Skip to main content

and
  1. No Access

    Article

    Experimental and numerical investigation of enhancement of heat and mass transfer in adsorbent beds

    Some interrelated parameters of heat and mass transfer in two phases of pressure rise and constant pressure are obtained by studying the desorption processes of two kinds of cylindrical adsorbent beds, with fi...

    Zhenyan Liu, Zhuman Fu, **nshi Ge, Yuehong Su, Yongtang Wang in Journal of Thermal Science (1994)

  2. No Access

    Article

    Removal of Volatile Organic Compounds (VOCs) at Room Temperature Using Dielectric Barrier Discharge and Plasma-Catalysis

    Non-thermal plasma (NTP) was produced in a dielectric barrier discharge reactor for degradation of acetaldehyde and benzene, respectively. The effect of volatile organic compounds (VOCs) chemical structure on ...

    Yizhuo Li, Zeyun Fan, Jianwei Shi, Zhenyan Liu in Plasma Chemistry and Plasma Processing (2014)

  3. No Access

    Chapter and Conference Paper

    Machine Learning for Analyzing Malware

    The Internet has become an indispensable part of people’s work and life. It provides favorable communication conditions for malwares. Therefore, malwares are endless and spread faster and become one of the mai...

    Yajie Dong, Zhenyan Liu, Yida Yan, Yong Wang, Tu Peng in Network and System Security (2017)

  4. No Access

    Chapter and Conference Paper

    An Approach of Implementing Core Role Based Access Control Model Using Attribute Based Encryption

    Cloud Storage, which provides cost-efficient and scalable storage services, has emerged as a hot paradigm today. However, in the resource outsourcing environment such as cloud storage, the resource owner is se...

    Yong Wang, Xuemin Tong, Ming Li, **gfeng Xue in Trusted Computing and Information Security (2017)

  5. No Access

    Chapter and Conference Paper

    Research of Snort Rule Extension and APT Detection Based on APT Network Behavior Analysis

    At present, APT attack detection has become the focus of the network security protection field. APT attacks are one of the most difficult attacks in cyber attacks. The complexity and variability of APT attack ...

    Yan Cui, **gfeng Xue, Yong Wang, Zhenyan Liu in Trusted Computing and Information Security (2019)

  6. No Access

    Chapter and Conference Paper

    Efficient Computation of Provenance for Query Result Exploration

    Users typically interact with a database by asking queries and examining the results. We refer to the user examining the query results and asking follow-up questions as query result exploration. Our work builds o...

    Murali Mani, Naveenkumar Singaraj in Provenance and Annotation of Data and Proc… (2021)

  7. Article

    Open Access

    DNMT3A R882H mutation drives daunorubicin resistance in acute myeloid leukemia via regulating NRF2/NQO1 pathway

    DNA methyltransferase 3A (DNMT3A) often mutate on arginine 882 (DNMT3AR882) in acute myeloid leukemia (AML). AML patients with DNMT3A R882 mutation are usually resistant to daunorubicin treatment; however, the as...

    Xuan Chu, Liang Zhong, Wenran Dan, **ao Wang in Cell Communication and Signaling (2022)

  8. No Access

    Article

    Production, characterization and antioxidant activity of exopolysaccharide from Sporidiobolus pararoseus PFY-Z1

    At present, the study on exopolysaccharid is mainly focused on lactic acid bacteria, and the research on exopolysaccharide produced by yeast, especially Sporidiobolus pararoseus, is relatively few. Therefore, the...

    Zhenyan Liu, Fangyi Pei, **feng Zhu, Di Xue in World Journal of Microbiology and Biotechn… (2022)

  9. No Access

    Chapter and Conference Paper

    LM-cAPI:A Lite Model Based on API Core Semantic Information for Malware Classification

    Currently, malware is continually evolving and growing in complexity, posing a significant threat to network security. With the constant emergence of new types and quantities of malware coupled with the contin...

    Yifan Zhou, Zhenyan Liu, **gfeng Xue in Applied Cryptography and Network Security … (2024)