- Cryptography and Data Security
- Cryptographic Implementations and Security
- Complexity and Algorithms in Graphs
- Chaos-based Image/Signal Encryption
- Advanced Authentication Protocols Security
- Coding theory and cryptography
- Internet Traffic Analysis and Secure E-voting
- Privacy-Preserving Technologies in Data
- Cryptography and Residue Arithmetic
- Advanced Malware Detection Techniques
- Blockchain Technology Applications and Security
- Security and Verification in Computing
- Web Data Mining and Analysis
- Geometric and Algebraic Topology
- Electron and X-Ray Spectroscopy Techniques
- Parallel Computing and Optimization Techniques
- Advanced Computational Techniques and Applications
- Distributed and Parallel Computing Systems
- Software Testing and Debugging Techniques
- Security in Wireless Sensor Networks
- Advanced Electron Microscopy Techniques and Applications
- Advanced Neural Network Applications
- Cloud Data Security Solutions
- Information Retrieval and Search Behavior
- Web Application Security Vulnerabilities
Chinese Academy of Sciences
2015-2025
University of Chinese Academy of Sciences
2015-2025
Institute of Zoology
2022-2025
State Key Laboratory of Stem Cell and Reproductive Biology
2025
Shandong University
2003-2024
Shandong University of Science and Technology
2016-2024
Jiangsu University
2024
Institute of Information Engineering
2011-2024
Digital China Health (China)
2024
China Meteorological Administration
2024
Abstract Root development relies on the establishment of meristematic tissues that give rise to distinct cell types differentiate across defined temporal and spatial gradients. Dissection developmental trajectories transcriptional networks underlie them could aid understanding function root apical meristem in both dicots monocots. Here, we present a single-cell RNA (scRNA) sequencing chromatin accessibility survey rice radicles. By profiling individual tip cells reconstruct continuous...
In this work, polymer networks are prepared by a simple cross-linked reaction of poly(vinyl butyral) (PVB) and hexamethylene diisocyanate. The was evaluated Fourier transition infrared spectroscopy, degree swelling gel content. show high mechanical strength with tensile modulus over 1 GPa 40 MPa, respectively, at rt. With PVB as switching domain, the exhibit excellent thermal- solvent-induced shape memory properties. Also, influence density solvents' properties on recovery speed were...
Cryo-electron microscopy (cryo-EM) has become a widely used tool for determining the structures of proteins and macromolecular complexes. To acquire input single-particle cryo-EM reconstruction, researchers must select hundreds thousands particles from micrographs. As signal-to-noise ratio (SNR) micrographs is extremely low, performance automated particle-selection methods still unable to meet research requirements. free this laborious work large number high-quality particles, we propose an...
Abstract Human GWAS have shown that obesogenic FTO polymorphisms correlate with lean mass, but the mechanisms remained unclear. It is counterintuitive because mass inversely correlated obesity and metabolic diseases. Here, we use CRISPR to knock-in rs9939609-A into hESC-derived tissue models, elucidate potentially hidden roles of during development. We find among human tissues, most robustly affect muscle progenitors’ proliferation, differentiation, senescence, thereby accelerating...
A novel four-site ionic liquid (IL) was designed via the neutralization of citrazinic acid with tetrabutylphosphonium hydroxide, which had highest CO2 absorption capacity 3.26 mol per molar IL under ambient conditions to date. More importantly, it found that IL–CO2 complex displayed visible light because delocalization effect in conjugated anion complex, and could promote photoreduction over anatase TiO2 irradiation, producing CH4 as sole carbonaceous product a rate 3.52 μmol g–1 h–1...
The task of product attribute value extraction is to identify values an from information. Product attributes are important features, which help improve online shopping experience customers, such as search, recommendation and comparison. Most existing works only focus on extracting for a set known with sufficient training data. However, the emerging nature e-commerce, new products their unique constantly generated different retailers merchants. Collecting large number annotations every costly...
The practical synthesis of important natural polyphenolic stilbenes, including resveratrol, piceatannol and oxyresveratrol, through Perkin methodology is described. Starting from 3,5-dihydoxyacetophenone (1), the common intermediate 3,5-dimethoxyphenylacetic acid (3) can be obtained via methylation Willgerodt–Kindler reaction. condensations between substituted phenylaldehydes 4 furnished E-2,3-diarylacrylic acids 5, followed by decarboxylation in Cu/quinoline giving stilbene intermediates 6...
Abstract In response to the current challenges fire detection algorithms encounter, including low accuracy and limited recognition rates for small targets in complex environments, we present a lightweight algorithm based on an improved YOLOv5s. The introduction of CoT (Contextual Transformer) structure into backbone neural network, along with creation novel CSP1_CoT (Cross stage partial 1_contextual transformer) module, has effectively reduced model’s parameter count while simultaneously...
During ageing, adult stem cells' regenerative properties decline, as they undergo replicative senescence and lose both their proliferative differentiation capacities. In contrast, embryonic foetal progenitors typically possess heightened capacities manifest a more robust response upon injury transplantation, despite undergoing many rounds of mitosis. How delay maintain after numerous mitosis, remains unknown. It is also unclear if defined factors can rejuvenate to confer extended capacities,...
According to recent articles in popular technology websites, some mobile applications function an insecure manner when presented with untrusted SSL certificates. These non-browser based seem to, the absence of a standard way alerting user error, accept any certificate it. This paper intends research these claims and show whether or not invisible proxy attack can indeed steal user's credentials from applications, which types are most likely be vulnerable this vector. To ensure coverage...
Searchable encryption enables users to enjoy search services while protecting the security and privacy of their outsourced data. Blockchain-enabled searchable delivers computing processes that are executed on server decentralized transparent blockchain system, which eliminates potential threat malicious servers invading Recently, although some blockchain-enabled schemes realized can freely verify results, unfortunately, these were inefficient costly. Motivated by this, we proposed an...
Abstract In this work, we generalize the paradigm of hash proof system (HPS) proposed by Cramer and Shoup (EUROCRYPT 2002). center our generalization, lift a subset membership problem to distribution‐distinguishing problem. Our generalized HPS clarifies encompasses all known public‐key encryption (PKE) schemes that essentially implement idea an HPS. Moreover, besides existing smoothness property, introduce additional property named anonymity for As natural application, consider PKE in...
With the rapid development of social economy and acceleration urbanization, energy consumption has increased rapidly, power resources have become a scarce resource. In order to actively respond national green lighting strategy, this paper uses wireless sensor network Internet Things technology design smart street light management system, incorporate urban lights into new system. The system collects data surrounding environment lamp in real time through controller with multiple types sensors...