- Advanced Malware Detection Techniques
- Software Engineering Research
- Immunotherapy and Immune Responses
- Adversarial Robustness in Machine Learning
- T-cell and B-cell Immunology
- Immune Cell Function and Interaction
- Central Venous Catheters and Hemodialysis
- Heat shock proteins research
- Inhalation and Respiratory Drug Delivery
- Asthma and respiratory diseases
- Security and Verification in Computing
- Autophagy in Disease and Therapy
- Respiratory and Cough-Related Research
- Gut microbiota and health
- Food Allergy and Anaphylaxis Research
- Eicosanoids and Hypertension Pharmacology
- Pediatric health and respiratory diseases
- Allergic Rhinitis and Sensitization
- Cancer-related gene regulation
- Internet Traffic Analysis and Secure E-voting
- Advanced Steganography and Watermarking Techniques
- Dental Health and Care Utilization
- Cardiac, Anesthesia and Surgical Outcomes
- Polyamine Metabolism and Applications
- Authorship Attribution and Profiling
Beijing Red Cross Blood Center
2025
Hebei University
2021-2022
Nanchang University
2022
Kunming Medical University
2013-2021
First Affiliated Hospital of Kunming Medical University
2021
ABSTRACT The HLA‐A*31:01:58 allele differs from HLA‐A*31:01:02:01 by one nucleotide substitution in codon 130 exon 3.
The novel HLA-C*03:689 allele differs from HLA-C*03:03:01:01 by two nucleotide substitutions in codons 81 and 82 exon 2.
Purpose Caspase 8 (CASP8) plays a critical role in the apoptotic pathway and aberrant regulation of this causes many diseases including cancers. Genetic variants rs3834129 (CTTACT/−) rs3769821 (T/C) promoter region CASP8 gene were documented to be associated with multiple solid cancers non-Hodgkin’s lymphoma (NHL), respectively, despite some controversies. We aimed discern potential association these two rs113686495 (CTGTCATT/−), as well mRNA protein expression levels colorectal cancer (CRC)...
Vacuolating cytotoxin (VacA) is an important virulence factor of Helicobacter pylori (H. pylori). It was previously believed that VacA can trigger the cascade apoptosis on mitochondria to lead cell apoptosis. Recently, it found induce autophagy. However, molecular mechanism by which induces autophagy largely unknown. We aimed explore induced H. in gastric cancer cells and effect survival cells. The human line SGC7901 detected Western blot RT-PCR treatment protein pylori. relationship between...
The prevalence of food allergy (FA) among the general population has been increasing in recent decades, and seriously affects physical mental health quality life many people - especially children.The survey estimated self-reported FA using a standardized questionnaire school children Nanchang City, Jiangxi Province, China 2021.Based on local, epidemiological characteristics allergy, public policies prevention management should be developed preventive practices promoted to decrease overall FA.
Deep learning models have been widely used in source code processing tasks, such as captioning, summarization, completion, and classification. Recent studies shown that deep learning-based are vulnerable. Attackers can generate adversarial examples by adding perturbations to programs. Existing attack methods perturb a program renaming one or multiple variables the program. These do not take into account perturbation of equivalent structural transformations code. We propose set involving...
Adversarial robustness becomes an essential concern in Deep Learning (DL)-based source code processing, as DL models are vulnerable to the deception by attackers. To address a new challenge posed discrete and structural nature of generate adversarial examples for models, insufficient focus existing methods on features, we propose Q-Learning-based Markov decision process (QMDP) performing semantically equivalent transformations structure. Two key issues mainly addressed: (i) how perform...
In a data sharing network where parties lack mutual trust, credible traitor tracing is indispensable to reliable delivery. Currently, the main obstacles for are deficiency of content-independent watermarking scheme and untrustworthiness third parties. view this, we propose T-Tracer --- an encoding-based scheme. With T-Tracer, each party delivery embeds its digital fingerprint into byte sequence shared by generating tailor-made symbol mapping table, whereby can handle any type data. A...
Source code authorship attribution addresses the problems of copyright infringement disputes and plagiarism detection. However, most software projects are collaborative development projects. It is necessary to study multiple attribution. Existing methods not reliable in domain The reasons as follows: i) a challenge divide boundaries different authors sample; ii) segments belonging sample usually small or incomplete. This paper proposes method address these challenges. We first into lines,...