Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Combination Reduction Algorithm and Its Application

    After the Snowden incident, cryptographic subversion attack has attracted widespread attentions. Subversion attack is an unconventional attack inside machines, which has strong concealment. It will threaten th...

    Wei Yang, Shaojun Yang, Wei Wu, Yong Zhao in Network and System Security (2022)

  2. No Access

    Chapter and Conference Paper

    Inner Product Encryption from Middle-Product Learning with Errors

    Inner product encryption (IPE) is an essential area of research for functional encryption systems. It has extensive applications in emerging fields such as cloud computing, where it can improve users’ access c...

    Niao Yang, Shaojun Yang, Yong Zhao, Wei Wu in Security and Privacy in Social Networks an… (2022)

  3. No Access

    Article

    Primary Spontaneous Pneumothorax—Outcomes of Different Treatment Modalities

    The aim of this study is to compare the recurrence rates with different modalities used as first-line treatment for first-episode primary spontaneous pneumothorax, and investigated the risk factors for recurre...

    Weijiang Ma, Feng Ling, Limin Yang, Shaojun Yang, Xu Li in Indian Journal of Surgery (2021)

  4. No Access

    Article

    Effects of resveratrol on mitochondrial biogenesis and physiological diseases

    Plants produce a number of biological active substances with healthy benefits. Resveratrol (3,5,4′-trihydroxystilbene), a polyphenol produced by plants has been associated with many health beneficial propertie...

    Angelo Uriho, Xue Tang, Guowei Le, Shaojun Yang in Advances in Traditional Medicine (2021)

  5. No Access

    Chapter and Conference Paper

    Ring Trapdoor Redactable Signatures from Lattice

    Redactable signature plays a significant role in real-life applications such as electronic health records, and has been studied extensively. Nevertheless, how to construct a redactable signature scheme with de...

    Shaojun Yang, **nyi Huang, Mingmei Zheng in Information Security Practice and Experien… (2021)

  6. Article

    Open Access

    Inner product encryption from ring learning with errors

    The functional encryption scheme designed using the lattice can realize fine-grained encryption and it can resist quantum attacks. Unfortunately, the sizes of the keys and ciphertexts in cryptographic applicat...

    Shisen Fang, Shaojun Yang, Yuexin Zhang in Cybersecurity (2020)

  7. No Access

    Article

    Salicylic acid alleviates cadmium-induced inhibition of growth and photosynthesis through upregulating antioxidant defense system in two melon cultivars (Cucumis melo L.)

    Cadmium (Cd) is a widespread toxic heavy metal that usually causes deleterious effects on plant growth and development. Salicylic acid (SA), a naturally existing phenolic compound, is involved in specific resp...

    Yong** Zhang, Shuang Xu, Shaojun Yang, Youyuan Chen in Protoplasma (2015)

  8. No Access

    Article

    Alleviation of exogenous 6-benzyladenine on two genotypes of eggplant (Solanum melongena Mill.) growth under salt stress

    Cytokinins were recently shown to control plant adaptation to environmental stresses. To characterize the roles of cytokinins in the tolerance of eggplant (Solanum melongena Mill.) to salt stress, the protective ...

    Xuexia Wu, Jie He, Jianlin Chen, Shaojun Yang, Dingshi Zha in Protoplasma (2014)

  9. No Access

    Article

    Solids acceleration length in a cold dense transport bed

    The solids acceleration length was investigated in a cold dense transport bed (0.10 m-ID×17 m-height) with three kinds of silica sand. The solids circulation rate (Gs) was up to 954 kg/(m2s). The effects of op...

    Yunhan **ao, Shengdian Wang, Shaojun Yang, Kai Zhao, **n Zeng in Journal of Thermal Science (2012)

  10. No Access

    Chapter and Conference Paper

    Mobile Agent Routing Based on a Two-Stage Optimization Model and a Hybrid Evolutionary Algorithm in Wireless Sensor Networks

    A new two-stage optimization model for mobile agent routing in the wireless sensor network is presented as a integer linear programming problem based on the virtual connection topology sub graph. In the model,...

    Shaojun Yang, Rui Huang, Haoshan Shi in Advances in Natural Computation (2006)

  11. No Access

    Chapter and Conference Paper

    A Hybrid Intrusion Detection Strategy Used for Web Security

    This paper describes a novel framework for intrusion detection systems used for Web security. A hierarchical structure was proposed to gain both server-based detection and network-based detection. The system c...

    Bo Yang, Han Li, Yi Li, Shaojun Yang in Rough Sets, Fuzzy Sets, Data Mining, and G… (2003)

  12. No Access

    Article

    Process conditions affecting proteolysis of recombinant proteins in Escherichia coli

    The effects of process conditions on proteolysis of three recombinant IgG-binding proteins ZT3, ZZT3 and protein A in E. coli were studied. SDS/PAGE shows that the relative amount of degradation intermediates of ...

    Shaojun Yang, Sven-Olof Enfors in Biotechnology Letters (1996)