Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Sharding Technologies in Blockchain: Basics, State of the Art, and Challenges

    Sharding is one of the key technologies of blockchain scalable characteristics widely used in cryptocurrencies, Internet of Things, supply chain management and other fields. It can achieve high performance sca...

    Luyi Zhang, Yujue Wang, Yong Ding, Hai Liang in Blockchain and Trustworthy Systems (2024)

  2. No Access

    Chapter and Conference Paper

    Secure Traffic Data Sharing in UAV-Assisted VANETs

    Aiming at the issues of low comprehensiveness and timeliness of data, difficulty in balancing data anonymity and traceability, and challenges of securely storing massive data in traditional traffic data sharin...

    Yilin Liu, Yujue Wang, Chen Yi, Yong Ding in Collaborative Computing: Networking, Appli… (2024)

  3. No Access

    Chapter and Conference Paper

    A Lightweight PUF-Based Group Authentication Scheme for Privacy-Preserving Metering Data Collection in Smart Grid

    With the development of information and communication technologies, the services provided by smart grid attract more users to join smart grid. However, with the explosive growth of the number of smart meters, ...

    Ya-Nan Cao, Yujue Wang, Yong Ding in Collaborative Computing: Networking, Appli… (2024)

  4. No Access

    Chapter and Conference Paper

    Efficient and Revocable Anonymous Account Guarantee System Based on Blockchain

    The fast expansion of information technology and public concern for personal privacy and security have raised expectations for the authentication process. Although existing anonymous authentication schemes can...

    Weiyou Liang, Yujue Wang, Yong Ding in Collaborative Computing: Networking, Appli… (2024)

  5. No Access

    Chapter and Conference Paper

    Privacy-Preserving Blockchain Supervision with Responsibility Tracking

    Blockchain technology is a strategic technology to support the development of digital economy, which helps to promote data sharing, improve the efficiency of communication and build a trusted system. With the ...

    Baodong Wen, Yujue Wang, Yong Ding in Collaborative Computing: Networking, Appli… (2024)

  6. Article

    Open Access

    A phosphoinositide switch mediates exocyst recruitment to multivesicular endosomes for exosome secretion

    Exosomes are secreted to the extracellular milieu when multivesicular endosomes (MVEs) dock and fuse with the plasma membrane. However, MVEs are also known to fuse with lysosomes for degradation. How MVEs are ...

    Di-Ao Liu, Kai Tao, Bin Wu, Ziyan Yu, Malwina Szczepaniak in Nature Communications (2023)

  7. No Access

    Chapter and Conference Paper

    IoT-Assisted Blockchain-Based Car Rental System Supporting Traceability

    The majority of existing car rental systems rely on a centralized database to manage the data. Although these centralized architectures could make the system design and operation costs are reduced, there are m...

    Lipan Chen, Yujue Wang, Yong Ding, Hai Liang in Database Systems for Advanced Applications (2023)

  8. Article

    Open Access

    Feedback between mechanosensitive signaling and active forces governs endothelial junction integrity

    The formation and recovery of gaps in the vascular endothelium governs a wide range of physiological and pathological phenomena, from angiogenesis to tumor cell extravasation. However, the interplay between th...

    Eoin McEvoy, Tal Sneh, Emad Moeendarbary, Yousef Javanmardi in Nature Communications (2022)

  9. Article

    Open Access

    Actin polymerization promotes invagination of flat clathrin-coated lattices in mammalian cells by pushing at lattice edges

    Clathrin-mediated endocytosis (CME) requires energy input from actin polymerization in mechanically challenging conditions. The roles of actin in CME are poorly understood due to inadequate knowledge of actin ...

    Changsong Yang, Patricia Colosi, Siewert Hugelier in Nature Communications (2022)

  10. Article

    Open Access

    HRS phosphorylation drives immunosuppressive exosome secretion and restricts CD8+ T-cell infiltration into tumors

    The lack of tumor infiltration by CD8+ T cells is associated with poor patient response to anti-PD-1 therapy. Understanding how tumor infiltration is regulated is key to improving treatment efficacy. Here, we rep...

    Lei Guan, Bin Wu, Ting Li, Lynn A. Beer, Gaurav Sharma, Mingyue Li in Nature Communications (2022)

  11. No Access

    Article

    Efficient data transfer supporting provable data deletion for secure cloud storage

    With the widespread popularity of cloud storage, a growing quantity of tenants prefer to upload their massive data to remote cloud data center for saving local cost. Due to the great market prospect, a large q...

    Changsong Yang, Yueling Liu, Yong Ding in Soft Computing (2022)

  12. No Access

    Chapter and Conference Paper

    Study on Path Planning of Multi-storey Parking Lot Based on Combined Loss Function

    Path planning research can effectively solve the problem of finding free parking space in multi-storey parking lots. This paper takes advantage of the decision ability of reinforcement learning and the percept...

    Zhongtian Hu, Jun Yan, Yuli Wang, Changsong Yang in Intelligent Computing Methodologies (2022)

  13. No Access

    Chapter and Conference Paper

    An Illegal Data Supervision Scheme for the Consortium Blockchain

    With the rapid development of blockchain, many enterprise-level applications have used consortium blockchain to ensure the system’s immutability and decentralization. However, due to the immutability of blockc...

    **qin Wang, Kun Zhang, Yong Ding, Fang Yuan in Blockchain Technology and Application (2022)

  14. Article

    Open Access

    T-Plastin reinforces membrane protrusions to bridge matrix gaps during cell migration

    Migrating cells move across diverse assemblies of extracellular matrix (ECM) that can be separated by micron-scale gaps. For membranes to protrude and reattach across a gap, actin filaments, which are relative...

    Damien Garbett, Anjali Bisaria, Changsong Yang in Nature Communications (2020)

  15. No Access

    Article

    Dynamin regulates the dynamics and mechanical strength of the actin cytoskeleton as a multifilament actin-bundling protein

    The dynamin GTPase is known to bundle actin filaments, but the underlying molecular mechanism and physiological relevance remain unclear. Our genetic analyses revealed a function of dynamin in propelling invas...

    Ruihui Zhang, Donghoon M. Lee, John R. Jimah, Nathalie Gerassimov in Nature Cell Biology (2020)

  16. No Access

    Chapter and Conference Paper

    Data Integrity Checking Supporting Reliable Data Migration in Cloud Storage

    With the rapid development of cloud computing, more and more users are willing to employ cloud storage. As a result, an increasing number of companies invest cloud storage thus provide users with data storage ...

    Changsong Yang, **aoling Tao, Sufang Wang in Wireless Algorithms, Systems, and Applicat… (2020)

  17. No Access

    Chapter and Conference Paper

    New Publicly Verifiable Cloud Data Deletion Scheme with Efficient Tracking

    Cloud storage service, one of the most important services in the cloud computing, can offer high-quality storage service for tenants. By employing the cloud storage service, the resource-constraint data owners...

    Changsong Yang, **aoling Tao in Security with Intelligent Computing and Big-data Services (2020)

  18. No Access

    Article

    Ultrastructure and dynamics of the actin−myosin II cytoskeleton during mitochondrial fission

    Mitochondrial fission involves the preconstriction of an organelle followed by scission by dynamin-related protein Drp1. Preconstriction is facilitated by actin and non-muscle myosin II through a mechanism tha...

    Changsong Yang, Tatyana M. Svitkina in Nature Cell Biology (2019)

  19. No Access

    Chapter and Conference Paper

    A New Outsourced Data Deletion Scheme with Public Verifiability

    In the cloud storage, the data owner will lose the direct control over his outsourced data, and all the operations over the outsourced data may be executed by corresponding remote cloud server, such as cloud d...

    Changsong Yang, **aoling Tao, Feng Zhao in Wireless Algorithms, Systems, and Applicat… (2019)

  20. Article

    Open Access

    Graph database-based network security situation awareness data storage method

    With the rapid development of the Internet, network security situation awareness has attracted tremendous attention. In large-scale complex networks, network security situation awareness data presents the char...

    **aoling Tao, Yang Liu, Feng Zhao in EURASIP Journal on Wireless Communications… (2018)

previous disabled Page of 2