![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessClinical application of indocyanine green fluorescence navigation technique in laparoscopic common bile duct exploration for complex hepatolithiasis
This study investigated the clinical application of the indocyanine green (ICG) fluorescence navigation technique in bile duct identification during laparoscopic common bile duct exploration (LCBDE) for comple...
-
Article
Analysis of Dynamic Characteristics and Adaptive Robust Control of Electromagnetic Actuators Under Variable Working Conditions
The dynamic characteristics of an electromagnetic actuator used in a switching valve are influenced by self-induced effects, resulting in instability in its parameters when subjected to changes in working freq...
-
Article
Cross-domain fusion and embedded refinement-based 6D object pose tracking on textureless objects
In industrial production, the ability to accurately perceive the location and orientation information of target objects enables the generalization of certain production processes to unstructured scenarios, the...
-
Article
Processing an 18Cr-8Ni Austenitic Stainless Steel Without the Dilemma of the Strength and Ductility Trade-Off
The magnitude of the contribution of common strengthening mechanisms in two samples of heterogeneous structured 18Cr-8Ni austenitic stainless steel (γ-SS) was innovatively compared using theoretical calculatio...
-
Chapter and Conference Paper
A Survey of Privacy Preserving Subgraph Matching Methods
Due to the widespread of large-scale graph data and the increasing popularity of cloud computation, more and more graph processing tasks are outsourced to the cloud. Since graph data has rich information such ...
-
Chapter and Conference Paper
Personalized Differential Privacy in the Shuffle Model
Personalized local differential privacy is a privacy protection mechanism that aims to safeguard the privacy of data by using personalized approaches, while also providing practical data analysis results. It o...
-
Chapter and Conference Paper
A New Hash-Based Enhanced Privacy ID Signature Scheme
The elliptic curve-based Enhanced Privacy ID (EPID) signature scheme is broadly used for hardware enclave attestation by many platforms that implement Intel Software Guard Extensions (SGX) and other devices. T...
-
Article
Open AccessNon-small cell lung cancers (NSCLCs) oncolysis using coxsackievirus B5 and synergistic DNA-damage response inhibitors
With the continuous in-depth study of the interaction mechanism between viruses and hosts, the virus has become a promising tool in cancer treatment. In fact, many oncolytic viruses with selectivity and effect...
-
Article
Open AccessCompositional Shifts and Assembly in Rhizosphere-Associated Fungal Microbiota Throughout the Life Cycle of Japonica Rice Under Increased Nitrogen Fertilization
Soil fungal microbiomes facilitate a range of beneficial functions for their host plants, and rhizosphere fungal community composition, richness, and diversity affect plant growth and development, and crop yie...
-
Article
Open AccessBMP4 upregulates glycogen synthesis through the SMAD/SLC2A1 (GLUT1) signaling axis in hepatocellular carcinoma (HCC) cells
Excessive hepatic glycogen accumulation benefits tumorigenesis and cancer cell survival. We previously reported that BMP4 has the strongest ability to promote glycogenesis among the 14 BMPs in hepatocytes and ...
-
Chapter and Conference Paper
Research on the Performance of Digital Economy in Heilongjiang Province on the Development of the Manufacturing Industry
By analyzing the digital economy and the development of manufacturing industry in Heilongjiang Province, the construction of 13 cities in Heilongjiang Province in 2013–2020 individual fixed effects model, the ...
-
Chapter and Conference Paper
Predicate Private Set Intersection with Linear Complexity
Private Set Intersection (PSI) enables two parties to learn the intersection of their input sets without exposing other items that are not within the intersection. However, real-world applications often requir...
-
Chapter and Conference Paper
Zero-Knowledge Multi-transfer Based on Range Proofs and Homomorphic Encryption
Zero-knowledge proofs are widely adopted in Confidential Transactions (CTs). In particular, with these proofs, it is possible to prove the validity of transactions without revealing sensitive information. This...
-
Chapter and Conference Paper
Hash-Based Direct Anonymous Attestation
Direct Anonymous Attestation (DAA) was designed for the Trusted Platform Module (TPM) and versions using RSA and elliptic curve cryptography have been included in the TPM specifications and in ISO/IEC standard...
-
Article
Vector effect of polystyrene film microplastic in enriching Sudan III from natural particles and its burst release into simulated digestive fluid containing fatty acid
Microplastics (MPs) have aroused tremendous attentions because of their ability in accumulating contaminants from adjacent environment. However, their capability of concentrating hydrophobic organic contaminan...
-
Article
Complete chloroplast genome features of the model heavy metal hyperaccumulator Arabis paniculata Franch and its phylogenetic relationships with other Brassicaceae species
Arabis paniculata Franch (Brassicaceae) has been widely used for the phytoremediation of heavy mental, owing to its hyper tolerance of extreme Pb, Zn, and Cd concentrations. However, studies on its genome or plas...
-
Article
A Novel Multiple-Scattering Lidar for Detecting Optical and Microphysical Properties of Clouds
Use of lidar to detect aerosol cloud interactions provides important application prospects and scientific value. In this study, we propose to combine a dual-field-of-view (FOV) device with multiple-scattering ...
-
Article
Load Transfer Behavior During Cascading Pillar Failure: An Experimental Study
In order to reveal the load transfer mechanism during cascading pillar failure, compressive tests on treble-pillar specimens were conducted under soft and stiff loading conditions, where the stiffness of the t...
-
Chapter and Conference Paper
GAME: Generative-Based Adaptive Model Extraction Attack
The outstanding performance of deep learning has prompted the rise of Machine Learning as a Service (MLaaS), which significantly reduces the difficulty for users to train and deploy models. For privacy and sec...
-
Chapter and Conference Paper
Multi-party Updatable Delegated Private Set Intersection
With the growth of cloud computing, the need arises for Private Set Intersection protocols (PSI) that can let parties outsource the storage of their private sets and securely delegate PSI computation to a clou...