Skip to main content

previous disabled Page of 5
and
  1. Article

    Open Access

    Novel MAXPOWER biological antibacterial liquid for eradicating oral Helicobacter pylori

    Eradication of oral Helicobacter pylori (H. pylori) not only reduces the infection rate from the transmission route but also improves the success rate of intragastric eradication. MAXPOWER Biological Bacteriostat...

    Yongkang Lai, **aoyang Dong, Yingxiao Song, Jiulong Zhao in BMC Infectious Diseases (2024)

  2. No Access

    Chapter and Conference Paper

    Effects of Visual-Vestibular Conflicts Caused by Visual Input on Out-of-Body Experience Induced by Visual-Tactile Stimulation in Virtual Reality

    Out-of-body experience (OBE) is a feeling that people observe and feel his/her own body from somewhere outside the physical body. In this paper, we examined the effects of visual-vestibular conflict caused by ...

    Zhe Song, **aoya Fan, Jiaoyang Dong in 12th Asian-Pacific Conference on Medical a… (2024)

  3. No Access

    Chapter and Conference Paper

    Graph Reinforcement Learning for Securing Critical Loads by E-Mobility

    Inefficient scheduling of electric vehicles (EVs) is detrimental to not only the profitability of charging stations but also the experience of EV users and the stable operation of the grid. Regulating the char...

    Borui Zhang, Chaojie Li, Boyang Hu, **angyu Li, Rui Wang in Neural Information Processing (2024)

  4. No Access

    Chapter and Conference Paper

    Quantum Attacks: A View of Data Complexity on Offline Simon’s Algorithm

    Simon’s algorithm has shown a threat to block ciphers in the quantum setting, especially accelerating attacks with superposition queries. Sometimes it is difficult for attackers to make superposition queries, ...

    Bo Yu, Tairong Shi, **aoyang Dong, Xuan Shen in Information Security and Cryptology (2024)

  5. No Access

    Article

    Improved attacks against reduced-round Whirlwind

    The Whirlwind hash function was proposed by Barreto et al. (Des Codes Cryptogr 56(2–3):141–162, 2010, https://doi.org/10.1007/s10623-010-9391-y). In this paper, we...

    Congming Wei, Bingyou Dong, Jialiang Hua, **aoyang Dong in Designs, Codes and Cryptography (2023)

  6. Article

    Open Access

    Case report: acute isolated cilioretinal artery occlusion secondary to percutaneous coronary intervention

    This case report aims to describe in detail the acute isolated cilioretinal artery occlusion (CLRAO) secondary to complicated therapeutic percutaneous coronary intervention (PCI).

    Bangtao Yao, Zhaoyang Dong, Yuanfeng Xue, Haoyu Meng in Journal of Cardiothoracic Surgery (2023)

  7. Article

    Open Access

    Nrf2 regulates iron-dependent hippocampal synapses and functional connectivity damage in depression

    Neuronal iron overload contributes to synaptic damage and neuropsychiatric disorders. However, the molecular mechanisms underlying iron deposition in depression remain largely unexplored. Our study aims to inv...

    Ting Zeng, Junjie Li, Lingpeng **e, Zhaoyang Dong in Journal of Neuroinflammation (2023)

  8. No Access

    Article

    A home energy management approach using decoupling value and policy in reinforcement learning

    Considering the popularity of electric vehicles and the flexibility of household appliances, it is feasible to dispatch energy in home energy systems under dynamic electricity prices to optimize electricity co...

    Luolin **ong 熊珞琳, Yang Tang 唐漾 in Frontiers of Information Technology & Elec… (2023)

  9. No Access

    Article

    Adsorption Characteristic of Methyl Blue onto Magnetic CaFe2O4 Nanoparticles Prepared via the Ethanol-Assisted Combustion Process

    CaFe2O4 nanoparticles were prepared successfully and characterized by SEM, TEM, XRD and VSM. The effects of ethanol dosage, calcination temperature, heating rate and calcination time on CaFe2O4 nanoparticles were...

    Wenjun Zhou, Zhixiang Lv, Chaoyang Dong, Sheng Luo in Water, Air, & Soil Pollution (2023)

  10. No Access

    Chapter and Conference Paper

    Identification of Morphing Aircraft Aerodynamic Parameters Based on Maximum Likelihood Method

    In this paper, Maximum Likelihood Method is used to identify aerodynamic parameters of the variable sweep wing morphing aircraft. First, we give the longitudinal nonlinear dynamic model and aerodynamic model o...

    Ruilin Lv, Yahui Liu, Chaoyang Dong in Advances in Guidance, Navigation and Control (2023)

  11. No Access

    Chapter and Conference Paper

    Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory

    At ASIACRYPT 2022, Benedikt, Fischlin, and Huppert proposed the quantum herding attacks on iterative hash functions for the first time. Their attack needs exponential quantum random access memory (qRAM), more ...

    **aoyang Dong, Shun Li, Phuong Pham in Advances in Cryptology – ASIACRYPT 2023 (2023)

  12. No Access

    Chapter and Conference Paper

    Fully Distributed Multi-UAV Cooperative Hunting with External Disturbance

    This paper focuses on multi-UAV cooperative hunting problem subject to unknown external disturbance in three-dimensional environment. A fully distributed extended state observer (ESO) based anti-disturbance co...

    **ang Yao, Chaoyang Dong, Chengcai Wang in Advances in Guidance, Navigation and Contr… (2023)

  13. No Access

    Chapter and Conference Paper

    Automated Meet-in-the-Middle Attack Goes to Feistel

    Feistel network and its generalizations (GFN) are another important building blocks for constructing hash functions, e.g., Simpira v2, Areion, and the ISO standard Lesamnta-LW. The Meet-in-the-Middle (MitM) is a ...

    Qingliang Hou, **aoyang Dong, Lingyue Qin in Advances in Cryptology – ASIACRYPT 2023 (2023)

  14. No Access

    Chapter and Conference Paper

    Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing

    The Meet-in-the-Middle (MitM) attack has been widely applied to preimage attacks on Merkle-Damgård (MD) hashing. In this paper, we introduce a generic framework of the MitM attack on sponge-based hashing. We f...

    Lingyue Qin, Jialiang Hua, **aoyang Dong in Advances in Cryptology – EUROCRYPT 2023 (2023)

  15. Article

    Open Access

    A novel random finite element model for holistically modeling of the frost effects on soils and cold region pavements

    This paper describes the development of a random finite element model (RFEM) that allows holistic simulation of frozen soil behaviors, including the effects of phase transition and the consequent internal stre...

    Shaoyang Dong, Yusheng Jiang, **ong Yu in Journal of Infrastructure Preservation and… (2022)

  16. No Access

    Article

    Heterostructured MoS2/GPC anode: the synergistic lithium storage performance and lithiation kinetics

    Grapefruit peel carbon (GPC) is prepared from waste grapefruit peel and further used as substrate for in situ construction of MoS2 arrays, forming MoS2/GPC heterostructured materials. Based on the effect of the m...

    **a Zhang, Chaoyang Dong, Yangang Sun in Journal of Solid State Electrochemistry (2022)

  17. No Access

    Article

    Transfer film growth of continuous carbon fiber reinforced thermoplastic poly(ether ether ketone) facilitated by surface texture during dry sliding

    To show the effect of surface texture on transfer film growth of continuous carbon fiber-reinforced thermoplastic poly(ether ether ketone) (CCF-PEEK), tribological behaviors of untextured and laser-engraved-di...

    Huajun Cao, **n Dong, Da Qu, Chaoyang Dong, Chunyue Zhao in Journal of Materials Science (2022)

  18. No Access

    Chapter and Conference Paper

    Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems

    In this paper, we present preimage attacks on 4-round Keccak-224/256 as well as 4-round Keccak[ \(r = 640,c = 160,l = 80\) ...

    Congming Wei, Chenhao Wu, **ming Fu in Information Security and Cryptology – ICIS… (2022)

  19. No Access

    Chapter and Conference Paper

    Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256

    Designing symmetric ciphers for particular applications becomes a hot topic. At EUROCRYPT 2020, Naito, Sasaki and Sugawara invented the threshold implementation friendly cipher SKINNYe-64-256 to meet the requirem...

    Lingyue Qin, **aoyang Dong, Anyu Wang in Advances in Cryptology – ASIACRYPT 2022 (2022)

  20. No Access

    Chapter and Conference Paper

    Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks

    When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we find the right quartets which may suggest key candidates have to satisfy some nonlinear relations. However, some quart...

    **aoyang Dong, Lingyue Qin, Siwei Sun in Advances in Cryptology – EUROCRYPT 2022 (2022)

previous disabled Page of 5