Skip to main content

previous disabled Page of 5
and
  1. No Access

    Article

    Invisible backdoor learning in regional transform domain

    The rapid develo** deep learning is highly required by resources and computing resources, which easily leads to backdoor learnings. It is difficult for existing schemes to strike a balance among trigger conc...

    Yuyuan Sun, Yuliang Lu, Xuehu Yan, Xuan Wang in Neural Computing and Applications (2024)

  2. No Access

    Article

    Removable Edges in Claw-Free Bricks

    An edge e in a matching covered graph G is removable if \(G-e\) G

    **aoxia Wu, Fuliang Lu, Lianzhu Zhang in Graphs and Combinatorics (2024)

  3. No Access

    Article

    Effective Detection of Cu(II) Ions Based on Carbon Dots@Exfoliated Layered Double Hydroxides Composites Fluorescence Probe

    A series of carbon dots@exfoliated layered double hydroxides (CDs@LDH) composites were hydrothermally fabricated by Mg/Al LDH and formamide. The results of FTIR, UV-vis, and XPS spectra in company with HRTEM i...

    Quliang Lu, Yixian Mei, Yuting Wu, Houjun Lin, YanLi Li in Journal of Fluorescence (2024)

  4. No Access

    Chapter and Conference Paper

    Backdoor Learning on Siamese Networks Using Physical Triggers: FaceNet as a Case Study

    Deep learning models play an important role in many real-world applications, for example, in face recognition systems, Siamese networks have been widely used. Their security issues have attracted increasing at...

    Zeshan Pang, Yuyuan Sun, Shasha Guo, Yuliang Lu in Digital Forensics and Cyber Crime (2024)

  5. Article

    Open Access

    Domestic Violence among LGBT + People in China: Results from a national court rulings review

    Domestic violence has been an emerging area of study in recent decades for lesbians, gay men, bisexuals, and transgender people (LGBT +). While some research discussed domestic violence among LGBT + couples in...

    Yuliang Lu in Journal of Family Violence (2023)

  6. No Access

    Article

    Two Completely Independent Spanning Trees of \(P_4\) -Free Graphs

    A graph without induced subgraphs isomorphic to a path of length 3 is \(P_4\) P ...

    **aodong Chen, **g**g Li, Fuliang Lu in Graphs and Combinatorics (2023)

  7. No Access

    Article

    Pedicled Omental Transposition for Recurrent Skin Erosion Following Deep Brain Stimulation Without Hardware Removal

    Skin erosion is a common skin-related complication in patients underwent deep brain stimulation. Traditionally, treatment of these skin-related complications has required removal of the entire deep brain stimu...

    Haonan Guan, Yixin Pan, Peng Huang, Jiajun Tang, Bomin Sun in Indian Journal of Surgery (2023)

  8. No Access

    Article

    Preparation of Eu(III) Complexes Containing Maleopimaric Acid Anhydride with Ultra-narrow and Efficient Fluorescence Emission for High Determination on Gallic Acid in Acetonitrile Solution

    Two novel Eu(III) complexes constructed by maleopimaric acid anhydride (MPA) and 2,2'-bipyridyl (Bpy) / 1, 10-phenanthroline (Phen), named as MPA-Bpy-Eu / MPA-Phen-Eu, have been synthesized by a one-step preci...

    Quliang Lu, He Liu, Dan Wang, Haibo Zhang, Shibin Shang in Journal of Fluorescence (2023)

  9. Article

    Open Access

    The epidemiological characteristic and trends of burns globally

    Burns is a type of injury, caused by unintentional exposure to substances of high temperature, including hot liquid, solid, and objects radiating heat energy, placing a high burden not only on patients’ famili...

    Aobuliaximu Yakupu, Jie Zhang, Wei Dong, Fei Song, Jiaoyun Dong in BMC Public Health (2022)

  10. Article

    Open Access

    A Heuristic Local-sensitive Program-Wide Diffing Method for IoT Binary Files

    Code reuse brings vulnerabilities in third-party library to many Internet of Things (IoT) devices, opening them to attacks such as distributed denial of service. Program-wide binary diffing technology can help...

    Lu Yu, Yuliang Lu, Yi Shen, Zulie Pan in Arabian Journal for Science and Engineering (2022)

  11. Article

    Open Access

    Vulnerability-oriented directed fuzzing for binary programs

    Directed greybox fuzzing (DGF) is an effective method to detect vulnerabilities of the specified target code. Nevertheless, there are three main issues in the existing DGFs. First, the target vulnerable code o...

    Lu Yu, Yuliang Lu, Yi Shen, Yuwei Li, Zulie Pan in Scientific Reports (2022)

  12. No Access

    Chapter and Conference Paper

    Generative Text Steganography via Multiple Social Network Channels Based on Transformers

    Generative text steganography uses the conditional probability to encode the candidate words when generating tokens by language model, and then selects the corresponding word to output according to the secret ...

    Long Yu, Yuliang Lu, Xuehu Yan, **anhui Wang in Natural Language Processing and Chinese Co… (2022)

  13. No Access

    Article

    Influence of Loading Conditions on the Residual Flexural Capacity of Reinforced Concrete T-beams after Fire Exposure

    To explore the influence of the loading conditions and fire exposure time on the residual mechanical properties of concrete T-beams, 10 concrete T-shaped beams were designed and manufactured. Three levels of l...

    Caiwei Liu, **uliang Lu, Guangzhong Ba, Hao Liu in KSCE Journal of Civil Engineering (2021)

  14. No Access

    Article

    BAT: real-time inaudible sound capture with smartphones

    People tend to store important information on air-gapped devices and believe that the information is safe. But in recent years, more and more methods have been proposed to exfiltrate information from an air-ga...

    Dingwei Tan, Yuliang Lu, Xuehu Yan, Longlong Li in Multimedia Tools and Applications (2021)

  15. Article

    Open Access

    Construction and validation of nomogram to predict distant metastasis in osteosarcoma: a retrospective study

    Osteosarcoma is most common malignant bone tumors. OS patients with metastasis have a poor prognosis. There are few tools to assess metastasis; we want to establish a nomogram to evaluate metastasis of osteosa...

    Shouliang Lu, Yanhua Wang, Guangfei Liu in Journal of Orthopaedic Surgery and Research (2021)

  16. Article

    Open Access

    Image quality of automatic coronary CT angiography reconstruction for patients with HR ≥ 75 bpm using an AI-assisted 16-cm z-coverage CT scanner

    Coronary CT angiography (CCTA) is a complicated CT exam in comparison to other CT protocols. Exam success highly depends on image assessment of experienced radiologist and the procedure is often time-consuming...

    Cheng Yan, Guofeng Zhou, Xue Yang, **uliang Lu, Mengsu Zeng, Min Ji in BMC Medical Imaging (2021)

  17. No Access

    Article

    Migrated hybrid turbidite-contourite channel-lobe complex of the late Eocene Rovuma Basin, East Africa

    Analysis of 3D seismic data and well log data from the Rovuma Basin in East Africa reveals the presence of a late Eocene channel-lobe complex on its slope. The first two channels, denoted as channel-1 and chan...

    Yintao Lu, **wu Luan, Boqing Shi, Weimin Ran, Fuliang Lü in Acta Oceanologica Sinica (2021)

  18. No Access

    Article

    A buried submarine canyon in the northwestern South China Sea: architecture, development processes and implications for hydrocarbon exploration

    High-resolution multichannel seismic data enables the discovery of a previous, undocumented submarine canyon (Huaguang Canyon) in the Qiongdongnan Basin, northwestern South China Sea. The Huaguang Canyon with ...

    Bin Wang, Fuliang Lü, Shuang Li, Jian Li, Zhili Yang, Li Li in Acta Oceanologica Sinica (2021)

  19. No Access

    Chapter

    Tissue Repair and Regeneration Disorders: Repair and Regeneration of Chronic Refractory Wounds

    Chronic refractory wounds (commonly known as ulcers) can be formed by many reasons. The International Society for Wound Healing defines it as a wound that fails to achieve anatomical and functional integrity a...

    Yufeng Jiang, **aobing Fu, Shuliang Lu, Yiwen Niu in Regenerative Medicine in China (2021)

  20. No Access

    Chapter and Conference Paper

    Construction-Based Secret Image Sharing

    Most secret image sharing (SIS) schemes output noise-like shadows and are fragile to any noise due to their restoring methods are based on mathematical operations. A noise-like shadow increases the suspicion o...

    Xuehu Yan, Guozheng Yang, Lanlan Qi in Proceedings of the 9th International Confe… (2021)

previous disabled Page of 5