Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    Understanding the Remplissage: History, Biomechanics, Outcomes, and Current Indications

    Arthroscopic remplissage has continued to gain popularity as an adjunct to Bankart repair for patients with anterior shoulder instability. Although the original remplissage technique was described over 15 year...

    Ryan Freshman, Benjamin Lurie, Grant Garcia in Current Reviews in Musculoskeletal Medicine (2024)

  2. Article

    Open Access

    Sustainable 3D printing by reversible salting-out effects with aqueous salt solutions

    Achieving a simple yet sustainable printing technique with minimal instruments and energy remains challenging. Here, a facile and sustainable 3D printing technique is developed by utilizing a reversible saltin...

    Donghwan Ji, Joseph Liu, Jiayu Zhao, Minghao Li, Yumi Rho in Nature Communications (2024)

  3. No Access

    Chapter and Conference Paper

    PECSOnline: A Bespoke Classroom Based Picture Exchange Communication System (PECS) for Children with Autism

    We present PECSOnline, a Picture Exchange Communication System (PECS) tailored to meet the specific needs of classroom environments rather than an individual. To ensure the tool would meet the practical requir...

    Joseph Liu, Becky Stephens, Chra Abdoulqadir in Human-Computer Interaction – INTERACT 2023 (2023)

  4. No Access

    Chapter and Conference Paper

    A Lightweight Authentication Protocol for 5G Cellular Network Connected Drones

    Drones are being diversely used in various areas due to their low price. Most of the use cases demand a secure and reliable wireless communication infrastructure to ensure the quality of service. Such demand b...

    Siyu Chen, Shujie Cui, Joseph Liu in Quality, Reliability, Security and Robustn… (2021)

  5. No Access

    Article

    Efficacy of different dosing schedules of capecitabine for metastatic breast cancer: a single-institution experience

    Purpose Capecitabine is widely used as a single agent on a 21-day cycle in the management of metastatic breast cancer (MBC). Our primary objective was to compare the standard dosing of capecitabine (Arm A: days 1...

    Anupama Suresh, Akannsha Ganju, Evan Morgan, Marilly Palettas in Investigational New Drugs (2020)

  6. Article

    Open Access

    Assessment of outcomes and novel immune biomarkers in metaplastic breast cancer: a single institution retrospective study

    Metaplastic breast cancer remains poorly characterized given its rarity and heterogeneity. The majority of metaplastic breast cancers demonstrate a phenotype of triple-negative breast cancer; however, differen...

    Evan Morgan, Anupama Suresh, Akaansha Ganju in World Journal of Surgical Oncology (2020)

  7. No Access

    Article

    Distinct, sex-dependent miRNA signatures in piglet hippocampus induced by a clinically relevant isoflurane exposure: a pilot study

    To evaluate the effects of sex on miRNA expression in the hippocampus after isoflurane anesthesia in a neonatal piglet model.

    Emmett E. Whitaker, Brianne Z. Wiemann, Jason C. **a in Journal of Anesthesia (2019)

  8. Article

    Open Access

    Aberrant enhancer hypomethylation contributes to hepatic carcinogenesis through global transcriptional reprogramming

    Hepatocellular carcinomas (HCC) exhibit distinct promoter hypermethylation patterns, but the epigenetic regulation and function of transcriptional enhancers remain unclear. Here, our affinity- and bisulfite-ba...

    Lei **ong, Feng Wu, Qiong Wu, Liangliang Xu, Otto K. Cheung in Nature Communications (2019)

  9. No Access

    Chapter and Conference Paper

    Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol

    Storing data in the blockchain brings many benefits. The block-and-chain structure protects the data stored in the blockchain from unauthorised changes. The data will also be duplicated to all nodes which main...

    Dimaz Ankaa Wijaya, Joseph Liu, Ron Steinfeld in Cryptology and Network Security (2019)

  10. Chapter and Conference Paper

    Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System

    We revisit the problem of constructing public key encryption (PKE) secure against both key-leakage and tampering attacks

    Shi-Feng Sun, Dawu Gu, Man Ho Au, Shuai Han in Applied Cryptography and Network Security (2019)

  11. No Access

    Chapter and Conference Paper

    Anonymity Reduction Attacks to Monero

    Monero is one of the most valuable cryptocurrencies in the market, focusing on users’ privacy. The built-in features in Monero help users to obfuscate the information of the senders and the receivers, hence a...

    Dimaz Ankaa Wijaya, Joseph Liu, Ron Steinfeld in Information Security and Cryptology (2019)

  12. No Access

    Chapter and Conference Paper

    Evaluating CryptoNote-Style Blockchains

    To hide user identity, blockchain-based cryptocurrencies utilize public key based coin addresses to represent users. However, the user identity can still be identified by linking the coin addresses to the IP a...

    Runchao Han, Jiangshan Yu, Joseph Liu, Peng Zhang in Information Security and Cryptology (2019)

  13. No Access

    Chapter and Conference Paper

    Position Paper on Blockchain Technology: Smart Contract and Applications

    Blockchain technology enables a transaction to be handled in a decentralized fashion. In this position paper, we aim to introduce the background of blockchain technology, discuss one of its important component...

    Weizhi Meng, Jianfeng Wang, **anmin Wang, Joseph Liu in Network and System Security (2018)

  14. No Access

    Chapter and Conference Paper

    Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud

    ABE (Attribute-based encryption) is capable of fine-grained data encryption, and thus has been studied for secure cloud data sharing. While a number of efforts have been dedicated to resolving the user revocat...

    Yanjiang Yang, Joseph Liu, Zhuo Wei, **nyi Huang in Information Security and Privacy (2017)

  15. Article

    Open Access

    Roles of Distal and Genic Methylation in the Development of Prostate Tumorigenesis Revealed by Genome-wide DNA Methylation Analysis

    Aberrant DNA methylation at promoters is often linked to tumorigenesis. But many aspects of DNA methylation remain unexplored, including the individual roles of distal and gene body methylation, as well as the...

    Yao Wang, Rohit Ramakant Jadhav, Joseph Liu, Desiree Wilson in Scientific Reports (2016)

  16. Article

    Open Access

    Genome-wide DNA methylation analysis reveals estrogen-mediated epigenetic repression of metallothionein-1 gene cluster in breast cancer

    Recent genome-wide analysis has shown that DNA methylation spans long stretches of chromosome regions consisting of clusters of contiguous CpG islands or gene families. Hypermethylation of various gene cluster...

    Rohit R Jadhav, Zhenqing Ye, Rui-Lan Huang, Joseph Liu, Pei-Yin Hsu in Clinical Epigenetics (2015)

  17. No Access

    Article

    Alveolar Rhabdomyosarcoma Causing Acute Compartment Syndrome of the Forearm: A Case Report and Review of the Literature

    Frank Valone III, Joseph Liu, Gillian Genrich in Journal of Hand and Microsurgery (2014)

  18. No Access

    Article

    Genome-wide DNA methylation profiling reveals parity-associated hypermethylation of FOXA1

    Early pregnancy in women by the age of 20 is known to have a profound effect on reduction of lifelong breast cancer risk as compared to their nulliparous counterparts. Additional pregnancies further enhance t...

    Sagar Ghosh, Fei Gu, Chou-Miin Wang, Chun-Lin Lin in Breast Cancer Research and Treatment (2014)

  19. Article

    Open Access

    Epitope analysis following active immunization with tau proteins reveals immunogens implicated in tau pathogenesis

    Abnormal tau hyperphosphorylation and its accumulation into intra-neuronal neurofibrillary tangles are linked to neurodegeneration in Alzheimer’s disease and similar tauopathies. One strategy to reduce accumul...

    Maj-Linda B Selenica, Hayk Davtyan, Steven B Housley in Journal of Neuroinflammation (2014)

  20. No Access

    Chapter and Conference Paper

    TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing

    The semi-trusted servers in cloud environment may outsource the files of their clients to some low expensive servers to increase their profit. To some extent, such behavior may violate the wishes of cloud user...

    Tao Jiang, **aofeng Chen, ** Li in Information Security Practice and Experien… (2014)

previous disabled Page of 2