Zhuangzhuang Zhang

ORCID: 0009-0005-5675-7533
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Electrospun Nanofibers in Biomedical Applications
  • Bone Tissue Engineering Materials
  • Graphene and Nanomaterials Applications
  • Pregnancy-related medical research
  • Advanced Malware Detection Techniques
  • Machine Learning in Materials Science
  • Information and Cyber Security
  • Network Packet Processing and Optimization
  • Tracheal and airway disorders
  • Obstructive Sleep Apnea Research
  • Protein Structure and Dynamics
  • Calcium Carbonate Crystallization and Inhibition
  • Advanced Data Storage Technologies
  • Parallel Computing and Optimization Techniques
  • Sulfur Compounds in Biology
  • Security and Verification in Computing
  • Computational Drug Discovery Methods
  • Pelvic and Acetabular Injuries
  • Hemostasis and retained surgical items
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Nerve injury and regeneration
  • Silk-based biomaterials and applications
  • Abdominal Trauma and Injuries
  • Advanced Sensor and Energy Harvesting Materials

University of Science and Technology of China
2022-2024

Changzhou No.2 People's Hospital
2024

Nanjing Medical University
2024

Zhengzhou University
2024

Suzhou Institute of Nano-tech and Nano-bionics
2022

Chinese Academy of Sciences
2022

Taiyuan University of Technology
2019

Peking University
2013

Dynamic binary translators (DBTs) are widely used to migrate applications between different instruction set architectures (ISAs). Despite extensive research improve DBT performance, noticeable overhead remains, preventing near-native especially when translating from complex computer (CISC) reduced (RISC). For computational workloads, the main stems translated code quality. Experimental data show that state-of-the-art products have dynamic inflation of at least 1.46. This indicates on...

10.1145/3640813 article EN ACM Transactions on Architecture and Code Optimization 2024-01-15

Prediction of drug-target interactions (DTIs) is one the crucial steps for drug repositioning. Identifying DTIs through bio-experimental manners always expensive and time-consuming. Recently, deep learning-based approaches have shown promising advancements in DTI prediction, but they face two notable challenges: (i) how to explicitly capture local between pairs learn their higher-order substructure embeddings; (ii) How filter out redundant information obtain effective embeddings drugs...

10.1109/jbhi.2024.3497591 article EN IEEE Journal of Biomedical and Health Informatics 2024-11-13

<title>Abstract</title> <bold>Background</bold> Closed reduction and internal fixation is the key to early minimally invasive treatment of pelvic fractures in patients with severe trauma. Although unlocking closed device has been promoted a certain extent, therapeutic effect surgical strategy skills which treating traumas were not clarified particularly. Our study was explore combined fractures.<bold>Methods</bold> Data retrospectively collected from 13 undergoing for our hospital between...

10.21203/rs.3.rs-4760232/v1 preprint EN Research Square (Research Square) 2024-09-04

Hydroxyapatite (HAp) is a calcium phosphate-based inorganic constitute in bones and teeth. The synthesis of nanostructured rods that mimic the natural bone apatite has attracted significant attention. Unfortunately, pristine HAp unsuitable for clinical translation due to its brittleness, limited strength, uncontrolled leaching, poor surface properties. These limitations necessitate size reduction, modification, ion incorporation expand their scope reconstruction. Herein, iron-reinforced...

10.3390/materproc2022009016 article EN cc-by 2022-04-22

The biggest threat to the security of any organization is a zero-day attack, large portion most significant organizations don't have clue or notice attack and thus, contamination spread quicker before they can even respond.Zero-day attacks/threats are known as dangerous on particular since startling.Though, vast majority previously set themselves up for dangers and, attacks happen out nowhere regularly occur by unknown intruders.Zero-day cannot be detected from regular signature-based...

10.5120/ijca2019919742 article EN International Journal of Computer Applications 2019-12-17
Coming Soon ...