- Cryptographic Implementations and Security
- Chaos-based Image/Signal Encryption
- Physical Unclonable Functions (PUFs) and Hardware Security
- Intracerebral and Subarachnoid Hemorrhage Research
- Coding theory and cryptography
- Cryptography and Residue Arithmetic
- Cryptography and Data Security
- Forest ecology and management
- Advanced Computational Techniques and Applications
- Spinal Hematomas and Complications
- Security and Verification in Computing
- Neurosurgical Procedures and Complications
- Robotic Mechanisms and Dynamics
- Fibromyalgia and Chronic Fatigue Syndrome Research
- Immune Cell Function and Interaction
- Advanced Vision and Imaging
- Pancreatic and Hepatic Oncology Research
- Advanced Algorithms and Applications
- Genetic factors in colorectal cancer
- Musculoskeletal Disorders and Rehabilitation
- Tribology and Lubrication Engineering
- Electroconvulsive Therapy Studies
- Hippo pathway signaling and YAP/TAZ
- Remote Sensing and LiDAR Applications
- Energetic Materials and Combustion
Binzhou University
2025
Xinjiang New Energy Research Institute (China)
2025
Binzhou Medical University
2025
Fudan University
2025
Zhongshan Hospital
2025
Shanghai Research Institute of Chemical Industry
2025
Zhejiang Chinese Medical University
2023-2024
Tongji Hospital
2023-2024
Huazhong University of Science and Technology
2023-2024
Shandong University of Science and Technology
2024
Homologous recombination deficiency (HRD) is prevalent in cancer, sensitizing tumor cells to poly (ADP-ribose) polymerase (PARP) inhibition. However, the impact of HRD and related therapies on microenvironment (TME) remains elusive. Our study generates single-cell gene expression T cell receptor profiles, along with validatory multimodal datasets from >100 high-grade serous ovarian cancer (HGSOC) samples, primarily a phase II clinical trial (NCT04507841). Neoadjuvant monotherapy PARP...
Natural broadleaf forests (NBFs) are the most abundant zonal vegetation type in subtropical regions. Understanding mechanisms influencing stand productivity NBFs is important for developing “nature-based” solutions climate change mitigation. However, minimal research has captured effects of nonlinearities and feature interactions that often have nonlinear impacts on factors. To address this gap, we used continuous forest inventory data, a machine learning model was constructed. Subsequently,...
In order for active distribution network operators to carry out power business such as load forecasting without meter reading rights, the author proposes a research on data analysis and privacy protection based federated learning. The learning framework industry user by selecting weather time factors correlation of load. On this basis, constructed an dataset established model Long Short Term Time Series Network (LSTNet). At same time, FedML was used establish sub results indicate that:...
Background Acetaminophen (APAP) can be used for pain relief and fever alleviation, the overdose of which, however, may lead to accumulation N-acetyl-p-benzoquinone imine (NAPQI), inducing oxidative stress liver damage. The natural compound SMND-309 has been shown have hepatoprotective effects potential antioxidant activity. However, its ability alleviate acetaminophen-induced acute injury (AILI) not elucidated. Objective To explore protective effect against AILI mechanism. Methods model was...
Based on the continuous inventory data of forest resources in Zhejiang Province 2019 and 2021, we used statistical methods such as polynomial regression to analyze impacts topography spatial structure average annual diameter at breast height (DBH) growth main pioneer tree species natural broad-leaved mixed forests. The results showed that DBH
The aim is to investigate the relationship between serum coagulation parameters (PT, APTT, D-D and FDP) before hospitalization recurrence of chronic subdural hematoma (CSDH). 236 patients with CSDH who were diagnosed for first time had complete medical records followed up at least 90 days. Fifty (21.2%) relapsed. Univariate analysis was conducted including general data, imaging data test results. Serum detected all patients. study identified several factors that exhibited a significant...
Abstract It is well established that sevoflurane exposure leads to widespread neuronal cell death in the developing brain. Adenosine deaminase acting on RNA-1 (ADAR1) dependent adenosine-to-inosine (A-to-I) RNA editing dynamically regulated throughout brain development. The current investigation designed interrogate contributed role of ADAR1 developmental neurotoxicity. Herein, we provide evidence show priming triggers pyroptosis, apoptosis and necroptosis (PANoptosis), elicits release...
Power analysis against elliptic curve digital signature algorithm (ECDSA) has been researched for many years. Nowadays traditional methods like simple power (SPA) or differential (DPA) are no longer effective secure ECDSA implementations. In this situation, Howgrave-Graham and Smart introduced a new lattice-based attack to recover the secret key of Digital Signature Algorithm (DSA) even if only several bits nonce revealed. Later Nguyen Shparlinski extended ECDSA. paper, we further extend SM2...
Semaphorins constitute a diverse family of widely expressed transmembrane, diffusible, and GPI-linked proteins with versatile physiologic functions in orchestrating nerve system development, immune homeostasis, angiogenesis, cell metabolism. Accumulating evidence highlights semaphorins as essential regulators tumorigenesis by coordinating the cell-cell communications tumor microenvironment. Semaphorin 4C (SEMA4C) is member fourth class high affinity to Plexin-B2 its interplay cancer has long...
Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, are attack methods based on searches for collisions of modular multiplication. However, searching is difficult in real environments. To circumvent this problem, we propose the Clustering Attack (SPCA), which can automatically identify multiplication collision. The insignificant effects collision validated an Application Specific Integrated Circuit (ASIC) environment. After treatment with SPCA,...
Power analysis is a non-invasive attack against cryptographic hardware, which effectively exploits runtime power consumption characteristics of circuits. This paper proposes new model combines Hamming Distance and the based on template value in combinational logic circuit. The can describe sequential circuits those as well. be used to improve existing methods detect information leakage consumption. Experimental results show that, compared CPA(Correlation Analysis) method, our proposed adopt...
Background: Intracerebral hemorrhage (ICH) comprises primary and secondary injuries, the latter of which induces increased inflammation apoptosis is more severe. Activating transcription factor 6 (ATF6) a type-II transmembrane protein in endoplasmic reticulum (ER). ATF6 target genes could improve ER homeostasis, contributes to cryoprotection. Hence, we predict that will have protective effect on brain tissue after ICH. Method: The ICH rat model was generated through autologous blood...
Background The causality of autoimmune diseases with frailty has not been firmly established. We conducted this Mendelian randomization (MR) study to unveil the causal associations between frailty. Methods A MR analyses were performed explore relationships disease and frailty, using summary genome-wide association statistics. Results Through a comprehensive meticulous screening process, we incorporated 46, 7, 12, 20, 5, 53 single nucleotide polymorphisms (SNPs) as instrumental variables...
Comprehensive analyses of the burden musculoskeletal disorders (MSDs) are crucial for deepening our understanding their impact on population health and evaluating progress toward achieving international goals.
As an important operation, modular inversion is crucial for high-performance public key cryptosystems (PKC), especially in Elliptic curve-based schemes over prime fields. Both security and efficiency must be considered a specific implementation. Straightforward implementation leaks side channel information which can used breaking curve signature algorithm (ECDSA) through combination attack. Modular also the most time-consuming operation has impact on performance. Therefore, efficient...
In order to clarify the combustion-supporting mechanism of fluoropolymers, this work focuses on atomic details oxidation Al nanoparticles with fluoropolymers and O 2 , using reactive dynamics simulations.
Public key cryptographic (PKC) algorithms, such as the RSA, elliptic curve digital signature algorithm (ECDSA) etc., are widely used in secure communication systems, OpenSSL, and a variety of information security systems. If designer do not securely implement them, secret will be easily extracted by side-channel attacks (SCAs) or combinational SCA thus mitigating entire system. Previous countermeasures PKC implementations focused on core part algorithms ignored modular inversion which is...