-
Article
Employing adaptive neural fuzzy inference system model via meta-heuristic algorithms for predicting undrained shear strength
The undrained shear strength (USS) of soil is known as one of the most important features in structural engineering tasks, such as foundation design, rock fill and earth dam design, highway and railway design,...
-
Article
Open AccessIntegrated Active Suspension and Anti-Lock Braking Control for Four-Wheel-Independent-Drive Electric Vehicles
This paper presents an integrated control scheme for enhancing the ride comfort and handling performance of a four-wheel-independent-drive electric vehicle through the coordination of active suspension system ...
-
Chapter and Conference Paper
A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework
Hardware Trojans have become a major challenge to ICs due to their serious damage to the reliability and security. However, hardware Trojans can be activated in a variety of ways, making accurate activation of...
-
Article
Poor sleep quality in early pregnancy increases the risk of develo** gestational diabetes mellitus: a propensity score matching analysis
This study aimed to demonstrate the relationship between poor sleep quality in early pregnancy and the risk of develo** gestational diabetes mellitus (GDM).
-
Article
An integrative analysis of the single-cell transcriptome identifies DUSP4 as an exhaustion-associated gene in tumor-infiltrating CD8+ T cells
-
Chapter and Conference Paper
Using Convolutional Neural Network to Redress Outliers in Clustering Based Side-Channel Analysis on Cryptosystem
Blockchain, designed with cryptographic technology, is widely used in the financial area, such as digital billing and cross-border payments. Digital signature is the core technology in it. However, digital sig...
-
Article
Open AccessThe association between the pre-pregnancy vaginal microbiome and time-to-pregnancy: a Chinese pregnancy-planning cohort study
Although sexually transmitted infections are regarded as the main cause of tubal infertility, the association between the common vaginal microbiome and female fecundability has yet to be determined. The object...
-
Article
Open AccessThe associations between low abundance of Mycoplasma hominis and female fecundability: a pregnancy-planning cohort study
To explore the impact of pre-pregnancy vaginal Mycoplasma hominis (M. hominis) colonization of low abundance on female fecundability.
-
Chapter and Conference Paper
Correlation Power Analysis and Protected Implementation on Block Cipher RainDrop
RainDrop is a lightweight block cipher algorithm proposed in 2019. Even though RainDrop proved to be resistant to classical cipher analysis such as differential analysis and liner analysis, little effort has b...
-
Chapter and Conference Paper
Autoencoder Assist: An Efficient Profiling Attack on High-Dimensional Datasets
Deep learning (DL)-based profiled attack has been proved to be a powerful tool in side-channel analysis. However, most attacks merely focus on small datasets, in which their points of interest are well-trimmed...
-
Article
SCARE and power attack on AES-like block ciphers with secret S-box
Despite Kerckhoff’s principle, there are secret ciphers with unknown components for diplomatic or military usages. The side-channel analysis of reverse engineering (SCARE) is developed for analyzing secret cip...
-
Article
MiR-137-3p Inhibits Colorectal Cancer Cell Migration by Regulating a KDM1A-Dependent Epithelial–Mesenchymal Transition
In colorectal cancer (CRC), miR-137-3p downregulation is associated with disease progression, but the mechanism is not fully understood. KDM1A, also known as LSD1, is upregulated in various cancer and promotes...
-
Chapter and Conference Paper
Near and Far Collision Attack on Masked AES
Collision attack is an effective method in the field of side-channel analysis to crack cryptographic algorithms, and masking can be used as a countermeasure. Most collision attacks only utilize the traces that...
-
Chapter and Conference Paper
Homological Fault Attack on AES Block Cipher and Its Countermeasures
As the physical security of hardware systems becomes more and more serious, a large number of physical attacks and countermeasures against on-chip cryptographic algorithms are proposed. Clock glitch injection ...
-
Chapter and Conference Paper
Impossible Differential Analysis on 8-Round PRINCE
PRINCE is a lightweight block cipher, which was proposed by Borghoff et al. in Asiacrypt 2012. Various cryptanalytic techniques have been employed to evaluate the security of PRINCE. In 2017, Ding et al. const...
-
Article
Long-Term Scheduling of Cascade Reservoirs Considering Inflow Forecasting Uncertainty Based on a Disaggregation Model
Forecasted inflow is one of the most important input information for reservoir operation planning. However, current inflow prediction accuracy is difficult to meet the needs of long-term operation. Therefore, ...
-
Article
Research and Design of an Automatic Grading Device in Chicken Wing Weight
What the test illustrates is mainly about research and design of an automatic grading device in chicken wing weight. Dynamically detect the chicken wings weight by weighing sensor, receive the chicken wings po...
-
Article
Improved automatic search of impossible differentials for camellia with FL/FL −1 layers
-
Article
Open AccessDysregulated systemic lymphocytes affect the balance of osteogenic/adipogenic differentiation of bone mesenchymal stem cells after local irradiation
While it is known that irradiation can induce local and systemic bone loss over time, how focal irradiation induces systemic bone complications remains unclear. Immune cells are thought to be crucial to bone h...
-
Article
Open AccessBone marrow stem cell dysfunction in radiation-induced abscopal bone loss
Bone-related complications are commonly reported in cancer patients receiving radiotherapy and are collectively referred to as the abscopal effect of irradiation, the mechanism of which remains poorly understo...