Skip to main content

and
  1. Article

    Open Access

    Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities

    Vulnerability reports are essential for improving software security since they record key information on vulnerabilities. In a report, CWE denotes the weakness of the vulnerability and thus helps quickly under...

    Peng Liu, Wenzhe Ye, Haiying Duan, **anxian Li, Shuyi Zhang, Chuanjian Yao in Cybersecurity (2023)

  2. Article

    Open Access

    Social equity perception and public mental health: a Chinese study with panel data

    Mental health is a vital part of an individual’s overall health and well-being, and the relationship between society and individuals has always been a focus of academic and public attention. However, the effec...

    Fan Yang, Yao Jiang, **u Bai, Yuchen Cai, Haiying Duan in BMC Psychology (2023)

  3. No Access

    Article

    Influence of different luting agents on the stress distributions of implant-supported all-ceramic single crown

    The purpose of this study was to investigate the influence of different luting agents on the stress distribution within the crown, abutment and peri-implant bone of implant-supported all-ceramic single crown. ...

    Shaohuai Gao 高少怀, Min Wang 王敏, Haiying Duan in Journal of Wuhan University of Technology-… (2013)

  4. No Access

    Article

    Influence of abutment material on the stress of implant-supported all-ceramic single crown

    In order to investigate the influence of abutment material on the stress of implant-supported all-ceramic single crown, a 3D finite element model of implant-supported mandibular first premolar was computed by ...

    Shaohuai Gao 高少怀, Haiying Duan in Journal of Wuhan University of Technology-… (2012)