Skip to main content

and
  1. No Access

    Chapter

    Synthesis of Silver and Copper Nanowires and Their Application for Transparent Conductors

    Silver and copper nanowires have been used in many areas, like sensors, catalysis, optoelectronics, etc. They are well-known by the excellent optoelectronic and chemical properties. Here in this chapter, some ...

    Conghua Zhou, Yongli Gao in Synthesis and Applications of Nanomaterials and Nanocomposites (2023)

  2. No Access

    Article

    A facile interface engineering method to improve the performance of FTO/ZnO/CsPbI3−xBrx (x < 1)/C solar cells

    Hole-transport-layer (HTL)-free, carbon-based all-inorganic perovskite solar cells (PSCs) are attracting a great interest owing to a low cost and an advanced stability in ambient environment. However, the phot...

    Hao Fu, Junsen Zhang, Yanhao Li, Li Gong in Journal of Materials Science: Materials in… (2022)

  3. Article

    Open Access

    Altered expression of the DISC1 gene in peripheral blood of patients with schizophrenia

    Schizophrenia is a severe, heritable, and refractory psychiatric disorder. Several studies have shown that the disrupted in schizophrenia 1 (DISC1) gene is closely associated with schizophrenia by its role in neu...

    **aoqian Fu, Guofu Zhang, Yansong Liu, Ling Zhang, Fuquan Zhang in BMC Medical Genetics (2020)

  4. Article

    Open Access

    Templated growth of oriented layered hybrid perovskites on 3D-like perovskites

    The manipulation of crystal orientation from the thermodynamic equilibrium states is desired in layered hybrid perovskite films to direct charge transport and enhance the perovskite devices performance. Here w...

    Jifei Wang, Shiqiang Luo, Yun Lin, Yifu Chen, Yehao Deng in Nature Communications (2020)

  5. No Access

    Article

    Symbolic algorithmic verification of intransitive generalized noninterference

    Generalized noninterference can be used to formulate transitive security policies, but is unsuitable for intransitive security policies. We propose a new information flow security property, which we call intra...

    CongHua Zhou, ZhiFeng Liu, HaiLing Wu, Song Chen in Science China Information Sciences (2012)

  6. No Access

    Article

    Abstraction for model checking multi-agent systems

    Model checking multi-agent systems (MAS) always suffers from the state explosion problem. In this paper we focus on an abstraction technique which is one of the major methods for overcoming this problem. For a...

    Conghua Zhou, Bo Sun, Zhifeng Liu in Frontiers of Computer Science in China (2011)

  7. No Access

    Chapter and Conference Paper

    Information Flow Graph: An Approach to Identifying Covert Storage Channels

    The paper introduces a technique for detecting covert storage channels using a graph structure called an Information Flow Graph (IFG). The IFG can offer the information flows of the system for covert channel d...

    **angmei Song, Shiguang Ju, Changda Wang, Conghua Zhou in Trusted Systems (2011)

  8. No Access

    Chapter and Conference Paper

    Abstraction for Model Checking the Probabilistic Temporal Logic of Knowledge

    Probabilistic temporal logics of knowledge have been used to specify multi-agent systems. In this paper, we introduce a probabilistic temporal logic of knowledge called PTLK for expressing time, knowledge, and...

    Conghua Zhou, Bo Sun, Zhifeng Liu in Artificial Intelligence and Computational Intelligence (2010)

  9. No Access

    Chapter and Conference Paper

    QBF-Based Symbolic Model Checking for Knowledge and Time

    For temporal and epistemic property CTLK we propose a new symbolic model checking technique based on Quantified Boolean Formula(QBF). The verification approach is based on an adaption of the technique of bound...

    Conghua Zhou, Zhenyu Chen, Zhihong Tao in Theory and Applications of Models of Computation (2007)

  10. No Access

    Chapter and Conference Paper

    Improved SAT Based Bounded Model Checking

    The usefulness of Bounded Model Checking(BMC) based on propositional satisfiability methods has recently proven its efficacy for bug hunting. The basic idea is to search for a counterexample in executions whos...

    Conghua Zhou, Decheng Ding in Theory and Applications of Models of Computation (2006)