Skip to main content

previous disabled Page of 3
and
  1. Article

    Open Access

    Clinical application of indocyanine green fluorescence navigation technique in laparoscopic common bile duct exploration for complex hepatolithiasis

    This study investigated the clinical application of the indocyanine green (ICG) fluorescence navigation technique in bile duct identification during laparoscopic common bile duct exploration (LCBDE) for comple...

    Wenfei Wang, Sanli Feng, Zhuang Li, Zhenyu Qiao, Liusheng Yang, Lin Han in BMC Surgery (2024)

  2. No Access

    Article

    Analysis of Dynamic Characteristics and Adaptive Robust Control of Electromagnetic Actuators Under Variable Working Conditions

    The dynamic characteristics of an electromagnetic actuator used in a switching valve are influenced by self-induced effects, resulting in instability in its parameters when subjected to changes in working freq...

    Degeng Zhao, **jie Zhang, Liangyu Dong in Arabian Journal for Science and Engineering (2024)

  3. No Access

    Article

    Cross-domain fusion and embedded refinement-based 6D object pose tracking on textureless objects

    In industrial production, the ability to accurately perceive the location and orientation information of target objects enables the generalization of certain production processes to unstructured scenarios, the...

    Jichun Wang, Guifang Duan, Yang Wang, Guodong Yi in Journal of Intelligent Manufacturing (2024)

  4. No Access

    Article

    Processing an 18Cr-8Ni Austenitic Stainless Steel Without the Dilemma of the Strength and Ductility Trade-Off

    The magnitude of the contribution of common strengthening mechanisms in two samples of heterogeneous structured 18Cr-8Ni austenitic stainless steel (γ-SS) was innovatively compared using theoretical calculatio...

    Chengjie He, **aoxiong Zhu, Chengyang Hu, Hangyu Dong, **angliang Wan, Enyong Liu in JOM (2024)

  5. No Access

    Chapter and Conference Paper

    A Survey of Privacy Preserving Subgraph Matching Methods

    Due to the widespread of large-scale graph data and the increasing popularity of cloud computation, more and more graph processing tasks are outsourced to the cloud. Since graph data has rich information such ...

    **ngjiang Cheng, Fuxing Zhang, Yun Peng in Artificial Intelligence Security and Priva… (2024)

  6. No Access

    Chapter and Conference Paper

    Personalized Differential Privacy in the Shuffle Model

    Personalized local differential privacy is a privacy protection mechanism that aims to safeguard the privacy of data by using personalized approaches, while also providing practical data analysis results. It o...

    Ruilin Yang, Hui Yang, Jiluan Fan in Artificial Intelligence Security and Priva… (2024)

  7. No Access

    Chapter and Conference Paper

    A New Hash-Based Enhanced Privacy ID Signature Scheme

    The elliptic curve-based Enhanced Privacy ID (EPID) signature scheme is broadly used for hardware enclave attestation by many platforms that implement Intel Software Guard Extensions (SGX) and other devices. T...

    Liqun Chen, Changyu Dong, Nada El Kassem in Post-Quantum Cryptography (2024)

  8. Article

    Open Access

    Non-small cell lung cancers (NSCLCs) oncolysis using coxsackievirus B5 and synergistic DNA-damage response inhibitors

    With the continuous in-depth study of the interaction mechanism between viruses and hosts, the virus has become a promising tool in cancer treatment. In fact, many oncolytic viruses with selectivity and effect...

    Bopei Cui, Lifang Song, Qian Wang, Kelei Li in Signal Transduction and Targeted Therapy (2023)

  9. Article

    Open Access

    Compositional Shifts and Assembly in Rhizosphere-Associated Fungal Microbiota Throughout the Life Cycle of Japonica Rice Under Increased Nitrogen Fertilization

    Soil fungal microbiomes facilitate a range of beneficial functions for their host plants, and rhizosphere fungal community composition, richness, and diversity affect plant growth and development, and crop yie...

    Hangyu Dong, Haoyuan Sun, Conglin Chen, Mingyu Zhang, Dianrong Ma in Rice (2023)

  10. Article

    Open Access

    BMP4 upregulates glycogen synthesis through the SMAD/SLC2A1 (GLUT1) signaling axis in hepatocellular carcinoma (HCC) cells

    Excessive hepatic glycogen accumulation benefits tumorigenesis and cancer cell survival. We previously reported that BMP4 has the strongest ability to promote glycogenesis among the 14 BMPs in hepatocytes and ...

    Jiamin Zhong, Luyao Tian, Yannian Gou, Piao Zhao, **angyu Dong in Cancer & Metabolism (2023)

  11. No Access

    Chapter and Conference Paper

    Research on the Performance of Digital Economy in Heilongjiang Province on the Development of the Manufacturing Industry

    By analyzing the digital economy and the development of manufacturing industry in Heilongjiang Province, the construction of 13 cities in Heilongjiang Province in 2013–2020 individual fixed effects model, the ...

    Fangyu Dong, Dejun Song in Business Intelligence and Information Technology (2023)

  12. No Access

    Chapter and Conference Paper

    Predicate Private Set Intersection with Linear Complexity

    Private Set Intersection (PSI) enables two parties to learn the intersection of their input sets without exposing other items that are not within the intersection. However, real-world applications often requir...

    Yaxi Yang, Jian Weng, Yufeng Yi, Changyu Dong in Applied Cryptography and Network Security (2023)

  13. No Access

    Chapter and Conference Paper

    Zero-Knowledge Multi-transfer Based on Range Proofs and Homomorphic Encryption

    Zero-knowledge proofs are widely adopted in Confidential Transactions (CTs). In particular, with these proofs, it is possible to prove the validity of transactions without revealing sensitive information. This...

    Emanuele Scala, Changyu Dong in Advanced Information Networking and Applic… (2023)

  14. No Access

    Chapter and Conference Paper

    Hash-Based Direct Anonymous Attestation

    Direct Anonymous Attestation (DAA) was designed for the Trusted Platform Module (TPM) and versions using RSA and elliptic curve cryptography have been included in the TPM specifications and in ISO/IEC standard...

    Liqun Chen, Changyu Dong, Nada El Kassem in Post-Quantum Cryptography (2023)

  15. No Access

    Article

    Vector effect of polystyrene film microplastic in enriching Sudan III from natural particles and its burst release into simulated digestive fluid containing fatty acid

    Microplastics (MPs) have aroused tremendous attentions because of their ability in accumulating contaminants from adjacent environment. However, their capability of concentrating hydrophobic organic contaminan...

    **angmei **ang, Kangyu Dong, Zhanjun Li in Environmental Science and Pollution Research (2022)

  16. No Access

    Article

    Complete chloroplast genome features of the model heavy metal hyperaccumulator Arabis paniculata Franch and its phylogenetic relationships with other Brassicaceae species

    Arabis paniculata Franch (Brassicaceae) has been widely used for the phytoremediation of heavy mental, owing to its hyper tolerance of extreme Pb, Zn, and Cd concentrations. However, studies on its genome or plas...

    Hongcheng Wang, Chenchen Gan, ** Luo in Physiology and Molecular Biology of Plants (2022)

  17. No Access

    Article

    A Novel Multiple-Scattering Lidar for Detecting Optical and Microphysical Properties of Clouds

    Use of lidar to detect aerosol cloud interactions provides important application prospects and scientific value. In this study, we propose to combine a dual-field-of-view (FOV) device with multiple-scattering ...

    **angyu Dong, Jiandong Mao, Hu Zhao, Chunyan Zhou in Journal of Russian Laser Research (2022)

  18. No Access

    Article

    Load Transfer Behavior During Cascading Pillar Failure: An Experimental Study

    In order to reveal the load transfer mechanism during cascading pillar failure, compressive tests on treble-pillar specimens were conducted under soft and stiff loading conditions, where the stiffness of the t...

    Hangyu Dong, Wancheng Zhu, Chen Hou, **ge Liu in Rock Mechanics and Rock Engineering (2022)

  19. No Access

    Chapter and Conference Paper

    GAME: Generative-Based Adaptive Model Extraction Attack

    The outstanding performance of deep learning has prompted the rise of Machine Learning as a Service (MLaaS), which significantly reduces the difficulty for users to train and deploy models. For privacy and sec...

    Yi **e, Mengdie Huang, **aoyu Zhang, Changyu Dong in Computer Security – ESORICS 2022 (2022)

  20. No Access

    Chapter and Conference Paper

    Multi-party Updatable Delegated Private Set Intersection

    With the growth of cloud computing, the need arises for Private Set Intersection protocols (PSI) that can let parties outsource the storage of their private sets and securely delegate PSI computation to a clou...

    Aydin Abadi, Changyu Dong, Steven J. Murdoch in Financial Cryptography and Data Security (2022)

previous disabled Page of 3