correlated obesity and metabolic diseases. Here, we use CRISPR to knock-in rs9939609-A into hESC-derived tissue models, elucidate potentially hidden roles of during development. We find among human tissues, most robustly affect muscle progenitors’ proliferation, differentiation, senescence, thereby accelerating...

10.1038/s41467-024-53820-2 article EN cc-by Nature Communications 2025-03-07

A novel four-site ionic liquid (IL) was designed via the neutralization of citrazinic acid with tetrabutylphosphonium hydroxide, which had highest CO2 absorption capacity 3.26 mol per molar IL under ambient conditions to date. More importantly, it found that IL–CO2 complex displayed visible light because delocalization effect in conjugated anion complex, and could promote photoreduction over anatase TiO2 irradiation, producing CH4 as sole carbonaceous product a rate 3.52 μmol g–1 h–1...

10.1021/acssuschemeng.0c02333 article EN ACS Sustainable Chemistry & Engineering 2020-05-28

The task of product attribute value extraction is to identify values an from information. Product attributes are important features, which help improve online shopping experience customers, such as search, recommendation and comparison. Most existing works only focus on extracting for a set known with sufficient training data. However, the emerging nature e-commerce, new products their unique constantly generated different retailers merchants. Collecting large number annotations every costly...

10.18653/v1/2023.findings-acl.633 article EN cc-by Findings of the Association for Computational Linguistics: ACL 2022 2023-01-01

The practical synthesis of important natural polyphenolic stilbenes, including resveratrol, piceatannol and oxyresveratrol, through Perkin methodology is described. Starting from 3,5-dihydoxyacetophenone (1), the common intermediate 3,5-dimethoxyphenylacetic acid (3) can be obtained via methylation Willgerodt–Kindler reaction. condensations between substituted phenylaldehydes 4 furnished E-2,3-diarylacrylic acids 5, followed by decarboxylation in Cu/quinoline giving stilbene intermediates 6...

10.1248/cpb.58.1492 article EN Chemical and Pharmaceutical Bulletin 2010-01-01

Abstract In response to the current challenges fire detection algorithms encounter, including low accuracy and limited recognition rates for small targets in complex environments, we present a lightweight algorithm based on an improved YOLOv5s. The introduction of CoT (Contextual Transformer) structure into backbone neural network, along with creation novel CSP1_CoT (Cross stage partial 1_contextual transformer) module, has effectively reduced model’s parameter count while simultaneously...

10.1038/s41598-024-64934-4 article EN cc-by Scientific Reports 2024-06-19

During ageing, adult stem cells' regenerative properties decline, as they undergo replicative senescence and lose both their proliferative differentiation capacities. In contrast, embryonic foetal progenitors typically possess heightened capacities manifest a more robust response upon injury transplantation, despite undergoing many rounds of mitosis. How delay maintain after numerous mitosis, remains unknown. It is also unclear if defined factors can rejuvenate to confer extended capacities,...

10.1111/cpr.13459 article EN cc-by Cell Proliferation 2023-05-01

10.1007/s10623-014-0014-x article EN Designs Codes and Cryptography 2014-10-25

According to recent articles in popular technology websites, some mobile applications function an insecure manner when presented with untrusted SSL certificates. These non-browser based seem to, the absence of a standard way alerting user error, accept any certificate it. This paper intends research these claims and show whether or not invisible proxy attack can indeed steal user's credentials from applications, which types are most likely be vulnerable this vector. To ensure coverage...

10.1109/ccnc.2014.6866553 article EN 2014-01-01

Searchable encryption enables users to enjoy search services while protecting the security and privacy of their outsourced data. Blockchain-enabled searchable delivers computing processes that are executed on server decentralized transparent blockchain system, which eliminates potential threat malicious servers invading Recently, although some blockchain-enabled schemes realized can freely verify results, unfortunately, these were inefficient costly. Motivated by this, we proposed an...

10.3390/electronics11162536 article EN Electronics 2022-08-13

Abstract In this work, we generalize the paradigm of hash proof system (HPS) proposed by Cramer and Shoup (EUROCRYPT 2002). center our generalization, lift a subset membership problem to distribution‐distinguishing problem. Our generalized HPS clarifies encompasses all known public‐key encryption (PKE) schemes that essentially implement idea an HPS. Moreover, besides existing smoothness property, introduce additional property named anonymity for As natural application, consider PKE in...

10.1002/sec.827 article EN Security and Communication Networks 2013-11-07

With the rapid development of social economy and acceleration urbanization, energy consumption has increased rapidly, power resources have become a scarce resource. In order to actively respond national green lighting strategy, this paper uses wireless sensor network Internet Things technology design smart street light management system, incorporate urban lights into new system. The system collects data surrounding environment lamp in real time through controller with multiple types sensors...

10.1109/iaeac54830.2022.9930048 article EN 2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC ) 2022-10-03
Coming Soon ...