Tao Li

ORCID: 0000-0001-8349-0436
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Advanced Decision-Making Techniques
  • Electronic Health Records Systems
  • IPv6, Mobility, Handover, Networks, Security
  • Web Application Security Vulnerabilities
  • Network Security and Intrusion Detection
  • Energy, Environment, and Transportation Policies
  • Data Quality and Management
  • Immune responses and vaccinations
  • Viral gastroenteritis research and epidemiology
  • Tryptophan and brain disorders
  • Cybercrime and Law Enforcement Studies
  • Coenzyme Q10 studies and effects
  • Schizophrenia research and treatment
  • Embedded Systems Design Techniques
  • Antioxidants, Aging, Portulaca oleracea
  • Nutrition and Health in Aging
  • Energy, Environment, Economic Growth
  • Currency Recognition and Detection
  • Artificial Intelligence in Healthcare
  • Cloud Data Security Solutions
  • Cryptography and Data Security
  • Advanced Neuroimaging Techniques and Applications
  • COVID-19 diagnosis using AI
  • IoT and GPS-based Vehicle Safety Systems

Heilongjiang Bayi Agricultural University
2023-2024

Tonghua Normal University
2024

Central University of Finance and Economics
2024

Sichuan University
2014-2020

Chengdu University
2017-2020

Zhengzhou University of Science and Technology
2017

General Hospital of Guangzhou Military Command
2006

Aims: This study combines traditional Chinese medicine polysaccharides with nanomaterials to enhance drug bioavailability and immunological activity. Background: The of polysaccharide preparation, structure identification, pharmacological activity, mechanism action is deepening, but the research combined new delivery system relatively weak, so application still facing great limitations. In order prolong time improve their bioavailability, liposome has become most promising carrier....

10.2174/0113816128279071231204071210 article EN Current Pharmaceutical Design 2024-02-22

As a global decentralized distributed ledger, Bitcoin's POW mechanism is so complex that the transaction's confirmation very time-consuming. If dust attacks occur in blockchain, which sends large amounts of transactions to time transactions' will be more longer, lead security problems, such as double-spending or blockchain forks. In order identify and prevent attacks, this paper proposes an innovative Anti-Dust model, analyzes characteristics learns from historical big data, uses Gaussian...

10.1109/iciscae.2018.8666834 article EN 2018-07-01

Diarrhea is one of the most common causes death in young piglets. Porcine rotavirus (PoRV) belongs to genus Rotavirus within family Reoviridae, and considered be primary pathogen causing diarrhea Portulaca oleracea L. (POL) has been reported alleviate viral infections. However, antiviral effect polysaccharide (POL-P), an active component POL, on PoRV infection remains unclear. This study demonstrated that safe concentration range POL-P IPEC-J2 cells 0-400 μg/mL. (400 μg/mL) effectively...

10.3390/ani13142306 article EN cc-by Animals 2023-07-14

Online wallet has become an important method to manage Bitcoin. In a Bitcoin transaction, online manages the private key automatically, and stores encrypted in remote ensure accessibility of anywhere. traditional wallet, is stored centrally storage unit. However, if unit collapsed or hacked, users will suffer risk losing their Bitcoins. Motivated by this, this paper, we propose new architecture: HA-eWallet. HA-eWallet, transaction signed multiple keys rather than one, are separately...

10.1109/pic.2017.8359562 article EN 2017-12-01

Smart contract helps to broaden the application of blockchain various fields. In many cases, non-blockchain systems (NBS) are involved. However, when a smart directly interacts with NBS, there is non-deterministic issue (or state conflict issue). The reason that different nodes may obtain statuses NBS changes in NBS. If we can solve this issue, be used interact current without an additional adaptor or bridge required by existing solutions. paper, regard states as sequence instead single and...

10.1109/infocomwkshps50562.2020.9162906 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2020-07-01

In this paper, we propose a new technology that improves Diffie-Hellman's safeness and keeps its good property.The is called "Hyperbolic Curve Cryptography System" (HCCS) which designed on hyperbolic curve over finite filed.HCCS has solid Abel group structure whose order diverse field the system secure mainly based discrete logarithm problem (DLP) hardness of solving fundamental solution.Compared with Diffie-Hellman, HCCS same calculation complexity, but it excellently flexible.Therefore,...

10.2991/icmt-13.2013.26 article EN cc-by-nc Advances in intelligent systems research/Advances in Intelligent Systems Research 2013-01-01

AbstractThis paper’s purpose is to evaluate faculty members’ and students’ opinions regarding the quality, benefits challenges of online learning, transitioning from face-to-face learning during after COVID-19 in Chinese universities. The paper relied on a quantitative study involving an survey using random sample method June 2020. size was 400 persons, including 160 instructors 240 students university China. Scores earned by who took Introduction Economics course same quarantine were...

10.15516/cje.v26i1.4988 article HR Croatian Journal of Education - Hrvatski časopis za odgoj i obrazovanje 2024-05-09

In order to assess network security threats better, we model the attacker's and defender's behavior based on attack-defense graph from perspective of both attacker defender, which lays foundation further research for scientific precise information threat assessment. Due existing problems generating traditional (e.g. explosion state space, large-scale complex generation graph), in this paper propose a method reduction, then defender security. Finally, proposed are proved be effective within...

10.1049/cp.2015.0805 article EN 2015-01-01

In order to correctly analyze the multi-step attack and comprehensively assess network security situation, a multistep attack-oriented assessing method of situation is proposed.The events are clustered into different scenarios for identifying attackers.Based on causal correlation between every scenario, traces phase can be distinguished.Finally, quantitative criterion established realize assessment situation.Two defense experiments used verify correctness effectiveness, result shows proposed...

10.14257/ijsia.2017.11.1.17 article EN International Journal of Security and Its Applications 2017-01-31
Coming Soon ...